Detecting denial of sleep attacks by analysis of wireless sensor networks and the Internet of Things
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2023.14.4.52Keywords:
Denial of service, Denial of sleep, Internet of Things, Wake-up radio, Network security, Wireless sensor networks, AODV protocol.Dimensions Badge
Issue
Section
License
Copyright (c) 2023 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
The Internet of Things (IoT) amalgamates a large number of physical objects that are distinctively identified, ubiquitously interconnected and accessible through the Internet. IoT endeavors to renovate any object in the real world into a computing device that has sensing, communicating, computing and control capabilities. There are a budding number of IoT devices and applications and this escort to an increase in the number and complexity of malicious attacks. It is important to defend IoT systems against malicious attacks, especially to prevent attackers from acquiring control over the devices. Energy utilization is significant for battery-enabled devices in the IoT and wireless sensor networks which are operated long time period. The Denial-of-Sleep attack is an explicit type of denial-of-service attack that beleaguered a battery-powered device’s power supply that results in the exhaustion of this critical resource. This paper focuses on the survey on Denial of sleep attacks in Wireless Sensor networks and the IoT.Abstract
How to Cite
Downloads
Similar Articles
- Raghavan Santhanam, P Venugopal, Sreoshi Dasgupta, R. S. Kumar, Saravanan M.P, Ravindra A. Kayande, Analysis of organizational culture and e-commerce adoption in the context of top management perspectives , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- Tara K. Sharma, Problems and prospects of tourism financing in Sikkim , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- Sabeerath K, Manikandasaran S. Sundaram, BTEDD: Block-level tokens for efficient data deduplication in public cloud infrastructures , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Aditi Malik, Rishi Chaudhry, Mohit, Urvashi Suryavanshi, Mapping the landscape of political advertising research: A comprehensive bibliometric analysis , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- Sawitri Devi, Raj Kumar, Unveiling scholarly insights: A bibliometric analysis of literature on gender bias at the workplace , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Parismita Bhagawati, Paramita Dey, Animal cruelty legislation in India: A green criminological exploration , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- Tewoderos Legesse, Bekelech Sharew, Evaluation of white seeded sesame (Sesamum indicium L.) genotypes on growth and yield performance in Menit Goldya Woreda of West Omo Zone, SWE , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- Arunima Dey, New gender representation on the Indian OTT platform: A study on web series “Made in Heaven” , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
- Temesgen A. Asfaw, Batch size impact on enset leaf disease detection , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
- Deepa S, Sripriya T, Radhika M, Jeneetha J. J, Experimental evaluation of artificial intelligence assisted heart disease prediction using deep learning principle , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
<< < 12 13 14 15 16 17 18 19 20 21 > >>
You may also start an advanced similarity search for this article.