Detecting denial of sleep attacks by analysis of wireless sensor networks and the Internet of Things
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2023.14.4.52Keywords:
Denial of service, Denial of sleep, Internet of Things, Wake-up radio, Network security, Wireless sensor networks, AODV protocol.Dimensions Badge
Issue
Section
License
Copyright (c) 2023 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
The Internet of Things (IoT) amalgamates a large number of physical objects that are distinctively identified, ubiquitously interconnected and accessible through the Internet. IoT endeavors to renovate any object in the real world into a computing device that has sensing, communicating, computing and control capabilities. There are a budding number of IoT devices and applications and this escort to an increase in the number and complexity of malicious attacks. It is important to defend IoT systems against malicious attacks, especially to prevent attackers from acquiring control over the devices. Energy utilization is significant for battery-enabled devices in the IoT and wireless sensor networks which are operated long time period. The Denial-of-Sleep attack is an explicit type of denial-of-service attack that beleaguered a battery-powered device’s power supply that results in the exhaustion of this critical resource. This paper focuses on the survey on Denial of sleep attacks in Wireless Sensor networks and the IoT.Abstract
How to Cite
Downloads
Similar Articles
- Sangeeta Modi, P Usha, Fault analysis in hybrid microgrid for developing a suitable protection scheme , The Scientific Temper: Vol. 14 No. 01 (2023): The Scientific Temper
- Raja Selvaraj, Manikandasaran S. Sundari, EAM: Enhanced authentication method to ensure the authenticity and integrity of the data in VM migration to the cloud environment , The Scientific Temper: Vol. 14 No. 01 (2023): The Scientific Temper
- Syam Sundar. S, Direct reuse of scour and bleach effluent water for cotton knitted fabrics , The Scientific Temper: Vol. 14 No. 02 (2023): The Scientific Temper
- Pavithra M, Dr. R. Neelaveni, Muthuraman K. R , Kamalesh G, Design of an interactive smart band for intellectually disabled person , The Scientific Temper: Vol. 14 No. 02 (2023): The Scientific Temper
- Subin M. Varghese, K. Aravinthan, A robust finger detection based sign language recognition using pattern recognition techniques , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- U. Perachiselvi, R. Balasubramani, Funding agencies in Tamil Nadu State Universities: A scientometric perspective , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Suprabha Amit Kshatriya, Jaymin K Bhalani, Early detection of fire and smoke using motion estimation algorithms utilizing machine learning , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- Lakshminarayani A, A Shaik Abdul Khadir, A blockchain-integrated smart healthcare framework utilizing dynamic hunting leadership algorithm with deep learning-based disease detection and classification model , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- Kowsalya Ramasamy, Thiyagarajan Krishnan, Performance analysis of RF substrate materials in ISM band antenna applications , The Scientific Temper: Vol. 14 No. 02 (2023): The Scientific Temper
- Damtew Girma, Addisalem Mebratu, Fresew Belete, Response of potato (Solanum tuberosum L.) varieties to blended NPSB fertilizer rates on tuber yield and quality parameters in Gummer district, Southern Ethiopia , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
<< < 19 20 21 22 23 24 25 26 > >>
You may also start an advanced similarity search for this article.

