Detecting denial of sleep attacks by analysis of wireless sensor networks and the Internet of Things
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2023.14.4.52Keywords:
Denial of service, Denial of sleep, Internet of Things, Wake-up radio, Network security, Wireless sensor networks, AODV protocol.Dimensions Badge
Issue
Section
License
Copyright (c) 2023 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
The Internet of Things (IoT) amalgamates a large number of physical objects that are distinctively identified, ubiquitously interconnected and accessible through the Internet. IoT endeavors to renovate any object in the real world into a computing device that has sensing, communicating, computing and control capabilities. There are a budding number of IoT devices and applications and this escort to an increase in the number and complexity of malicious attacks. It is important to defend IoT systems against malicious attacks, especially to prevent attackers from acquiring control over the devices. Energy utilization is significant for battery-enabled devices in the IoT and wireless sensor networks which are operated long time period. The Denial-of-Sleep attack is an explicit type of denial-of-service attack that beleaguered a battery-powered device’s power supply that results in the exhaustion of this critical resource. This paper focuses on the survey on Denial of sleep attacks in Wireless Sensor networks and the IoT.Abstract
How to Cite
Downloads
Similar Articles
- R Sharmila, Nikhil S Patankar, Manjula Prabakaran, Chandra M. V. S. Akana, Arvind K Shukla, T. Raja, Recent developments in flexible printed electronics and their use in food quality monitoring and intelligent food packaging , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- Arvind K Shukla, Balaji V, Dharani R, M Ananthi, R Padmavathy, Romala V. Srinivas, Precision agriculture predictive modeling and sensor analysis for enhanced crop monitoring , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- K. Mohamed Arif Khan, A.R. Mohamed Shanavas, Energy efficient techniques for iot application on resource aware fog computing paradigm , The Scientific Temper: Vol. 16 No. 02 (2025): The Scientific Temper
- S. Hemalatha, N. Vanjulavalli, K. Sujith, R. Surendiran, Chaotic-based optimization, based feature selection with shallow neural network technique for effective identification of intrusion detection , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Raja Selvaraj, Manikandasaran S Sundaram, ECM: Enhanced confidentiality method to ensure the secure migration of data in VM to cloud environment , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- Harjinderpal Singh Kalsi, To Monitor Real-time Temperature and Gas in an Underground Mine Wireless on an Android Mobile , The Scientific Temper: Vol. 13 No. 02 (2022): The Scientific Temper
- Nida Syeda, Kishore Selva Babu, Exploring the role of digital humanities in the centralization of knowledge production: Clusters, networks, or echo chambers , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- N. Anbarasi, K. Anitha, S. Hemalatha, A study on energy sum of dominating sets in East Indian states , The Scientific Temper: Vol. 16 No. 04 (2025): The Scientific Temper
- Somalee Mahapatra, Manoranjan Dash, Subhashis Mohanty, Adoption of artificial intelligence and the internet of things in dental biomedical waste management , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- S. Hemalatha, N. Vanjulavalli, K. Sujith, R. Surendiran, Effective gorilla troops optimization-based hierarchical clustering with HOP field neural network for intrusion detection , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
<< < 2 3 4 5 6 7 8 9 10 11 > >>
You may also start an advanced similarity search for this article.

