Institut for Forretningsudvikling og Teknologi

Ramjee Prasad

Activity Modelling and Comparative Evaluation of WSN MAC Security Attacks

Publikation: Bidrag til tidsskrift/Konferencebidrag i tidsskrift /Bidrag til avisTidsskriftartikelForskningpeer review

Standard

Activity Modelling and Comparative Evaluation of WSN MAC Security Attacks. / Pawar, Pranav M.; Nielsen, Rasmus Hjorth; Prasad, Neeli R.; Ohmori, Shingo; Prasad, Ramjee.

I: Journal of Cyber Security and Mobility, Bind 1, Nr. 2, 2012, s. 1-20.

Publikation: Bidrag til tidsskrift/Konferencebidrag i tidsskrift /Bidrag til avisTidsskriftartikelForskningpeer review

Harvard

Pawar, PM, Nielsen, RH, Prasad, NR, Ohmori, S & Prasad, R 2012, 'Activity Modelling and Comparative Evaluation of WSN MAC Security Attacks', Journal of Cyber Security and Mobility, bind 1, nr. 2, s. 1-20.

APA

Pawar, P. M., Nielsen, R. H., Prasad, N. R., Ohmori, S., & Prasad, R. (2012). Activity Modelling and Comparative Evaluation of WSN MAC Security Attacks. Journal of Cyber Security and Mobility, 1(2), 1-20.

CBE

Pawar PM, Nielsen RH, Prasad NR, Ohmori S, Prasad R. 2012. Activity Modelling and Comparative Evaluation of WSN MAC Security Attacks. Journal of Cyber Security and Mobility. 1(2):1-20.

MLA

Pawar, Pranav M. o.a.. "Activity Modelling and Comparative Evaluation of WSN MAC Security Attacks". Journal of Cyber Security and Mobility. 2012, 1(2). 1-20.

Vancouver

Pawar PM, Nielsen RH, Prasad NR, Ohmori S, Prasad R. Activity Modelling and Comparative Evaluation of WSN MAC Security Attacks. Journal of Cyber Security and Mobility. 2012;1(2):1-20.

Author

Pawar, Pranav M. ; Nielsen, Rasmus Hjorth ; Prasad, Neeli R. ; Ohmori, Shingo ; Prasad, Ramjee. / Activity Modelling and Comparative Evaluation of WSN MAC Security Attacks. I: Journal of Cyber Security and Mobility. 2012 ; Bind 1, Nr. 2. s. 1-20.

Bibtex

@article{0d8433f0d6bb45ac948f503f53cd3ee9,
title = "Activity Modelling and Comparative Evaluation of WSN MAC Security Attacks",
abstract = "Applications of wireless sensor networks (WSNs) are growing tremendously in the domains of habitat, tele-health, industry monitoring, vehicular networks, home automation and agriculture. This trend is a strong motivation for malicious users to increase their focus on WSNs and to develop and initiate security attacks that disturb the normal functioning of the network in a severe manner. Such attacks affect the performance of the network by increasing the energy consumption, by reducing throughput and by inducing long delays. Of all existing WSN attacks, MAC layer attacks are considered the most harmful as they directly affect the available resources and thus the nodes’ energy consumption. The first endeavour of this paper is to model the activities of MAC layer security attacks to understand the flow of activities taking place when mounting the attack and when actually executing it. The second aim of the paper is to simulate these attacks on hybrid MAC mechanisms, which shows the performance degradation of aWSN under the considered attacks. The modelling and implementation of the security attacks give an actual view of the network which can be useful in further investigating secure mechanisms to reduce the degradation of the performance in WSNs due to an attack. Lastly, the paper proposes some solutions to reduce the effects of an attack.",
author = "Pawar, {Pranav M.} and Nielsen, {Rasmus Hjorth} and Prasad, {Neeli R.} and Shingo Ohmori and Ramjee Prasad",
note = "Article No: 2",
year = "2012",
language = "English",
volume = "1",
pages = "1--20",
journal = "Journal of Cyber Security and Mobility",
issn = "2245-1439",
publisher = "River Publishers",
number = "2",

}

RIS

TY - JOUR

T1 - Activity Modelling and Comparative Evaluation of WSN MAC Security Attacks

AU - Pawar, Pranav M.

AU - Nielsen, Rasmus Hjorth

AU - Prasad, Neeli R.

AU - Ohmori, Shingo

AU - Prasad, Ramjee

N1 - Article No: 2

PY - 2012

Y1 - 2012

N2 - Applications of wireless sensor networks (WSNs) are growing tremendously in the domains of habitat, tele-health, industry monitoring, vehicular networks, home automation and agriculture. This trend is a strong motivation for malicious users to increase their focus on WSNs and to develop and initiate security attacks that disturb the normal functioning of the network in a severe manner. Such attacks affect the performance of the network by increasing the energy consumption, by reducing throughput and by inducing long delays. Of all existing WSN attacks, MAC layer attacks are considered the most harmful as they directly affect the available resources and thus the nodes’ energy consumption. The first endeavour of this paper is to model the activities of MAC layer security attacks to understand the flow of activities taking place when mounting the attack and when actually executing it. The second aim of the paper is to simulate these attacks on hybrid MAC mechanisms, which shows the performance degradation of aWSN under the considered attacks. The modelling and implementation of the security attacks give an actual view of the network which can be useful in further investigating secure mechanisms to reduce the degradation of the performance in WSNs due to an attack. Lastly, the paper proposes some solutions to reduce the effects of an attack.

AB - Applications of wireless sensor networks (WSNs) are growing tremendously in the domains of habitat, tele-health, industry monitoring, vehicular networks, home automation and agriculture. This trend is a strong motivation for malicious users to increase their focus on WSNs and to develop and initiate security attacks that disturb the normal functioning of the network in a severe manner. Such attacks affect the performance of the network by increasing the energy consumption, by reducing throughput and by inducing long delays. Of all existing WSN attacks, MAC layer attacks are considered the most harmful as they directly affect the available resources and thus the nodes’ energy consumption. The first endeavour of this paper is to model the activities of MAC layer security attacks to understand the flow of activities taking place when mounting the attack and when actually executing it. The second aim of the paper is to simulate these attacks on hybrid MAC mechanisms, which shows the performance degradation of aWSN under the considered attacks. The modelling and implementation of the security attacks give an actual view of the network which can be useful in further investigating secure mechanisms to reduce the degradation of the performance in WSNs due to an attack. Lastly, the paper proposes some solutions to reduce the effects of an attack.

M3 - Journal article

VL - 1

SP - 1

EP - 20

JO - Journal of Cyber Security and Mobility

JF - Journal of Cyber Security and Mobility

SN - 2245-1439

IS - 2

ER -