a synchronization attack and defense in energy efficient listen sleep slotted mac protocols
DESCRIPTION
Abstract As wireless motes are battery powered, many listen sleepMedium Access Control (MAC) protocols have been proposedto reduce energy consumption. Security issues related tothe design of these protocols have, however, largely been ignored.In this paper, we present a novel attack (the synchronizationattack) on listen-sleep MAC protocols. This attack can cause100% message loss and approximately 30% higher energy drainthroughout either a cluster or the entire network, with only asingle constrained malicious node modifying its schedule. Weshow this attack can be applied to many slotted listen-sleepprotocols such as Sensor MAC (S-MAC), its enhanced versionGlobal Schedule Adoption (GSA), Timeout MAC (T-MAC), DynamicSensor-MAC (DSMAC), and Mobile S-MAC (MS-MAC).We propose a heuristically near-optimal threshold-based schemeto defend against large scale synchronization attack.TRANSCRIPT
ZEBROS PROJECTS
Office Address: No 4 / Flat No 3D, Sai Kiran Apts, First Main Road, Kasturba Nagar, Chennai-20 web: www.zebros.in e mail : [email protected] mob: 99400 98300,9500075001
WAY TO YOUR GOAL
NS2 PROJECTS
FINAL YEAR PROJECTS
IEEE PROJECTS 2013-2014
CONTACT: 9940098300, 9500075001
E-Mail:[email protected]
ZEBROS PROJECTS
Office Address: No 4 / Flat No 3D, Sai Kiran Apts, First Main Road, Kasturba Nagar, Chennai-20 web: www.zebros.in e mail : [email protected] mob: 99400 98300,9500075001
A Synchronization Attack and Defense in Energy-Efficient Listen-Sleep Slotted MAC Protocols
Abstract
As wireless motes are battery powered, many listen sleep Medium Access
Control (MAC) protocols have been proposed to reduce energy consumption. Security
issues related to the design of these protocols have, however, largely been ignored. In
this paper, we present a novel attack (the synchronization attack) on listen-sleep MAC
protocols. This attack can cause 100% message loss and approximately 30% higher
energy drain throughout either a cluster or the entire network, with only a single
constrained malicious node modifying its schedule. We show this attack can be applied
to many slotted listen-sleep protocols such as Sensor MAC (S-MAC), its enhanced
version Global Schedule Adoption (GSA), Timeout MAC (T-MAC), Dynamic Sensor-
MAC (DSMAC), and Mobile S-MAC (MS-MAC). We propose a heuristically near-
optimal threshold-based scheme to defend against large scale synchronization attack.
Depending on the traffic rate, our defense can limit the message delay to at most 20%
and the message drop to at most 12%. We performed extensive simulations to show the
attack and its defense. Our theoretical analysis proves these results in a general listen-
sleep framework. An important impact of this work is that without a reliable MAC
layer, higher layer secure protocols cannot be developed, e.g. secure routing depends
on a reliable exchange of messages and our attack disrupts this exchange.
ZEBROS PROJECTS
Office Address: No 4 / Flat No 3D, Sai Kiran Apts, First Main Road, Kasturba Nagar, Chennai-20 web: www.zebros.in e mail : [email protected] mob: 99400 98300,9500075001
ZEBROS PROJECTS
SOFTWARE BASED HARDWARE BASED
Networking VLSI
Data Mining Mat lab
Grid Computing Robotics
Network Security Embedded
Image Processing Bio Medical
Web Applications Power Systems
Mobile Computing Power Electronics
Software Engineering Java with Embedded
Cloud Computing Android
What is IEEE?
The Institute of Electrical and Electronics Engineers or IEEE (read eye-triple-e) is Incorporated in the State of New York, United States. It was formed in 1963 by the merger of the Institute of Radio Engineers (IRE, founded 1912) and the American Institute of Electrical Engineers (AIEE, founded 1884). A membership organization comprised of engineers, scientists and students that sets standards for computers and communications. It is a nonprofit organization with more than 365,000 members in around 150 countries.
The IEEE describes itself as "the world's largest technical professional society -- promoting the development and application of electro technology and allied sciences for the benefit of humanity, the advancement of the profession, and the well-being of our members."
Why IEEE based projects?
It grantees for standard
It assured latest solution for problems
It delivers new patented technologies at an ever-increasing pace
It access world-class technical information provided by the IEEE and cut down your
research time.
ZEBROS PROJECTS
Office Address: No 4 / Flat No 3D, Sai Kiran Apts, First Main Road, Kasturba Nagar, Chennai-20 web: www.zebros.in e mail : [email protected] mob: 99400 98300,9500075001
OUR FEATURES
24*7 Call Support
Project Execution through Remote System
20 Days Technical classes taken by Corporate Trainer
Unlimited Project & Technical Support through your academic
Project software Installation support
PROJECT SUPPORT
0th Review 1st Review
Abstract Existing System Disadvantages Proposed System Advantages Objective System Requirements System Architecture
Literature Survey Module List Module Description Data Flow Diagram Level DFD Module Wise DFD Problem Definition Review Document Explanation
2nd Review 3rd Review
Use case Diagram Class Diagram Collaboration Diagram Sequence Diagram Activity Diagram Testing & test cases Partial Code Screenshot for First two
module Review Document Explanation
Conclusion References Future Enhancement 65% code (Executable Format) Required Software Review Document Explanation
Final Review
Complete Code with Enhancement
Final Document (University Standard Format)
Complete Explanation for Project Concept & Code