Browse > Article
http://dx.doi.org/10.5762/KAIS.2010.11.12.4760

Security Issue in T-MAC Communication Protocol  

Hong, Jin-Keun (Division of Information Communication, Baekseok University)
Publication Information
Journal of the Korea Academia-Industrial cooperation Society / v.11, no.12, 2010 , pp. 4760-4765 More about this Journal
Abstract
Time out-medium access control (T-MAC) protocol is one of the well-known MAC protocols designed for wireless sensor networks (WSN), and is proposed to enhance the poor performance of the S-MAC protocol. In this paper, we are reviewed about security vulnerability in T-MAC, and analyzed the power which is consumed at each stage of T-MAC protocol according to vulnerability of denial of service (DoS) and replay problem. From our analytical results, it can be considered the need of power efficient authentication scheme which provides the reliability, efficiency, and security for a general T-MAC communication. This is the case study of possible DoS vulnerability and its power consumption in T-MAC.
Keywords
Security; Sensor Network; Vulnerability;
Citations & Related Records
연도 인용수 순위
  • Reference
1 P. Lin, C. Qiao, and X. Wang, "Medium Access Control with A Dynamic Duty Cycle for Sensor Networks," IEEE WCNC'04, pp.1534-1539, 2004.
2 J. deng, R. Han, and S. Mishra, "A Robust and Light-Weight Routing Mechanism for Wireless Sensor Netowkrs," DIWANS'04, 2004.
3 W. Lee and H. S. Lee, "Analysis of a Global Synchronization Algorithm in Wireless Sensor Networks," IEEE MFI'08, pp.20-25, 2008.
4 S. Sung, H. Kang, E. Kim, and K. Kim,, "Energy Consumption Analysis of S-MAC Protocol in Single-Hop Wireless Sensor Networks," IEEE, 2006.
5 T. V. Dam and K. Langendoen, "An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Networks," ACM SenSys'03, pp.171-180, 2003.
6 H. Y. Lee and T. H. Cho, "Fuzzy Adaptive Selection of Filtering Schemes for Energy Saving in Sensor Networks," IEICE Trans. Commun., Vol.E90-B, No.12, pp.3346-3353, 2007.   DOI
7 G. Xing et al., "Towards Unified Radio Power Management for Wireless Sensor Networks," Wireless Communications and Mobile Computing, Vol.9, Issue 3, pp.31-323, 2008.
8 H. Wang, "A Robust Mechanism for Wireless Sensor Network Security," IEEE WiCom'08, pp.1-4, 2008.
9 X. Lu, M. Spear, K. Levitt, and S. F. Wu, "A Synchronization Attack and Defense in Energy-Efficient Listen-Sleep Slotted MAC Protocols," IARIA SECURWARE'08, pp.403-411, 2008.
10 W. Ye, J. Heidemann, and D. Estrin, "An Energy-Efficient MAC Protocol for Wireless Sensor Networks," IEEE INFOCOM'02, pp.1567-1576, 2002.