Browse > Article
http://dx.doi.org/10.5762/KAIS.2011.12.10.4606

Analysis of Security Effectiveness in according to DS-MAC attack  

Hong, Jin-Keun (Division of Information Communication, Baekseok University)
Publication Information
Journal of the Korea Academia-Industrial cooperation Society / v.12, no.10, 2011 , pp. 4606-4611 More about this Journal
Abstract
In this paper, it is reviewed vulnerability of security in DS-MAC communication protocol of sensor network, and analyzed in the respect of security effectiveness, which is consumed at each stage of communication procedure in according to vulnerability of denial of service and modification attack. In this paper, we present about the respect of security effectiveness of transmission and reception in case of operation mode with or without authentication scheme between sensor node.
Keywords
Sensor; MAC; Security;
Citations & Related Records
연도 인용수 순위
  • Reference
1 IDTechEX, "Wireless Sensor Networks 2011-2021," 2011 IDTechEX Report, 2011.6.
2 Wang, "Technology trend for election of secure cluster head in Sensor Network," IITA ITFinds No1478, 2010. 12. 29.
3 Mnoir Hossen, Ki-Doo Kim and Youngil Park, "Optimized Latency Secured(LS) MAC Protocols for Delay Sensitive Large Sensor Networks," Internal Journal of Wireless Communication and Information Systems (IJWCIS), Vol.1 No.1, 2011. 4, pp.18-24.
4 Xiaoming Lu, Matt Spear, Karl Levitt, Norman S. Matloff, S. Felix Wu, "A Synchronization Attack and Defense in Energy Efficient Listen-Sleep Slotted MAC Protocols," Proceedings of ICESIST2008. 2008. 8.
5 Woonsik Lee, Hwang Soo Lee, "Analysis of a global synchronization algorithm in wireless sensor networks," Proceedings of MFI2008, 2008. 8.
6 W. Ye, J. Heidemann and D. Estrin, "An Energy Efficient MAC Protocol for Wireless Sensor Networks," Proceedings of IEEE INFOCOM2002, June 2002.
7 Lin P., Qiao C., Wang X., "Medium access control with a dynamic duty cycle for sensor networks," Proceedings of WCNC2004, March 2004.