Skip to main content

Layered-MAC: An Energy-Protected and Efficient Protocol for Wireless Sensor Networks

  • Conference paper
  • First Online:
Mobile Wireless Middleware, Operating Systems and Applications

Abstract

In wireless sensor networks, the radio of the wireless sensor node happens to be the highest source of energy consumption. Hence, there is a need to focus on the MAC layer, as it controls access to the radio. While there are several existing techniques to make sensors more energy-efficient, not many of them consider the security aspects of energy efficiency. By this we mean protecting energy from external attacks. The existing protocols focus mainly on either duty cycling (Sensor-MAC, Time-out MAC) or clustering (Gateway MAC), as a way of conserving energy. One of such attacks to energy is the denial-of-sleep (DoSL) attack which is a specific kind of denial-of-service attacks designed to drain the energy of battery-powered sensors in a wireless sensor network. This paper explains the development of a new MAC layer protocol called Layered-MAC aimed at not just energy efficiency but energy protection against DoSL attacks. The protocol is implemented on the OMNET++ and Castalia simulator. The results from the simulation are then compared with two representative existing duty-cycled protocols (Time-out MAC and Sensor-MAC), and significant improvements are present. One of the benefits of the developed protocol is that not only does it attempt to save energy, but it protects energy from DoSL attacks. There are two main contributions from this research – the first is the additional layer of network metrics (RSSI and LQI) consideration, based on the premise that protection/security is not possible without some form of measurement of assets, and the cluster head rotation which adds an extra layer of energy protection while considering energy efficiency.

This is a modified and extended version of previously published work [1].

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Udoh, E.: An energy aware and secure mac protocol for tackling denial of sleep attacks in wireless sensor networks. PhD thesis, University of Westminster (2019)

    Google Scholar 

  2. Raymond, D.R., Midkiff, S.F.: Denial-of-service in wireless sensor networks: attacks and defenses.IEEE Pervasive Comput. 7(1), 74–81, January–March IEEE (2008). https://doi.org/10.1109/MPRV.2008.6

  3. Shakhov, V., Koo, I.: Depletion-of-battery attack: specificity, modelling and analysis. In: Special Issue on Security in IoT Enabled Sensors, Sensors, vol. 18, no. 6, Switzerland (2018)

    Google Scholar 

  4. Gelenbe, E., Kadioglu, Y.M.: Battery attacks on sensors. In: Proceedings of the International Symposium on Computer and Information Sciences, Security Workshop, pp. 1–10, Springer (2018)

    Google Scholar 

  5. Gehrmann, C., Tiloca, M., Hoglund, R.: SMACK: short message authentication check against battery exhaustion in the Internet of Things. In: Proceedings of the 2015 12th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON), pp. 274–282, IEEE (2015) https://doi.org/10.1109/SAHCN.2015.7338326

  6. Rani, S., Naidu, S.K.: Mitigation of energy depletion in wireless ad-hoc sensor networks through path optimization. Int. J. Comput. Netw. Appl. 2(1), 1–11 (2015)

    Google Scholar 

  7. Boulis, A.: Castalia A Simulator for Wireless Sensor Networks and Body Area Networks User’s Manual, Version 3.2. NICTA, Sydney (2011)

    Google Scholar 

  8. Horveliur, C.M.: Sun SPOTs: a great solution for small device development. https://www.oracle.com/technetwork/server-storage/ts-4868-1-159029.pdf. Last accessed 20 Nov 2018

  9. Udoh, E., Getov, V.: Performance and energy-tuning methodology for wireless sensor networks using TunableMAC. In: 2020 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI), pp. 1–5. IEEE, Sharja, UAE (2020). https://doi.org/10.1109/CCCI49893.2020.9256744

    Chapter  Google Scholar 

  10. Udoh, E., Getov, V.: Proactive energy-efficiency: evaluation of duty-cycled mac protocols in wireless sensor networks. In: 2018 International Conference on Computer, Information and Telecommunication Systems (CITS), pp. 1–5. IEEE, Colmar, France (2018). https://doi.org/10.1109/CITS.2018.8440194

    Chapter  Google Scholar 

  11. Sinha, P., Jha, V.K., Rai, S.K., Bhushan, B.: Security vulnerabilities, attacks and countermeasures in wireless sensor networks at various layers of OSI reference model: a survey. In: Proceedings of IEEE International Conference on Signal Processing and Communication, ICSPC 2017, vols. 2018-January, no. July, pp. 288–293, IEEE, Coimbatore, India (2017)

    Google Scholar 

  12. Agile Business Consortium: The DSDM agile project framework. Available at: https://www.agilebusiness.org/content/moscow-prioritisation. Last accessed 20 Nov 2018 (2014)

  13. Brownfield, M.I.: Energy-efficient wireless sensor network MAC protocol. PhD thesis, Virginia Polytechnic Institute and State University (2006)

    Google Scholar 

  14. Pirretti, M., Zhu, S., Vijaykrishnan, N., Mcdaniel, P., Kandemir, M., Brooks, R.: The sleep deprivation attack in sensor networks: analysis and methods of defense. Int. J. Distrib. Sens. Netw. 2(3), 267–287. SAGE (2006)

    Google Scholar 

  15. Vaseer, G., Ghai, G., Patheja, P.S.: A novel intrusion detection algorithm: an AODV routing protocol case study. In: Proceedings of the 2017 IEEE International Symposium on Nanoelectronic and Information Systems, iNIS 2017, vols. 2018-February, pp. 111–116, IEEE, Bhopal, India (2018)

    Google Scholar 

  16. Chen, C., Hui, L., Pei, Q., Ning, L., Qingquan, P.: An effective scheme for defending denial-of-sleep attack in wireless sensor networks. In: 5th International Conference on Information Assurance and Security, IAS. IEEE Xi’an China (2009)

    Google Scholar 

  17. Bhattasali, T., Chaki, R.: AMC model for denial of sleep attack detection. J. Recent Res. Trends. Cornell University arXiv Prepr. arXiv1203.1777 (2012)

    Google Scholar 

  18. Falk, R., Hof, H.J.: Fighting insomnia: a secure wake-up scheme for wireless sensor networks. In: Proceedings of the Third International Conference on Emerging Security Information, Systems and Technologies, pp. 191–196 (2009). https://doi.org/10.1109/SECURWARE.2009.36

    Chapter  Google Scholar 

  19. Montoya, M., Bacles-Min, S., Molnos, A., Fournier, J.J.: SWARD: a secure wakeup RaDio against denial-of-service on IoT devices. In: 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec’18). CCSD, Stockholm, Sweden (2018). https://doi.org/10.1145/3212480.3212488.cea-01922847

    Chapter  Google Scholar 

  20. Naik, S., Shekokar, N.: Conservation of Energy in Wireless Sensor Network by Preventing Denial of Sleep Attack. In: Procedia Computer Science. Elsevier, Amsterdam (2015)

    Google Scholar 

  21. Hsueh, C.T., Wen, C.Y., Ouyang, Y.C.: A secure scheme against power exhausting attacks in hierarchical wireless sensor networks. IEEE Sens. J. 15(6), 3590–3602. IEEE (2015)

    Google Scholar 

  22. Yuksel, A., Uzun, E., Tavli, B.: The impact of elimination of the most critical node on wireless sensor network lifetime. In: IEEE Sensors Applications Symposium, Proceedings, pp. 1–5, IEEE, Zadar, Croatia (2015)

    Google Scholar 

  23. Wang, J., Jiang, S., Fapojuwo, A.O.: A protocol layer trust-based intrusion detection scheme for wireless sensor networks. In: Mauri, J., Han, G. (eds.) Smart Communication Protocols and Algorithms for Sensor Networks, vol. 17, no. 6, Sensors, Switzerland (2017)

    Google Scholar 

  24. Islam, M.N.U., Fahmin, A., Hossain, M.S., et al.: Denial-of-service attacks on wireless sensor network and defense techniques. Wirel. Pers. Commun. 116, 1993–2021 (2021). https://doi.org/10.1007/s11277-020-07776-3

    Article  Google Scholar 

  25. Ferng, H.W., Khoa, N.M.: On security of wireless sensor networks: a data authentication protocol using digital signature. Wirel. Netw. 23(4), 1113–1131. Springer (2017)

    Google Scholar 

  26. Capossele, A.T., Cervo, V., Petrioli, C., Spenza, D.: Counteracting denial-of-sleep attacks in wake-up-radio-based sensing systems. In: Proceedings of 2016 13th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON), 2016, pp. 1–9, IEEE, London, UK (2016). https://doi.org/10.1109/SAHCN.2016.7732978

  27. Udoh, E., Getov, V.: Performance analysis of denial-of-sleep attack-prone MAC protocols in wireless sensor networks. In: Proceedings of 2018 UKSim-AMSS 20th International Conference on Computer Modelling and Simulation, pp. 151–156. IEEE, Cambridge (2018). https://doi.org/10.1109/UKSim.2018.00038

    Chapter  Google Scholar 

  28. Krentzn, K.F., Graupner, H., Meinel, C.: Countering three denial-of-sleep attacks on ContikiMAC. In: Proceedings of 2017 International Conference on Embedded Wireless Systems and Networks, pp. 108–119, Junction Publishing US (2017)

    Google Scholar 

  29. Uher, J., Mennecke, R.G., Farroha, B.S.: Denial of sleep attacks in Bluetooth low energy wireless sensor networks. In: Proceedings of the IEEE Military Communications Conference MILCOM, pp. 1231–1236, IEEE Baltimore, MD, USA (2016)

    Google Scholar 

  30. Qiu, L., Jiang, W., Zhang, W, Li, P.: Wireless injection attacks based on fake data injection in TinyOS. In: Proceedings – International Symposium on Parallel Architectures, Algorithms and Programming, vols. 2016-Januaary, pp. 236–242, PAAP, Nainjing, China (2016)

    Google Scholar 

  31. Krentz, K.F., Graupner, H.: Denial-of-sleep-resilient session key establishment for IEEE 802.15.4 security: from adaptive to responsive. In: Proceedings of 2018 International Conference on Embedded Wireless Systems and Networks, pp. 25–36, EWSN, Madrid, Spain (2018)

    Google Scholar 

  32. Pawar, P., Nielsen, R.H., Prasad, N.R., Prasad, R.: GSHMAC: green and secure hybrid medium access control for wireless sensor network. Wirel. Pers. Commun. 100(2), 267–281 (2018)

    Article  Google Scholar 

  33. Krentz, K.F., Meinel, C.: Denial-of-sleep defenses for IEEE 802.15.4 coordinated sampled listening (CSL). Comput. Netw. 148, 60–71 (2019). https://doi.org/10.1016/j.comnet.2018.10.021

    Article  Google Scholar 

  34. Osanaiye, O.A., Alfa, A.S., Hancke, G.P.: Denial of service defence for resource availability in wireless sensor networks. IEEE Access. 6, 6975–7004. IEEE (2018)

    Google Scholar 

  35. Fotohi, R., Firoozi Bari, S.: A novel countermeasure technique to protect WSN against denial-of-sleep attacks using firefly and Hopfield neural network (HNN) algorithms. J. Supercomput. 76, 6860–6886 (2020). https://doi.org/10.1007/s11227-019-03131-x

    Article  Google Scholar 

  36. Desnitsky, V.: Approach to machine learning based attack detection in wireless sensor networks. 2020 International Russian Automation Conference (RusAutoCon), pp. 767–771, IEEE Sochi, Russia, (2020).https://doi.org/10.1109/RusAutoCon49822.2020.9208085

  37. Oracle Labs: Sun SPOT Programmers Manual. Available at: https://bit.ly/2DlFFiy. Last accessed 1 Jan 2019 (2011)

  38. Isaiadis, S., Getov, V.: Integrating mobile devices into the grid: design considerations and evaluation. In: Proceedings of Euro-Par 2005 Conference, LNCS, vol. 3648, pp. 1080–1088. Springer (2005)

    Google Scholar 

Download references

Acknowledgments

This work was partially supported via a doctoral research scholarship grant by the University of Westminster.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ekereuke Udoh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Udoh, E., Getov, V. (2022). Layered-MAC: An Energy-Protected and Efficient Protocol for Wireless Sensor Networks. In: Tang, D., Zhong, J., Zhou, D. (eds) Mobile Wireless Middleware, Operating Systems and Applications. EAI/Springer Innovations in Communication and Computing. Springer, Cham. https://doi.org/10.1007/978-3-030-98671-1_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-98671-1_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-98670-4

  • Online ISBN: 978-3-030-98671-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics