1. How to submit my research paper? What’s the process of publication of my paper?
The journal receives submitted manuscripts via email only. Please submit your research paper in .doc or .pdf format to the submission email: jetwi@etpub.com.
2.Can I submit an abstract?
The journal publishes full research papers. So only full paper submission should be considered for possible publication. Papers with insufficient content may be rejected as well, make sure your paper is sufficient enough to be published...[Read More]

A Survey on Prevention Approaches for Denial of Sleep Attacks in Wireless Networks

G. Mahalakshmi1 and P. Subathra2
1. Department of Information Technology, NPR College of Engineering and Technology, TamilNadu, India
2. Department of Computer Science and Engineering, Kamaraj College of Engineering and Technology, TamilNadu, India
Abstract—Wireless sensor network is vulnerable to various attacks due to the deployment in hostile environment. Among various types of security threats, low power sensor nodes are affected by the attacks that cause random drainage of the energy level of sensors. It leads to the death of nodes. The denial of sleep attack is the most dangerous type of attack in this category. Most of the existing approaches to detect denial of sleep attack involve lot of overhead, which lead to poor throughput. In this survey, different approaches for the detection and prevention of denial of sleep attacks in wireless sensor networks are described.

Index Terms—anomaly detection, denial of sleep attack, frequency hopping, sleep deprivation  

Cite: G. Mahalakshmi and P. Subathra, "A Survey on Prevention Approaches for Denial of Sleep Attacks in Wireless Networks," Journal of Emerging Technologies in Web Intelligence, Vol. 6, No. 1, pp. 106-110, February 2014. doi:10.4304/jetwi.6.1.106-110
Array
Copyright © 2013-2020 Journal of Emerging Technologies in Web Intelligence, All Rights Reserved
E-mail: jetwi@etpub.com