Abstract

본 T-MAC 프로토콜은 WSN을 위해 설계된 잘 알려진 MAC 프로토콜이다. 본 논문에서 우리는 T-MAC 보안 취약성을 살펴보고 DoS 취약성과 재연공격에 대한 취약성과 관련하여, T-MAC 각 단계별 소모하는 전력을 분석하였다. 분석된 결과로부터 일반적인 T-MAC 통신을 위한 신뢰성, 효율성, 보안을 제공하는 전력에 효율적인 인증기법의 필요성을 고려하였다. 이 연구는 T-MAC 통신에 전력 소비 및 DoS 취약성 사례 연구에 관한 것이다. Time out-medium access control (T-MAC) protocol is one of the well-known MAC protocols designed for wireless sensor networks (WSN), and is proposed to enhance the poor performance of the S-MAC protocol. In this paper, we are reviewed about security vulnerability in T-MAC, and analyzed the power which is consumed at each stage of T-MAC protocol according to vulnerability of denial of service (DoS) and replay problem. From our analytical results, it can be considered the need of power efficient authentication scheme which provides the reliability, efficiency, and security for a general T-MAC communication. This is the case study of possible DoS vulnerability and its power consumption in T-MAC.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.