A survey: energy exhausting attacks in MAC protocols in WBANs

Minho Jo, Longzhe Han, Nguyen Duy Tan, Hoh Peter In

Research output: Contribution to journalArticlepeer-review

30 Citations (Scopus)

Abstract

Because the sensors of wireless body area networks (WBANs) have limited battery power, many studies have focused on energy efficient medium access control (MAC) protocols to extend the lifetime of the sensors. In addition, WBANs face energy-exhausting attacks, which force the sensors to consume battery power partially or thoroughly. These attacks occur mainly in the MAC layer and threaten severely the energy efficiency of MAC protocols in WBANs. Because the attacks are made abruptly and unexpectedly, the lives of human beings and the quality of health care services can be threatened. Therefore, the aim of this study was to identify the major types of energy exhausting attacks in MAC protocols in WBANs, and show how easily the attacks can cause energy exhaustion in different MAC protocols. This survey provides clues for future research into energy efficient MAC protocols in WBANs.

Original languageEnglish
Pages (from-to)153-164
Number of pages12
JournalTelecommunication Systems
Volume58
Issue number2
DOIs
Publication statusPublished - 2014 Feb

Bibliographical note

Funding Information:
This paper was supported in part by a National Research Foundation of Korea grant funded by the Korea government (MEST) (No. 2011-0009454), and by Seoul R&BD Program (WR080951), and by Next-Generation Information Computing Development Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education, Science and Technology (2012M3C4A7033345).

Funding Information:
This research was supported by a Korea University grant.

Publisher Copyright:
© 2014, Springer Science+Business Media New York.

Keywords

  • Energy efficient medium Access control protocol
  • Energy exhausting attacks
  • Wireless body area networks

ASJC Scopus subject areas

  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'A survey: energy exhausting attacks in MAC protocols in WBANs'. Together they form a unique fingerprint.

Cite this