One of the key features of a Wireless Sensor Network (WSN) device is its constrained resource availability and its security weakness. As a result, the research of the energy and security issues is crucial because of how much they influence WSN behavior. Traditional security procedures are not the best given the restricted resources of nodes, thus it is necessary to analyze new strategies in order to take this particular node attribute into consideration. In this study, a MAC layer impersonation attack is examined, and the performance of a network of four sensor nodes, a gateway, and a server is assessed using the LMAC and BMAC protocols in terms of the average energy used by each node in the WSN under consideration.
|