CADE

Cumulative acknowledgement based detection of selective forwarding attacks in wireless sensor networks*

Young Ki Kim, Hwaseong Lee, Kwantae Cho, Dong Hoon Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Abstract

Wireless sensor networks are networks consisting of nodes with sensors to monitor physical or environmental conditions. Since nodes in wireless sensor networks have limited transmission capabilities, packets are generally transmitted to the destination node through several immediate nodes. However, if a malicious node is present on a route through which packets are forwarded, attackers can deliver selective forwarding attacks by simply dropping packets. Selective forwarding attacks can be serious threats on many applications including networks for military surveillance and health-care monitoring. Previous countermeasures to selective forwarding attacks cannot identify malicious nodes or require time synchronization. In this paper, we present a detecting scheme which identifies malicious nodes delivering selective forwarding attacks without the need for time synchronization. Our scheme also provides security against sinkhole attacks where attackers try to attract more traffic to malicious nodes.

Original languageEnglish
Title of host publicationProceedings - 3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008
Pages416-422
Number of pages7
Volume2
DOIs
Publication statusPublished - 2008 Dec 29
Event3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008 - Busan, Korea, Republic of
Duration: 2008 Nov 112008 Nov 13

Other

Other3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008
CountryKorea, Republic of
CityBusan
Period08/11/1108/11/13

Fingerprint

Wireless sensor networks
Synchronization
Health care
Monitoring
Sensors

ASJC Scopus subject areas

  • Information Systems
  • Software

Cite this

Kim, Y. K., Lee, H., Cho, K., & Lee, D. H. (2008). CADE: Cumulative acknowledgement based detection of selective forwarding attacks in wireless sensor networks*. In Proceedings - 3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008 (Vol. 2, pp. 416-422). [4682277] https://doi.org/10.1109/ICCIT.2008.271

CADE : Cumulative acknowledgement based detection of selective forwarding attacks in wireless sensor networks*. / Kim, Young Ki; Lee, Hwaseong; Cho, Kwantae; Lee, Dong Hoon.

Proceedings - 3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008. Vol. 2 2008. p. 416-422 4682277.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Kim, YK, Lee, H, Cho, K & Lee, DH 2008, CADE: Cumulative acknowledgement based detection of selective forwarding attacks in wireless sensor networks*. in Proceedings - 3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008. vol. 2, 4682277, pp. 416-422, 3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008, Busan, Korea, Republic of, 08/11/11. https://doi.org/10.1109/ICCIT.2008.271
Kim YK, Lee H, Cho K, Lee DH. CADE: Cumulative acknowledgement based detection of selective forwarding attacks in wireless sensor networks*. In Proceedings - 3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008. Vol. 2. 2008. p. 416-422. 4682277 https://doi.org/10.1109/ICCIT.2008.271
Kim, Young Ki ; Lee, Hwaseong ; Cho, Kwantae ; Lee, Dong Hoon. / CADE : Cumulative acknowledgement based detection of selective forwarding attacks in wireless sensor networks*. Proceedings - 3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008. Vol. 2 2008. pp. 416-422
@inproceedings{fe9eb1c6ca6042a8a27434d3ddb63a72,
title = "CADE: Cumulative acknowledgement based detection of selective forwarding attacks in wireless sensor networks*",
abstract = "Wireless sensor networks are networks consisting of nodes with sensors to monitor physical or environmental conditions. Since nodes in wireless sensor networks have limited transmission capabilities, packets are generally transmitted to the destination node through several immediate nodes. However, if a malicious node is present on a route through which packets are forwarded, attackers can deliver selective forwarding attacks by simply dropping packets. Selective forwarding attacks can be serious threats on many applications including networks for military surveillance and health-care monitoring. Previous countermeasures to selective forwarding attacks cannot identify malicious nodes or require time synchronization. In this paper, we present a detecting scheme which identifies malicious nodes delivering selective forwarding attacks without the need for time synchronization. Our scheme also provides security against sinkhole attacks where attackers try to attract more traffic to malicious nodes.",
author = "Kim, {Young Ki} and Hwaseong Lee and Kwantae Cho and Lee, {Dong Hoon}",
year = "2008",
month = "12",
day = "29",
doi = "10.1109/ICCIT.2008.271",
language = "English",
isbn = "9780769534077",
volume = "2",
pages = "416--422",
booktitle = "Proceedings - 3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008",

}

TY - GEN

T1 - CADE

T2 - Cumulative acknowledgement based detection of selective forwarding attacks in wireless sensor networks*

AU - Kim, Young Ki

AU - Lee, Hwaseong

AU - Cho, Kwantae

AU - Lee, Dong Hoon

PY - 2008/12/29

Y1 - 2008/12/29

N2 - Wireless sensor networks are networks consisting of nodes with sensors to monitor physical or environmental conditions. Since nodes in wireless sensor networks have limited transmission capabilities, packets are generally transmitted to the destination node through several immediate nodes. However, if a malicious node is present on a route through which packets are forwarded, attackers can deliver selective forwarding attacks by simply dropping packets. Selective forwarding attacks can be serious threats on many applications including networks for military surveillance and health-care monitoring. Previous countermeasures to selective forwarding attacks cannot identify malicious nodes or require time synchronization. In this paper, we present a detecting scheme which identifies malicious nodes delivering selective forwarding attacks without the need for time synchronization. Our scheme also provides security against sinkhole attacks where attackers try to attract more traffic to malicious nodes.

AB - Wireless sensor networks are networks consisting of nodes with sensors to monitor physical or environmental conditions. Since nodes in wireless sensor networks have limited transmission capabilities, packets are generally transmitted to the destination node through several immediate nodes. However, if a malicious node is present on a route through which packets are forwarded, attackers can deliver selective forwarding attacks by simply dropping packets. Selective forwarding attacks can be serious threats on many applications including networks for military surveillance and health-care monitoring. Previous countermeasures to selective forwarding attacks cannot identify malicious nodes or require time synchronization. In this paper, we present a detecting scheme which identifies malicious nodes delivering selective forwarding attacks without the need for time synchronization. Our scheme also provides security against sinkhole attacks where attackers try to attract more traffic to malicious nodes.

UR - http://www.scopus.com/inward/record.url?scp=57849148091&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=57849148091&partnerID=8YFLogxK

U2 - 10.1109/ICCIT.2008.271

DO - 10.1109/ICCIT.2008.271

M3 - Conference contribution

SN - 9780769534077

VL - 2

SP - 416

EP - 422

BT - Proceedings - 3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008

ER -