TY - GEN
T1 - CADE
T2 - 3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008
AU - Kim, Young Ki
AU - Lee, Hwaseong
AU - Cho, Kwantae
AU - Lee, Dong Hoon
PY - 2008
Y1 - 2008
N2 - Wireless sensor networks are networks consisting of nodes with sensors to monitor physical or environmental conditions. Since nodes in wireless sensor networks have limited transmission capabilities, packets are generally transmitted to the destination node through several immediate nodes. However, if a malicious node is present on a route through which packets are forwarded, attackers can deliver selective forwarding attacks by simply dropping packets. Selective forwarding attacks can be serious threats on many applications including networks for military surveillance and health-care monitoring. Previous countermeasures to selective forwarding attacks cannot identify malicious nodes or require time synchronization. In this paper, we present a detecting scheme which identifies malicious nodes delivering selective forwarding attacks without the need for time synchronization. Our scheme also provides security against sinkhole attacks where attackers try to attract more traffic to malicious nodes.
AB - Wireless sensor networks are networks consisting of nodes with sensors to monitor physical or environmental conditions. Since nodes in wireless sensor networks have limited transmission capabilities, packets are generally transmitted to the destination node through several immediate nodes. However, if a malicious node is present on a route through which packets are forwarded, attackers can deliver selective forwarding attacks by simply dropping packets. Selective forwarding attacks can be serious threats on many applications including networks for military surveillance and health-care monitoring. Previous countermeasures to selective forwarding attacks cannot identify malicious nodes or require time synchronization. In this paper, we present a detecting scheme which identifies malicious nodes delivering selective forwarding attacks without the need for time synchronization. Our scheme also provides security against sinkhole attacks where attackers try to attract more traffic to malicious nodes.
UR - http://www.scopus.com/inward/record.url?scp=57849148091&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=57849148091&partnerID=8YFLogxK
U2 - 10.1109/ICCIT.2008.271
DO - 10.1109/ICCIT.2008.271
M3 - Conference contribution
AN - SCOPUS:57849148091
SN - 9780769534077
T3 - Proceedings - 3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008
SP - 416
EP - 422
BT - Proceedings - 3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008
Y2 - 11 November 2008 through 13 November 2008
ER -