Defense mechanism against selective forwarding attack in wireless sensor networks

P. C. Geethu, M. Rameez
{"title":"Defense mechanism against selective forwarding attack in wireless sensor networks","authors":"P. C. Geethu, M. Rameez","doi":"10.1109/ICCCNT.2013.6726833","DOIUrl":null,"url":null,"abstract":"Recent advances in electronics and wireless communication technologies have enabled the development of large-scale wireless sensor networks that consist of many low-power, low-cost, and small-size sensor nodes. Wireless Sensor Network (WSN) is emerging as a prevailing technology due to its wide range of applications in military and civilian domains. These networks are easily prone to security attacks, since once deployed these networks are unattended and unprotected. Some of the inherent features like limited battery and low memory make sensor networks incompatible with conventional security solutions, which need complex computations and high memory. Selective forwarding attack is one of the harmful attacks against sensor networks and can affect the whole sensor network communication. In such an attack compromised nodes drop packets selectively, which may deteriorate the network efficiency. In this paper multipath routing scheme is used as defense mechanism against selective forwarding attack. When a node detects packet drop during the routing, it will resend the packet through alternate route. Due to the resending mechanism reliability of the routing scheme is improved.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"23 1","pages":"1-4"},"PeriodicalIF":0.0000,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"19","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCNT.2013.6726833","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 19

Abstract

Recent advances in electronics and wireless communication technologies have enabled the development of large-scale wireless sensor networks that consist of many low-power, low-cost, and small-size sensor nodes. Wireless Sensor Network (WSN) is emerging as a prevailing technology due to its wide range of applications in military and civilian domains. These networks are easily prone to security attacks, since once deployed these networks are unattended and unprotected. Some of the inherent features like limited battery and low memory make sensor networks incompatible with conventional security solutions, which need complex computations and high memory. Selective forwarding attack is one of the harmful attacks against sensor networks and can affect the whole sensor network communication. In such an attack compromised nodes drop packets selectively, which may deteriorate the network efficiency. In this paper multipath routing scheme is used as defense mechanism against selective forwarding attack. When a node detects packet drop during the routing, it will resend the packet through alternate route. Due to the resending mechanism reliability of the routing scheme is improved.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
无线传感器网络对选择性转发攻击的防御机制
电子和无线通信技术的最新进展使大规模无线传感器网络的发展成为可能,这些网络由许多低功耗、低成本和小尺寸的传感器节点组成。无线传感器网络(WSN)由于其在军事和民用领域的广泛应用,正成为一种新兴的主流技术。这些网络很容易受到安全攻击,因为一旦部署,这些网络就无人值守和不受保护。一些固有的特性,如有限的电池和低内存,使得传感器网络与传统的安全解决方案不兼容,传统的安全解决方案需要复杂的计算和高内存。选择性转发攻击是针对传感器网络的一种有害攻击,可以影响整个传感器网络的通信。在这种攻击中,被攻破的节点会选择性地丢弃报文,这可能会降低网络的效率。本文采用多路径路由方案作为选择性转发攻击的防御机制。当一个节点在路由过程中检测到丢包时,它将通过备用路由重新发送数据包。由于重发机制的存在,提高了路由方案的可靠性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
“Multi-tenant SaaS cloud” Reduced order linear functional observers for large scale linear discrete-time control systems Multi pattern matching technique on fragmented and out-of-order packet streams for intrusion detection system Detection and tracking of moving objects by fuzzy textures Evacuation map generation using maze routing
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1