{"title":"医用无线传感器网络:选择性转发攻击防御","authors":"Avijit Mathur, T. Newe","doi":"10.1109/ICSENST.2015.7438364","DOIUrl":null,"url":null,"abstract":"The requirements of a Medical Wireless Sensor Networks (MWSN) may vary compared to other networks. The variations could be at different levels i.e. network level, clustering level or security level. This paper looks at the necessary requirements, with particular focus on clustering and routing. It includes an implementation of a MWSN in Contiki operating system using Tmote Sky and openmote technologies. This implementation incorporates a mechanism for the election of a cluster head, and the case of a modified secure routing algorithm. The results are provided with simulation-based, and real world measurements. The paper presents single and collaborative selective forwarding detection and correction with an accuracy check. Additionally, a solution to the problem of malicious nodes dropping control messages has been provided. The uniqueness of the paper resides in the system's capability in detecting and correcting both single and collaborative selective forwarding attacks with 93% and 86% accuracy respectively.","PeriodicalId":375376,"journal":{"name":"2015 9th International Conference on Sensing Technology (ICST)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Medical WSN: Defense for selective forwarding attack\",\"authors\":\"Avijit Mathur, T. Newe\",\"doi\":\"10.1109/ICSENST.2015.7438364\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The requirements of a Medical Wireless Sensor Networks (MWSN) may vary compared to other networks. The variations could be at different levels i.e. network level, clustering level or security level. This paper looks at the necessary requirements, with particular focus on clustering and routing. It includes an implementation of a MWSN in Contiki operating system using Tmote Sky and openmote technologies. This implementation incorporates a mechanism for the election of a cluster head, and the case of a modified secure routing algorithm. The results are provided with simulation-based, and real world measurements. The paper presents single and collaborative selective forwarding detection and correction with an accuracy check. Additionally, a solution to the problem of malicious nodes dropping control messages has been provided. The uniqueness of the paper resides in the system's capability in detecting and correcting both single and collaborative selective forwarding attacks with 93% and 86% accuracy respectively.\",\"PeriodicalId\":375376,\"journal\":{\"name\":\"2015 9th International Conference on Sensing Technology (ICST)\",\"volume\":\"15 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 9th International Conference on Sensing Technology (ICST)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSENST.2015.7438364\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 9th International Conference on Sensing Technology (ICST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSENST.2015.7438364","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Medical WSN: Defense for selective forwarding attack
The requirements of a Medical Wireless Sensor Networks (MWSN) may vary compared to other networks. The variations could be at different levels i.e. network level, clustering level or security level. This paper looks at the necessary requirements, with particular focus on clustering and routing. It includes an implementation of a MWSN in Contiki operating system using Tmote Sky and openmote technologies. This implementation incorporates a mechanism for the election of a cluster head, and the case of a modified secure routing algorithm. The results are provided with simulation-based, and real world measurements. The paper presents single and collaborative selective forwarding detection and correction with an accuracy check. Additionally, a solution to the problem of malicious nodes dropping control messages has been provided. The uniqueness of the paper resides in the system's capability in detecting and correcting both single and collaborative selective forwarding attacks with 93% and 86% accuracy respectively.