Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Detecting Packet Droppers and Modifiers in Wireless Sensor Networks


Affiliations
1 Digital Communication Engineering
2 Dept. of Electronics and Communication Acharya Institute of Technology, Bangalore
     

   Subscribe/Renew Journal


Wireless sensor networks have a wide range of applications in military and civilian domains.Wireless sensor networks are prone to attacks as they are usually deployed in a hostile environment. Packet dropping and modification are the common attacks that can be launched by an adversary to disrupt communication. In this paper, a scheme is proposed to efficiently detect packet droppers and modifiers. The sensor nodes are secured using distributed key generation mechanism. Depending upon the packet dropping, nodes are categorized as bad nodes and suspiciously bad nodes. Simulation of the proposed scheme is done using NS2 and effectiveness of the scheme is verified.

Keywords

Sink, Attacks, Wireless Sensor Networks, Packets, Algorithm
Subscription Login to verify subscription
User
Notifications
Font Size


  • Chuang Wang, TaimingFeng, Jinsook Kim, Guiling Wang, and Wensheng Zhang, “Catching Packet droppers and modifiers in wireless sensor networks, ” IEEE transactions on parallel and distributed systems, vol. 23, no. 5, may 2012.
  • C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: attacks and countermeasures, ” in the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003.
  • V. Bhuse, A. Gupta, and L. Lilien, “Dpdsn: Detection of packet-dropping attacks for wireless sensor networks, ” in the Fourth Trusted Internet Workshop, 2005.
  • M.Kefayati, H. R.Rabiee, S. G. Miremadi, and A. Khonsari, “Misbehavior resilient multi-path data transmission in mobile ad-hoc networks, ” in ACM SASN, 2006.
  • R. Mavropodi, P. Kotzanikolaou, and C. Douligeris, “Secmr - a secure multipath routing protocol for ad hoc networks, ”Ad Hoc Networks, vol.5, no. 1, 2007.
  • H.Chan and A. Perrig, “Security and Privacy in Sensor Networks, ”IEEE Computer, October 2003.
  • S. Marti, T.J. Giuli, K. Lai, and M. Baker.“Mitigating routing misbehavior in mobile ad hoc networks”. In Proc. 6th Annual International Conference on Mobile Computing and Networking, pages 255–265, 2000
  • F. Ye, H. Luo, S. Lu, and L. Zhang, “Statistical En-route Filtering of Injected False Data in Sensor Networks, ” in IEEE INFOCOM, 2004.
  • J. Li, J. Mirkovic, and M. Wang. ”Save: Source Address Validity Enforcement Protocol”.In Proc. IEEE INFOCOM 2002.
  • S. Zhu, S. Setia, S. Jajodia, and P. Ning, “An Interleaved Hop-by-Hop Authentication Scheme for Filtering False Data in Sensor Networks, ” in IEEE S&P, 2004.
  • M. Just, E. Kranakis, and T. Wan, “Resisting malicious packet dropping in wireless ad hoc networks, ” in ADHOCNOW, 2003, vol. 2856.
  • R. Roman, J. Zhou, and J. Lopez, “Applying intrusion detection systems to wireless sensor networks, ” in IEEE CCNC, 2006.
  • F. Ye, H. Yang, and Z. Liu, “Catching Moles in Sensor Networks, ” in IEEE ICDCS, 2007.
  • Stephan Olariu, “Information assurance in wireless sensor networks”, Sensor network research group, Old Dominion University.
  • J. Zheng and Myung J. Lee (2006). A comprehensive performance study of IEEE 802.15.4 – Sensor Network Operations: Wiley Interscience. IEEE Press Chapter 4.218-237.

Abstract Views: 711

PDF Views: 0




  • Detecting Packet Droppers and Modifiers in Wireless Sensor Networks

Abstract Views: 711  |  PDF Views: 0

Authors

P. Raji
Digital Communication Engineering
A. Shobha Rani
Dept. of Electronics and Communication Acharya Institute of Technology, Bangalore

Abstract


Wireless sensor networks have a wide range of applications in military and civilian domains.Wireless sensor networks are prone to attacks as they are usually deployed in a hostile environment. Packet dropping and modification are the common attacks that can be launched by an adversary to disrupt communication. In this paper, a scheme is proposed to efficiently detect packet droppers and modifiers. The sensor nodes are secured using distributed key generation mechanism. Depending upon the packet dropping, nodes are categorized as bad nodes and suspiciously bad nodes. Simulation of the proposed scheme is done using NS2 and effectiveness of the scheme is verified.

Keywords


Sink, Attacks, Wireless Sensor Networks, Packets, Algorithm

References