Exploiting routing tree construction in CTP

Islam Hegazy ; Reihaneh Safavi-Naini ; Carey Williamson 


Abstract


Sensor nodes in a Wireless Sensor Network (WSN) are scattered in an environment to collect data. These nodes are limited in resources and cannot process the collected data or store it for long periods of time. Thus, the sensor nodes rely on routing protocols to relay the collected data wirelessly to a central controller for analysis and storage. However, the routing protocols are not immune against malicious nodes because they sacrifice the security aspect to meet the limited resources of the sensor nodes. In this paper, we demonstrate how a malicious node can exploit the computation of link qualities in the Collection Tree routing Protocol (CTP) to disrupt the construction of routing trees. We propose a lightweight detection system to detect this malicious node. The proposed detection system is implemented and evaluated using the network simulator ns-2. The simulation results show that the detection system provides a robust detection. © 2012 Springer-Verlag Berlin Heidelberg.


Other data

Issue Date 15-Mar-2012
Journal Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 
URI http://research.asu.edu.eg/123456789/572
DOI 10.1007/978-3-642-27890-7_21


Recommend this item

CORE Recommender
3
Views


Items in Ain Shams Scholar are protected by copyright, with all rights reserved, unless otherwise indicated.