Exploiting routing tree construction in CTP

Islam Hegazy; Reihaneh Safavi-Naini; Carey Williamson;

Abstract


Sensor nodes in a Wireless Sensor Network (WSN) are scattered in an environment to collect data. These nodes are limited in resources and cannot process the collected data or store it for long periods of time. Thus, the sensor nodes rely on routing protocols to relay the collected data wirelessly to a central controller for analysis and storage. However, the routing protocols are not immune against malicious nodes because they sacrifice the security aspect to meet the limited resources of the sensor nodes. In this paper, we demonstrate how a malicious node can exploit the computation of link qualities in the Collection Tree routing Protocol (CTP) to disrupt the construction of routing trees. We propose a lightweight detection system to detect this malicious node. The proposed detection system is implemented and evaluated using the network simulator ns-2. The simulation results show that the detection system provides a robust detection. © 2012 Springer-Verlag Berlin Heidelberg.


Other data

Title Exploiting routing tree construction in CTP
Authors Islam Hegazy ; Reihaneh Safavi-Naini ; Carey Williamson 
Issue Date Aug-2011
Publisher Springer
Journal Lecture Notes in Computer Science 
Volume 7115
DOI 10.1007/978-3-642-27890-7_21
Scopus ID 2-s2.0-84858052539

Recommend this item

Similar Items from Core Recommender Database

Google ScholarTM

Check

Citations 1 in scopus
views 9 in Shams Scholar


Items in Ain Shams Scholar are protected by copyright, with all rights reserved, unless otherwise indicated.