Towards securing MintRoute in wireless sensor networksIslam Hegazy ; Reihaneh Safavi-Naini ; Carey Williamson
AbstractIn a Wireless Sensor Network (WSN), the sensor nodes rely upon a multi-hop routing protocol to relay their data to the base station. However, most WSN routing protocols are vulnerable to attacks in which a malicious node can disrupt the routes, drop, modify, or divert data away from the base station. In this paper, we use the ns-2 network simulator to demonstrate the vulnerability of the MintRoute protocol to link quality attacks by a malicious node. We then propose a novel "sequence number gap trick" as a lightweight means to test for and detect the presence of a malicious attacker. The simulation results show that judicious use of the sequence number gap trick provides robust detection of malicious nodes, preserving the data delivery capabilities of the WSN. ©2010 IEEE.
|Issue Date||27-Aug-2010||Journal||2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks", WoWMoM 2010 - Digital Proceedings||URI||http://research.asu.edu.eg/123456789/573||DOI||http://api.elsevier.com/content/abstract/scopus_id/77955876015
Recommend this item
Items in Ain Shams Scholar are protected by copyright, with all rights reserved, unless otherwise indicated.