Towards securing MintRoute in wireless sensor networks

Islam Hegazy ; Reihaneh Safavi-Naini ; Carey Williamson 


Abstract


In a Wireless Sensor Network (WSN), the sensor nodes rely upon a multi-hop routing protocol to relay their data to the base station. However, most WSN routing protocols are vulnerable to attacks in which a malicious node can disrupt the routes, drop, modify, or divert data away from the base station. In this paper, we use the ns-2 network simulator to demonstrate the vulnerability of the MintRoute protocol to link quality attacks by a malicious node. We then propose a novel "sequence number gap trick" as a lightweight means to test for and detect the presence of a malicious attacker. The simulation results show that judicious use of the sequence number gap trick provides robust detection of malicious nodes, preserving the data delivery capabilities of the WSN. ©2010 IEEE.


Other data

Issue Date 27-Aug-2010
Journal 2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks", WoWMoM 2010 - Digital Proceedings 
URI http://research.asu.edu.eg/123456789/573
DOI http://api.elsevier.com/content/abstract/scopus_id/77955876015
10.1109/WOWMOM.2010.5535004


Recommend this item

CORE Recommender
11
Views


Items in Ain Shams Scholar are protected by copyright, with all rights reserved, unless otherwise indicated.