Advertisement

Detecting Disruptive Routers in Wireless Sensor Networks

  • Steven Cheung
  • Bruno Dutertre
  • Ulf Lindqvist
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4104)

Abstract

In wireless sensor networks, sensor nodes are typically resource constrained and used as routers to forward packets for other nodes. Compromised sensor nodes may be able to cause network-wide denial of service by dropping or corrupting packets. This paper presents a novel, lightweight approach for detecting disruptive routers that drop or corrupt packets.

Keywords

Denial of service intrusion detection routing security sensor networks 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Bradley, K.A., Cheung, S., Puketza, N., Mukherjee, B., Olsson, R.A.: Detecting disruptive routers: A distributed network monitoring approach. IEEE Network (September/October 1998)Google Scholar
  2. 2.
    Cheung, S., Levitt, K.N.: Protecting routing infrastructures from denial of service using cooperative intrusion detection. In: Proceedings of the New Security Paradigms Workshop (September 23-26, 1997)Google Scholar
  3. 3.
    Freund, J.E., Walpole, R.E.: Mathematical Statistics. Prentice-Hall, Englewood Cliffs (1987)zbMATHGoogle Scholar
  4. 4.
    Ganesan, D., Govindan, R., Shenker, S., Estrin, D.: Highly-resilient, energy-efficient multipath routing in wireless sensor networks. ACM Mobile Computing and Communication Review (MC2R) 1(2) (2002)Google Scholar
  5. 5.
    Huang, Q., Zhang, Y.: Radial coordination for convergecast in wireless sensor networks. In: Proceedings of the IEEE EmNetS-I (November 2004)Google Scholar
  6. 6.
    Huang, Y., Lee, W.: A cooperative intrusion detection system for ad hoc networks. In: Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2003), Fairfax, Virginia, pp. 135–147 (October 2003)Google Scholar
  7. 7.
    Karlof, C., Li, Y., Polastre, J.: ARRIVE: Algorithm for robust routing in volatile environments. Technical Report UCB//CSD-03-1233, Department of EECS, University of California at Berkeley (March 2003)Google Scholar
  8. 8.
    Karlof, C., Sastry, N., Wagner, D.: TinySec: A link layer security architecture for wireless sensor networks. In: Proceedings of the Second ACM Conference on Embedded Networked Sensor Systems (SenSys 2004) (November 2004)Google Scholar
  9. 9.
    Mahajan, R., Rodrig, M., Wetherall, D., Zahorjan, J.: Sustaining cooperation in multi-hop wireless networks. In: Proceedings of the Second Symposium on Networked Systems Design and Implementation (NSDI), Boston, MA (May 2-4, 2005)Google Scholar
  10. 10.
    Marti, S., Giuli, T., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MOBICOM 2000), Boston, MA, pp. 255–265 (August 2000)Google Scholar
  11. 11.
    McCune, J.M., Shi, E., Perrig, A., Reiter, M.K.: Detection of denial-of-message attacks on sensor network broadcasts. In: Proceedings of the 2005 IEEE Symposium on Security and Privacy, Oakland, California, May 8–11, pp. 64–78 (2005)Google Scholar
  12. 12.
    Padmanabhan, V.N., Simon, D.R.: Secure traceroute to detect faulty or malicious routing. In: ACM SIGCOMM Workshop on Hop Topic in Networks (HotNets-I), Princeton, NJ (October 2002)Google Scholar
  13. 13.
    Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.: SPINS: Security protocols for sensor networks. In: Proceedings of the 7th Annual International Conference on Mobile Computing and Networks (MOBICOM 2001), Rome, Italy, pp. 189–199 (July 2001)Google Scholar
  14. 14.
    Shang, Y., Fromherz, M.P., Zhang, Y., Crawford, L.S.: Constraint-based routing for ad-hoc networks. In: Proceedings of International Conference on Information Technology: Research and Education (ITRE 2003), Newark, NJ, August 10-13, pp. 306–310 (2003)Google Scholar
  15. 15.
    Wood, A.D., Stankovic, J.A.: Denial of service in sensor networks. IEEE Computer 35(10), 54–62 (2002)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Steven Cheung
    • 1
  • Bruno Dutertre
    • 1
  • Ulf Lindqvist
    • 1
  1. 1.Computer Science LaboratorySRI InternationalMenlo Park

Personalised recommendations