Detecting Disruptive Routers in Wireless Sensor Networks
Conference paper
Abstract
In wireless sensor networks, sensor nodes are typically resource constrained and used as routers to forward packets for other nodes. Compromised sensor nodes may be able to cause network-wide denial of service by dropping or corrupting packets. This paper presents a novel, lightweight approach for detecting disruptive routers that drop or corrupt packets.
Keywords
Denial of service intrusion detection routing security sensor networksPreview
Unable to display preview. Download preview PDF.
References
- 1.Bradley, K.A., Cheung, S., Puketza, N., Mukherjee, B., Olsson, R.A.: Detecting disruptive routers: A distributed network monitoring approach. IEEE Network (September/October 1998)Google Scholar
- 2.Cheung, S., Levitt, K.N.: Protecting routing infrastructures from denial of service using cooperative intrusion detection. In: Proceedings of the New Security Paradigms Workshop (September 23-26, 1997)Google Scholar
- 3.Freund, J.E., Walpole, R.E.: Mathematical Statistics. Prentice-Hall, Englewood Cliffs (1987)zbMATHGoogle Scholar
- 4.Ganesan, D., Govindan, R., Shenker, S., Estrin, D.: Highly-resilient, energy-efficient multipath routing in wireless sensor networks. ACM Mobile Computing and Communication Review (MC2R) 1(2) (2002)Google Scholar
- 5.Huang, Q., Zhang, Y.: Radial coordination for convergecast in wireless sensor networks. In: Proceedings of the IEEE EmNetS-I (November 2004)Google Scholar
- 6.Huang, Y., Lee, W.: A cooperative intrusion detection system for ad hoc networks. In: Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2003), Fairfax, Virginia, pp. 135–147 (October 2003)Google Scholar
- 7.Karlof, C., Li, Y., Polastre, J.: ARRIVE: Algorithm for robust routing in volatile environments. Technical Report UCB//CSD-03-1233, Department of EECS, University of California at Berkeley (March 2003)Google Scholar
- 8.Karlof, C., Sastry, N., Wagner, D.: TinySec: A link layer security architecture for wireless sensor networks. In: Proceedings of the Second ACM Conference on Embedded Networked Sensor Systems (SenSys 2004) (November 2004)Google Scholar
- 9.Mahajan, R., Rodrig, M., Wetherall, D., Zahorjan, J.: Sustaining cooperation in multi-hop wireless networks. In: Proceedings of the Second Symposium on Networked Systems Design and Implementation (NSDI), Boston, MA (May 2-4, 2005)Google Scholar
- 10.Marti, S., Giuli, T., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MOBICOM 2000), Boston, MA, pp. 255–265 (August 2000)Google Scholar
- 11.McCune, J.M., Shi, E., Perrig, A., Reiter, M.K.: Detection of denial-of-message attacks on sensor network broadcasts. In: Proceedings of the 2005 IEEE Symposium on Security and Privacy, Oakland, California, May 8–11, pp. 64–78 (2005)Google Scholar
- 12.Padmanabhan, V.N., Simon, D.R.: Secure traceroute to detect faulty or malicious routing. In: ACM SIGCOMM Workshop on Hop Topic in Networks (HotNets-I), Princeton, NJ (October 2002)Google Scholar
- 13.Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.: SPINS: Security protocols for sensor networks. In: Proceedings of the 7th Annual International Conference on Mobile Computing and Networks (MOBICOM 2001), Rome, Italy, pp. 189–199 (July 2001)Google Scholar
- 14.Shang, Y., Fromherz, M.P., Zhang, Y., Crawford, L.S.: Constraint-based routing for ad-hoc networks. In: Proceedings of International Conference on Information Technology: Research and Education (ITRE 2003), Newark, NJ, August 10-13, pp. 306–310 (2003)Google Scholar
- 15.Wood, A.D., Stankovic, J.A.: Denial of service in sensor networks. IEEE Computer 35(10), 54–62 (2002)Google Scholar
Copyright information
© Springer-Verlag Berlin Heidelberg 2006