Securing Wireless Sensor Networks against Broadcast Attacks

被引:5
|
作者
Haghighi, Mohammad Sayad [1 ]
Mohamedpour, Kamal [1 ]
机构
[1] KN Toosi Univ Technol, Dept Elect Engn, Tehran, Iran
关键词
Sensor Networks; Broadcast Attacks; Medium Access Control Protocols;
D O I
10.1109/ISTEL.2008.4651270
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Wireless sensor networks, applied for monitoring physical environments, have recently emerged as an important application of the ad hoc networks paradigm. Low processing power and wireless connectivity make such networks vulnerable to various types of attacks. The dense deployment of sensors along with the protocol deficiencies, make broadcast attacks feasible. The current solutions for these types of attacks are mainly cryptographic and suffer from either heavy computational complexity or lack of mobility support. In this paper we propose an energy efficient method to fortify sensor networks against broadcast attacks using some key features of such networks like small transmission range and low reception-sensitivity. The main idea relies on modifying the reply timings of current MAC sub-layer protocols and embedding a two or three-way handshake protocol in broadcast scenarios so that the adversary receives a negative feedback from the network in response to his greediness in infecting nodes. The simulations confirm the efficiency of this countermeasure applied to the IEEE 802.15.4.
引用
收藏
页码:49 / 54
页数:6
相关论文
共 50 条
  • [1] Securing Wireless Sensor Networks against Broadcast Service Attacks
    Choi, Seonho
    Eom, Hyeonsang
    [J]. IMCIC 2010: INTERNATIONAL MULTI-CONFERENCE ON COMPLEXITY, INFORMATICS AND CYBERNETICS, VOL II, 2010, : 293 - 298
  • [2] Securing Broadcast Authentication in Wireless Sensor Networks Against DoS Attack
    Alghamdi, Ahmed
    Arozullah, Mohammed
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2015, 15 (04): : 8 - 18
  • [3] A Framework for Securing Mobile Wireless Sensor Networks against Physical Attacks
    Qabulio, Mumtaz
    Malkani, Yasir Arfat
    Keerio, Ayaz
    [J]. 2016 INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES (ICET), 2016,
  • [4] Mitigating DoS attacks against broadcast authentication in wireless sensor networks
    Ning, Peng
    Liu, An
    Du, Wenliang
    [J]. ACM TRANSACTIONS ON SENSOR NETWORKS, 2008, 4 (01)
  • [5] A New Protocol for Securing Wireless Sensor Networks Against Nodes Replication Attacks
    Bekara, Chakib
    Laurent-Maknavicius, Maryline
    [J]. THIRD IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS - WIMOB 2007, 2007,
  • [6] The MCD Protocol for Securing Wireless Sensor Networks against Nodes Replication Attacks
    Khedim, Farah
    Labraoui, Nabila
    [J]. 2014 INTERNATIONAL CONFERENCE ON ADVANCED NETWORKING DISTRIBUTED SYSTEMS AND APPLICATIONS (INDS 2014), 2014, : 58 - 63
  • [7] The MCD protocol for securing wireless sensor networks against nodes replication attacks
    20145200357829
    [J]. (1) Department of Electrical and Electronic Engineering, Laboratory STIC, University of Tlemcen, Tlemcen, Algeria, 1600, (Institute of Electrical and Electronics Engineers Inc., United States):
  • [8] Securing DV-Hop localization against wormhole attacks in wireless sensor networks
    Chen, Honglong
    Lou, Wei
    Wang, Zhi
    Wu, Junfeng
    Wang, Zhibo
    Xia, Aihua
    [J]. PERVASIVE AND MOBILE COMPUTING, 2015, 16 : 22 - 35
  • [9] Securing Underwater Sensor Networks Against Routing Attacks
    Dargahi, Tooska
    Javadi, Hamid H. S.
    Shafiei, Hosein
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (02) : 2585 - 2602
  • [10] Securing Underwater Sensor Networks Against Routing Attacks
    Tooska Dargahi
    Hamid H. S. Javadi
    Hosein Shafiei
    [J]. Wireless Personal Communications, 2017, 96 : 2585 - 2602