MCC: Mitigating Colluding Collision Attacks in Wireless Sensor Networks

被引:0
|
作者
Khalil, Issa [1 ]
机构
[1] United Arab Emirates Univ, Coll Informat Technol, Al Ain, U Arab Emirates
关键词
Packet dropping; multi-hop wireless networks; local monitoring; malicious node; colluding collision;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Stealthy packet dropping in multihop wireless sensor networks can be realized by the colluding collision attack. Colluding collision attack disrupts a packet from reaching its destination by malicious collusion at intermediate nodes. Moreover, the malicious nodes give the impression to their neighbors that they performed the legitimate forwarding action. Therefore, a legitimate node comes under suspicion. We provide a protocol called MCC to remedy the attack. MCC builds forwarding counters at each neighbor of the suspicious node and collaboratively compare the values of these counters to detect any discrepancy that could be caused by malicious packet dropping. We show through analysis and simulation that the basic local monitoring (BLM) fails to efficiently mitigate stealthy colluding collision attacks while MCC successfully mitigates them.
引用
收藏
页数:5
相关论文
共 50 条
  • [21] Detection of masquerade attacks on wireless sensor networks
    Bhuse, Vijay
    Gupta, Ajay
    Al-Fuqaha, Ala
    2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, : 1142 - 1147
  • [22] Analysis of Wormhole Attacks in Wireless Sensor Networks
    Patel, Manish
    Aggarwal, Akshai
    Chaubey, Nirbhay
    RECENT FINDINGS IN INTELLIGENT COMPUTING TECHNIQUES, VOL 2, 2018, 708 : 33 - 42
  • [23] A Survey on Security Attacks in Wireless Sensor Networks
    Gaware, Atul
    Dhonde, S. B.
    PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 536 - 539
  • [24] Security Attacks in Wireless Sensor Networks: A Survey
    Patel, Manish M.
    Aggarwal, Akshai
    2013 INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND SIGNAL PROCESSING (ISSP), 2013, : 329 - 333
  • [25] A Comparison of Routing Attacks on Wireless Sensor Networks
    Mohammadi, Shahriar
    Atani, Reza Ebrahimi
    Jadidoleslamy, Hossein
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2011, 6 (03): : 195 - 215
  • [26] Sinkhole Attacks in Wireless Sensor Networks: A Survey
    Rehman, Aqeel-ur
    Rehman, Sadiq Ur
    Raheem, Haris
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 106 (04) : 2291 - 2313
  • [27] Prevention of Wormhole Attacks in Wireless Sensor Networks
    Aldhobaiban, Dema
    Elleithy, Khaled
    Almazaydeh, Laiali
    2014 2ND INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE, MODELLING AND SIMULATION, 2014, : 287 - 291
  • [28] Sinkhole Attacks in Wireless Sensor Networks: A Survey
    Aqeel-ur Rehman
    Sadiq Ur Rehman
    Haris Raheem
    Wireless Personal Communications, 2019, 106 : 2291 - 2313
  • [29] Collision Reduction for Heterogeneous Wireless Sensor Networks
    Kim, Dongsoo. S.
    Kanury, Sree R.
    12TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: ICT FOR GREEN GROWTH AND SUSTAINABLE DEVELOPMENT, VOLS 1 AND 2, 2010, : 464 - 469
  • [30] Mitigating Congestion and Improving the Performance of Wireless Sensor Networks
    Barath, S. Raj
    Vijila, C. Kezi Selva
    Prakash, A. Jaya
    SIGNAL PROCESSING, IMAGE PROCESSING AND PATTERN RECOGNITION, 2011, 260 : 336 - +