MCC: Mitigating Colluding Collision Attacks in Wireless Sensor Networks

被引:0
|
作者
Khalil, Issa [1 ]
机构
[1] United Arab Emirates Univ, Coll Informat Technol, Al Ain, U Arab Emirates
关键词
Packet dropping; multi-hop wireless networks; local monitoring; malicious node; colluding collision;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Stealthy packet dropping in multihop wireless sensor networks can be realized by the colluding collision attack. Colluding collision attack disrupts a packet from reaching its destination by malicious collusion at intermediate nodes. Moreover, the malicious nodes give the impression to their neighbors that they performed the legitimate forwarding action. Therefore, a legitimate node comes under suspicion. We provide a protocol called MCC to remedy the attack. MCC builds forwarding counters at each neighbor of the suspicious node and collaboratively compare the values of these counters to detect any discrepancy that could be caused by malicious packet dropping. We show through analysis and simulation that the basic local monitoring (BLM) fails to efficiently mitigate stealthy colluding collision attacks while MCC successfully mitigates them.
引用
收藏
页数:5
相关论文
共 50 条
  • [31] Mitigating False Blocking Problem in Wireless Sensor Networks
    Kheong, Chong Wai
    Drieberg, Micheal
    Jeoti, Varun
    2012 4TH INTERNATIONAL CONFERENCE ON INTELLIGENT AND ADVANCED SYSTEMS (ICIAS), VOLS 1-2, 2012, : 253 - 258
  • [32] Mitigating Anchor Misplacement Errors in Wireless Sensor Networks
    Al Mtawa, Yaser
    Nasser, Nidal
    Hassanein, Hossam S.
    2015 INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2015, : 569 - 575
  • [33] Mitigating Hotspot Issues in Heterogeneous Wireless Sensor Networks
    Khalaf, Osamah Ibrahim
    Romero, Carlos Andres Tavera
    Hassan, Shahzad
    Iqbal, Muhammad Taimoor
    JOURNAL OF SENSORS, 2022, 2022
  • [34] Mitigating denial of service attacks in fog-based wireless sensor networks using machine learning techniques
    Ademola P. Abidoye
    Ibidun C. Obagbuwa
    Nureni A. Azeez
    Journal of Data, Information and Management, 2023, 5 (4): : 207 - 225
  • [35] Dynamic properties of the multimalware attacks in wireless sensor networks: Fractional derivative analysis of wireless sensor networks
    Tahir, Hassan
    Din, Anwarud
    Shah, Kamal
    Aphane, Maggie
    Abdeljawad, Thabet
    OPEN PHYSICS, 2024, 22 (01):
  • [36] Colluding Eavesdroppers in Large Cooperative Wireless Networks
    Mirmohseni, Mahtab
    Papadimitratos, Panagiotis
    2014 IRAN WORKSHOP ON COMMUNICATION AND INFORMATION THEORY (IWCIT), 2014,
  • [37] Distributed Detection of Clone Attacks in Wireless Sensor Networks
    Conti, Mauro
    Di Pietro, Roberto
    Mancini, Luigi Vincenzo
    Mei, Alessandro
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2011, 8 (05) : 685 - 698
  • [38] An Effective Classification for DoS Attacks in Wireless Sensor Networks
    Thi-Thu-Huong Le
    Park, Taehwan
    Cho, Dongkeun
    Kim, Howon
    2018 TENTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN 2018), 2018, : 683 - 686
  • [39] Distributed Detection of Wormhole Attacks in Wireless Sensor Networks
    de Graaf, Rennie
    Hegazy, Islam
    Horton, Jeffrey
    Safavi-Naini, Reihaneh
    AD HOC NETWORKS, 2010, 28 : 208 - +
  • [40] DEFENDING WIRELESS SENSOR NETWORKS FROM JAMMING ATTACKS
    Mpitziopoulos, Aristides
    Gavalas, Damianos
    Pantziou, Grammati
    Konstantopoulos, Charalampos
    2007 IEEE 18TH INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, VOLS 1-9, 2007, : 81 - +