MCC: Mitigating Colluding Collision Attacks in Wireless Sensor Networks

被引:0
|
作者
Khalil, Issa [1 ]
机构
[1] United Arab Emirates Univ, Coll Informat Technol, Al Ain, U Arab Emirates
关键词
Packet dropping; multi-hop wireless networks; local monitoring; malicious node; colluding collision;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Stealthy packet dropping in multihop wireless sensor networks can be realized by the colluding collision attack. Colluding collision attack disrupts a packet from reaching its destination by malicious collusion at intermediate nodes. Moreover, the malicious nodes give the impression to their neighbors that they performed the legitimate forwarding action. Therefore, a legitimate node comes under suspicion. We provide a protocol called MCC to remedy the attack. MCC builds forwarding counters at each neighbor of the suspicious node and collaboratively compare the values of these counters to detect any discrepancy that could be caused by malicious packet dropping. We show through analysis and simulation that the basic local monitoring (BLM) fails to efficiently mitigate stealthy colluding collision attacks while MCC successfully mitigates them.
引用
收藏
页数:5
相关论文
共 50 条
  • [41] Secure routing in wireless sensor networks: Attacks and countermeasures
    Karlof, C
    Wagner, D
    PROCEEDINGS OF THE FIRST IEEE INTERNATIONAL WORKSHOP ON SENSOR NETWORK PROTOCOLS AND APPLICATIONS, 2003, : 113 - 127
  • [42] Security in wireless sensor networks: a survey of attacks and countermeasures
    Martins, David
    Guyennet, Herve
    INTERNATIONAL JOURNAL OF SPACE-BASED AND SITUATED COMPUTING, 2011, 1 (1-3) : 151 - 162
  • [43] Dishonest Recommendation Attacks in Wireless Sensor Networks: A Survey
    Khedim, Farah
    Labraoui, Nabila
    Lehsaini, Mohamed
    2015 12TH IEEE INTERNATIONAL CONFERENCE ON PROGRAMMING AND SYSTEMS (ISPS), 2015, : 41 - 50
  • [44] Digital Investigation of Wormhole Attacks in Wireless Sensor Networks
    Triki, Bayrem
    Rekhis, Slim
    Boudriga, Noureddine
    2009 8TH IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS, 2009, : 179 - 186
  • [45] Safety in Wireless Sensor Networks: Types of Attacks and Solutions
    Kaschel, Hector
    Mardones, Jose
    Quezada, Gustavo
    STUDIES IN INFORMATICS AND CONTROL, 2013, 22 (03): : 323 - 329
  • [46] Variants of Wormhole Attacks and Their Impact in Wireless Sensor Networks
    Patel, Manish
    Aggarwal, Akshai
    Chaubey, Nirbhay
    PROGRESS IN COMPUTING, ANALYTICS AND NETWORKING, ICCAN 2017, 2018, 710 : 637 - 642
  • [47] Intrusion detection of sinkhole attacks in wireless sensor networks
    Krontiris, Ioannis
    Dimitriou, Tassos
    Giannetsos, Thanassis
    Mpasoukos, Marios
    ALGORITHMIC ASPECTS OF WIRELESS SENSOR NETWORKS, 2008, 4837 : 150 - 161
  • [48] Patrol Detection for Replica Attacks on Wireless Sensor Networks
    Wang, Liang-Min
    Shi, Yang
    SENSORS, 2011, 11 (03) : 2496 - 2504
  • [49] On Eavesdropping Attacks in Wireless Sensor Networks with Directional Antennas
    Dai, Hong-Ning
    Wang, Qiu
    Li, Dong
    Wong, Raymond Chi-Wing
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
  • [50] Security Issues in Wireless Sensor Networks: Attacks and Countermeasures
    Chelli, Kahina
    WORLD CONGRESS ON ENGINEERING, WCE 2015, VOL I, 2015, : 519 - 524