A Power-Preserving Broadcast Protocol for WSNs With DoS Resistance

被引:0
|
作者
Ni, Chien-Chun [1 ]
Hsiang, Tien-Ruey [1 ]
Tygar, J. D. [2 ]
机构
[1] Natl Taiwan Univ Sci & Technol, Taipei 106, Taiwan
[2] Univ Calif Berkeley, Berkeley, CA 94720 USA
关键词
broadcasting; dominating set; sensor networks; routing protocols;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Broadcast presents a special challenge for Wireless Sensor Networks (WSNs). In some situation such as time synchronization or building routing path, broadcasting messages must be securely transmitted to all nodes, but this process is subject to attack by adversaries. For example, an adversary may try to waste the battery power of intermediate nodes by forcing a compromised node to repeatedly rebroadcast, thus causing a Denial-of-Service (DoS) attack. One way to solve this problem is use only part of the nodes in the network as the intermediate nodes, limiting the effects of the attack. In this paper, we propose a novel broadcast protocol: BrOadcast Power Preserving (BOPP). In BOPP, a packet reception reliability metric of each network component is discovered. This reliability score gives the packet reception rate of each communication edge in the network. With the scoring metric, BOPP can judge the network reliability from time to time and adapt the network to provide maximum reliability while minimizing the energy cost. This enables the network to resist DoS attacks.
引用
收藏
页码:777 / +
页数:3
相关论文
共 42 条
  • [21] Localized broadcast incremental power protocol for wireless ad hoc networks
    François Ingelrest
    David Simplot-Ryl
    Wireless Networks, 2008, 14 : 309 - 319
  • [22] Localized broadcast incremental power protocol for wireless ad hoc networks
    Ingelrest, Francois
    Simplot-Ryl, David
    WIRELESS NETWORKS, 2008, 14 (03) : 309 - 319
  • [23] Analysis and Comparison of the Network Security Protocol with DoS/DDoS Attack Resistance Performance
    Jiang, Linzhi
    Xu, Chunxiang
    Wang, Xiaofang
    Zhou, Yanghong
    2015 IEEE 17TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2015 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CYBERSPACE SAFETY AND SECURITY, AND 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (ICESS), 2015, : 1785 - 1790
  • [24] H2BSAP: A Hop-by-Hop Broadcast Source Authentication Protocol for WSN to mitigate DoS Attacks
    Bekara, Chakib
    Laurent-Maknavicius, Maryline
    Bekara, Kheira
    2008 11TH IEEE SINGAPORE INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS (ICCS), VOLS 1-3, 2008, : 1197 - 1203
  • [25] Pre-Authentication Filters: Providing DoS Resistance for Signature-Based Broadcast Authentication in Sensor Networks
    Dong, Qi
    Liu, Donggang
    Ning, Peng
    WISEC'08: PROCEEDINGS OF THE FIRST ACM CONFERENCE ON WIRELESS NETWORK SECURITY, 2008, : 2 - 12
  • [26] Power Allocation for Time Division Broadcast Protocol over Rayleigh Fading Channels
    Lim, Dong-Woo
    Chun, Chang-Jae
    Lee, Jae-Hwan
    Kim, Hyung-Myung
    2013 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2013,
  • [27] An Optimal LEACH-Based Routing Protocol to Balance the Power Consumption and Extending the Lifetime of the WSNs
    Tamandani, Yahya Kord
    Bokhari, Mohammad Ubaidullah
    Makki, Qahtan
    PROCEEDINGS OF FIRST INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY FOR INTELLIGENT SYSTEMS: VOL 2, 2016, 51 : 239 - 248
  • [28] An Improved Digital Signature Protocol to Multi-User Broadcast Authentication Based on Elliptic Curve Cryptography in Wireless Sensor Networks (WSNs)
    Bashirpour, Hamed
    Bashirpour, Saman
    Shamshirband, Shahaboddin
    Chronopoulos, Anthony T.
    MATHEMATICAL AND COMPUTATIONAL APPLICATIONS, 2018, 23 (02)
  • [29] X-10 broadcast power-control protocol gets major overhaul
    Wong, William
    Electronic Design, 2004, 52 (16)
  • [30] Taking Advantage of Overhearing in Low Power Listening WSNs: A Performance Analysis of the LWT-MAC Protocol
    Cristina Cano
    Boris Bellalta
    Anna Sfairopoulou
    Miquel Oliver
    Jaume Barceló
    Mobile Networks and Applications, 2011, 16 : 613 - 628