An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks

被引:55
作者
Ngai, Edith C. H.
Liu, Jiangchuan [1 ]
Lyu, Michael R.
机构
[1] Chinese Univ Hong Kong, Dept Comp Sci & Engn, Hong Kong, Peoples R China
[2] Simon Fraser Univ, Sch Comp Sci, Burnaby, BC V5A 1S6, Canada
基金
加拿大创新基金会; 加拿大自然科学与工程研究理事会;
关键词
wireless sensor network; sinkhole attack; intruder detection; intruder identification;
D O I
10.1016/j.comcom.2007.04.025
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In a wireless sensor network, multiple nodes would send sensor readings to a base station for further processing. It is known that such a many-to-one communication is highly vulnerable to a sinkhole attack, where an intruder attracts surrounding nodes with unfaithful 14 routing information, and then performs selective forwarding or alters the data passing through it. A sinkhole attack forms a serious threat to sensor networks, particularly considering that the sensor nodes are often deployed in open areas and of weak computation and battery power. In this paper, we present a novel algorithm for detecting the intruder in a sinkhole attack. The algorithm first finds a list of suspected nodes through checking data consistency, and then effectively identifies the intruder in the list through analyzing the network flow information. The algorithm is also robust to deal with multiple malicious nodes that cooperatively hide the real intruder. We have evaluated the performance of the proposed algorithm through both numerical analysis and simulations, which confirmed the effectiveness and accuracy of the algorithm. Our results also suggest that its communication and computation overheads are reasonably low for wireless sensor networks. (C) 2007 Elsevier B.V. All rights reserved.
引用
收藏
页码:2353 / 2364
页数:12
相关论文
共 36 条
[1]  
[Anonymous], P ACM MOBIHOC LONG B
[2]  
[Anonymous], 2004, MOBICOM 04
[3]  
[Anonymous], 2004, Proc. of the 2nd ACM workshop on Security of ad hoc and sensor networks-SASN '04
[4]  
Baldi P, 2004, IEEE SENSOR NETWORK
[5]  
Bellare M, 1996, LNCS, V1109, P1
[6]  
Braginsky David., 2002, PROC 1 ACM INT WORKS, P22, DOI DOI 10.1145/570738.570742
[7]  
*CROSSB TECHNO INC, 2005, 7430002106
[8]   Sinkhole intrusion indicators in DSR MANETs [J].
Culpepper, BJ ;
Tseng, HC .
FIRST INTERNATIONAL CONFERENCE ON BROADBAND NETWORKS, PROCEEDINGS, 2004, :681-688
[9]  
Da Silva APR., 2005, P 1 ACM INT WORKSH Q, P16, DOI DOI 10.1145/1089761.1089765
[10]   Key pre-distribution in wireless sensor networks using multivariate polynomials [J].
Delgosha, F ;
Fekri, F .
2005 SECOND ANNUAL IEEE COMMUNICATIONS SOCIETY CONFERENCE ON SENSOR AND AD HOC COMMUNICATIONS AND NETWORKS, 2005, :118-129