DICAS: Detection, diagnosis and isolation of control attacks in sensor networks

被引:24
作者
Khalil, I [1 ]
Bagchi, S [1 ]
Nina-Rotaru, C [1 ]
机构
[1] Purdue Univ, Sch Elect & Comp Engn, DCSL, W Lafayette, IN 47907 USA
来源
FIRST INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY FOR EMERGING AREAS IN COMMUNICATIONS NETWORKS, PROCEEDINGS | 2005年
关键词
sensor network security; neighbor monitoring; secure routing; node-disjoint paths; control attack;
D O I
10.1109/SECURECOMM.2005.17
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Sensor networks enable a wide range of applications in both military and civilian domains. However, the deployment scenarios, the functionality requirements, and the limited capabilities of these networks expose them to a wide-range of attacks against control traffic (such as wormholes, Sybil attacks, rushing attacks, etc). In this paper we propose a lightweight protocol called DICAS that mitigates these attacks by detecting, diagnosing, and isolating the malicious nodes. DICAS uses as a fundamental building block the ability of a node to oversee its neighboring nodes' communication. On top of DICAS, we build a secure routing protocol, LSR, which in addition supports multiple node-disjoint paths. We analyze the security guarantees of DICAS and use ns-2 simulations to show its effectiveness against three representative attacks. Overhead analysis is conducted to prove the lightweight nature of DICAS.
引用
收藏
页码:89 / 100
页数:12
相关论文
共 38 条
[1]  
[Anonymous], 1990, PROC 2 IEEE WORKSHOP
[2]   Performance analysis,of the IEEE 802.11 distributed coordination function [J].
Bianchi, G .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2000, 18 (03) :535-547
[3]  
BRAGINSKY D, WSNA 2002
[4]  
BUCHEGGER S, MOBIHOC 2002
[5]  
GANESAN D, 2001, MOBILE COMPUTING COM, V4
[6]  
HEINZELMAN WR, HICSS 2000, P3005
[7]  
HU L, NDSS 2004
[8]  
Hu Y., IEEE INFOCOM 2003
[9]   SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks [J].
Hu, YC ;
Johnson, DB ;
Perrig, A .
FOURTH IEEE WORKSHOP ON MOBILE COMPUTING SYSTEMS AND APPLICATIONS, PROCEEDINGS, 2002, :3-13
[10]  
HU YC, WISE 2003