Hierarchical traceback in wireless sensor networks

被引:0
|
作者
Yang, Feng [1 ]
Zhou, Xuehai [1 ]
Zhang, Shuguang [1 ]
机构
[1] Univ Sci & Technol China, Dept Comp Sci, Hefei 230026, Peoples R China
来源
2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31 | 2008年
关键词
sensor networks; security; distributed traceback;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
False Data Injection(FDI) is great threat to wireless sensor networks. Public Key Cryptography (PKC) is desirable to locate source nodes that are launching false data injection attacks. Because PKC is expensive to sensor nodes, they could only afford a small number of these operations. In this paper, a hierarchical traceback mechanism is proposed. A sensor field is divided into some levels, and in every step of traceback process the source node is located in a smaller level. The performance of the mechanism is thoroughly evaluated, and only O(lgn) packets would be verified in order to locate a source node.
引用
收藏
页码:3840 / 3843
页数:4
相关论文
共 50 条
  • [1] Hop-by-Hop Traceback in Wireless Sensor Networks
    Siddiqui, Muhammad Shoaib
    Amin, Syed Obaid
    Hong, Choong Seon
    IEEE COMMUNICATIONS LETTERS, 2012, 16 (02) : 242 - 245
  • [2] Contact-based Traceback in Wireless Sensor Networks
    Zhang, Qiyuan
    Zhou, Xuehai
    Yang, Feng
    Li, Xi
    2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 2487 - 2490
  • [3] Adaptive Probability Marking Traceback Scheme to Enhance Security in Wireless Sensor Networks
    Liu, Anfeng
    XiaoLiu
    Long, Jun
    2015 10TH INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATIONS AND SIGNAL PROCESSING (ICICS), 2015,
  • [4] User Authentication for Hierarchical Wireless Sensor Networks
    Park, Minsu
    Kim, Hyunsung
    Lee, Sung-Woon
    2013 14TH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD 2013), 2013, : 203 - 208
  • [5] On the performance of probabilistic packet marking for traceback in sensor networks
    Yang, Feng
    Zhou, Xuehai
    Zhang, Qjyuan
    Xie, Jing
    2008 5TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2008, : 682 - 686
  • [6] A Review on Hierarchical Routing Protocols for Wireless Sensor Networks
    Zahariah Manap
    Borhanuddin Mohd Ali
    Chee Kyun Ng
    Nor Kamariah Noordin
    Aduwati Sali
    Wireless Personal Communications, 2013, 72 : 1077 - 1104
  • [7] Outlier detection and countermeasure for hierarchical wireless sensor networks
    Zhang, Y-Y
    Chao, H. -C.
    Chen, M.
    Shu, L.
    Park, C. -H.
    Park, M. -S.
    IET INFORMATION SECURITY, 2010, 4 (04) : 361 - 373
  • [9] A Review on Hierarchical Routing Protocols for Wireless Sensor Networks
    Manap, Zahariah
    Ali, Borhanuddin Mohd
    Ng, Chee Kyun
    Noordin, Nor Kamariah
    Sali, Aduwati
    WIRELESS PERSONAL COMMUNICATIONS, 2013, 72 (02) : 1077 - 1104
  • [10] A Hierarchical Shared Key Algorithm in Wireless Sensor Networks
    Sun, Zeyu
    Wu, Weiguo
    Xing, Xiaofei
    Li, Chuanfeng
    Nie, Yalin
    Cao, Yangjie
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2015, 2015, 9532 : 405 - 412