Sensor wars: Detecting and defending against spam attacks in wireless sensor networks

被引:3
|
作者
Sancak, S [1 ]
Cayirci, E [1 ]
Coskun, V [1 ]
Levi, A [1 ]
机构
[1] Turkish Naval Acad, Naval Sci & Engn Inst, Istanbul, Turkey
来源
2004 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-7 | 2004年
关键词
wireless sensor networks; security; quarantine region; spam attacks;
D O I
10.1109/ICC.2004.1313227
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Anti-nodes deployed inside a wireless sensor network can frequently generate dummy data packets that make the nodes relaying them deplete their energy. Especially the nodes closer to the sink fail sooner, because they convey more data packets. This causes the sink to be, disconnected from the sensor network. The counter-measures for this type of attacks, namely spam attacks, should consider that the sensor nodes have limited energy, computational power and memory. In this paper, we propose detect and defend against spams (DADS) scheme. In DADS the vicinity of the detected malicious node is notified about the quarantine region, and nodes do not relay unauthenticated messages coming from a node in the quarantine region. Our experiments show that our scheme fits the requirements of the sensor network.
引用
收藏
页码:3668 / 3672
页数:5
相关论文
共 50 条
  • [1] Detecting and Defending against Replication Attacks in Wireless Sensor Networks
    Chen, Xiang-yi
    Meng, Li-xia
    Zhan, Yong-zhao
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
  • [2] Defending against physical destruction attacks on wireless sensor networks
    Zhang, Chi
    Zhang, Yanchao
    Fang, Yuguang
    MILCOM 2006, VOLS 1-7, 2006, : 2662 - +
  • [3] Defending against Sybil attacks in sensor networks
    Zhang, QH
    Wang, P
    Reeves, DS
    Ning, P
    25th IEEE International Conference on Distributed Computing Systems Workshops, Proceedings, 2005, : 185 - 191
  • [4] DEFENDING WIRELESS SENSOR NETWORKS FROM JAMMING ATTACKS
    Mpitziopoulos, Aristides
    Gavalas, Damianos
    Pantziou, Grammati
    Konstantopoulos, Charalampos
    2007 IEEE 18TH INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, VOLS 1-9, 2007, : 81 - +
  • [5] Detecting wormhole attacks in wireless sensor networks
    Xu, Yurong
    Chen, Guanling
    Ford, James
    Makedon, Fillia
    CRITICAL INFRASTRUCTURE PROTE CTION, 2008, 253 : 267 - +
  • [6] Defending Against Sybil Attacks Based on Received Signal Strength in Wireless Sensor Networks
    Wang Jiangtao
    Yang Geng
    Sun Yuan
    Chen Shengshou
    CHINESE JOURNAL OF ELECTRONICS, 2008, 17 (04): : 611 - 614
  • [7] Defending against False-Endorsement-Based DoS Attacks in Wireless Sensor Networks
    Krauss, Christoph
    Schneider, Markus
    Eckert, Claudia
    WISEC'08: PROCEEDINGS OF THE FIRST ACM CONFERENCE ON WIRELESS NETWORK SECURITY, 2008, : 13 - 23
  • [8] Defending DoS attacks on broadcast authentication in wireless sensor networks
    Du, Xiaojiang
    Xiao, Yang
    Guizani, Mohsen
    Chen, Hsiao-Hwa
    2008 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS, VOLS 1-13, 2008, : 1653 - +
  • [9] Detecting and preventing Sybil attacks in wireless sensor networks
    Wadii, Jlassi
    Rim, Haddad
    Ridha, Bouallegue
    2019 IEEE 19TH MEDITERRANEAN MICROWAVE SYMPOSIUM (MMS 2019), 2019,
  • [10] Quarantine region scheme to mitigate spam attacks in wireless sensor networks
    Coskun, Vedat
    Cayirci, Erdal
    Levi, Albert
    Sancak, Serdar
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2006, 5 (08) : 1074 - 1086