Sensor wars: Detecting and defending against spam attacks in wireless sensor networks

被引:3
作者
Sancak, S [1 ]
Cayirci, E [1 ]
Coskun, V [1 ]
Levi, A [1 ]
机构
[1] Turkish Naval Acad, Naval Sci & Engn Inst, Istanbul, Turkey
来源
2004 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-7 | 2004年
关键词
wireless sensor networks; security; quarantine region; spam attacks;
D O I
10.1109/ICC.2004.1313227
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Anti-nodes deployed inside a wireless sensor network can frequently generate dummy data packets that make the nodes relaying them deplete their energy. Especially the nodes closer to the sink fail sooner, because they convey more data packets. This causes the sink to be, disconnected from the sensor network. The counter-measures for this type of attacks, namely spam attacks, should consider that the sensor nodes have limited energy, computational power and memory. In this paper, we propose detect and defend against spams (DADS) scheme. In DADS the vicinity of the detected malicious node is notified about the quarantine region, and nodes do not relay unauthenticated messages coming from a node in the quarantine region. Our experiments show that our scheme fits the requirements of the sensor network.
引用
收藏
页码:3668 / 3672
页数:5
相关论文
共 50 条
[31]   An Energy-efficient System of Counteraction against Attacks in the Mobile Wireless Sensor Networks [J].
Basan, Elena ;
Makarevich, Oleg .
2015 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY, 2015, :403-410
[32]   Patrol Detection for Replica Attacks on Wireless Sensor Networks [J].
Wang, Liang-Min ;
Shi, Yang .
SENSORS, 2011, 11 (03) :2496-2504
[33]   Detecting Intruders by Wireless Sensor Networks [J].
Abdel-Rahman, Mohammad J. ;
Abu-Aysheh, Dima ;
Abu-El-Haija, Ahmad I. ;
Abu-Aysheh, Rasheed J. ;
Al-Najjar, Hazem M. .
AD HOC & SENSOR WIRELESS NETWORKS, 2016, 31 (1-4) :303-337
[34]   Defending Surveillance Sensor Networks Against Data-Injection Attacks via Trusted Nodes [J].
Lopez-Valcarce, Roberto ;
Romero, Daniel .
2017 25TH EUROPEAN SIGNAL PROCESSING CONFERENCE (EUSIPCO), 2017, :380-384
[35]   Securing Underwater Sensor Networks Against Routing Attacks [J].
Dargahi, Tooska ;
Javadi, Hamid H. S. ;
Shafiei, Hosein .
WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (02) :2585-2602
[36]   Securing Underwater Sensor Networks Against Routing Attacks [J].
Tooska Dargahi ;
Hamid H. S. Javadi ;
Hosein Shafiei .
Wireless Personal Communications, 2017, 96 :2585-2602
[37]   Main Types of Attacks in Wireless Sensor Networks [J].
Lupu, Teodor-Grigore .
PROCEEDINGS OF THE 9TH WSEAS INTERNATIONAL CONFERENCE ON SIGNALS, SPEECH AND IMAGE PROCESSING/9TH WSEAS INTERNATIONAL CONFERENCE ON MULTIMEDIA, INTERNET & VIDEO TECHNOLOGIES, 2009, :180-185
[38]   A Survey on Security Attacks in Wireless Sensor Networks [J].
Gaware, Atul ;
Dhonde, S. B. .
PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, :536-539
[39]   A Comparison of Routing Attacks on Wireless Sensor Networks [J].
Mohammadi, Shahriar ;
Atani, Reza Ebrahimi ;
Jadidoleslamy, Hossein .
JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2011, 6 (03) :195-215
[40]   Prevention of Wormhole Attacks in Wireless Sensor Networks [J].
Aldhobaiban, Dema ;
Elleithy, Khaled ;
Almazaydeh, Laiali .
2014 2ND INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE, MODELLING AND SIMULATION, 2014, :287-291