Sensor wars: Detecting and defending against spam attacks in wireless sensor networks

被引:3
作者
Sancak, S [1 ]
Cayirci, E [1 ]
Coskun, V [1 ]
Levi, A [1 ]
机构
[1] Turkish Naval Acad, Naval Sci & Engn Inst, Istanbul, Turkey
来源
2004 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-7 | 2004年
关键词
wireless sensor networks; security; quarantine region; spam attacks;
D O I
10.1109/ICC.2004.1313227
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Anti-nodes deployed inside a wireless sensor network can frequently generate dummy data packets that make the nodes relaying them deplete their energy. Especially the nodes closer to the sink fail sooner, because they convey more data packets. This causes the sink to be, disconnected from the sensor network. The counter-measures for this type of attacks, namely spam attacks, should consider that the sensor nodes have limited energy, computational power and memory. In this paper, we propose detect and defend against spams (DADS) scheme. In DADS the vicinity of the detected malicious node is notified about the quarantine region, and nodes do not relay unauthenticated messages coming from a node in the quarantine region. Our experiments show that our scheme fits the requirements of the sensor network.
引用
收藏
页码:3668 / 3672
页数:5
相关论文
共 50 条
[41]   M optimal routes hops strategy: detecting sinkhole attacks in wireless sensor networks [J].
Zhaohui Zhang ;
Sanyang Liu ;
Yiguang Bai ;
Yalin Zheng .
Cluster Computing, 2019, 22 :7677-7685
[42]   M optimal routes hops strategy: detecting sinkhole attacks in wireless sensor networks [J].
Zhang, Zhaohui ;
Liu, Sanyang ;
Bai, Yiguang ;
Zheng, Yalin .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 3) :S7677-S7685
[43]   Detecting Location-Based Attacks in Wireless Sensor Networks Using Sequential Analysis [J].
Potukuchi, Raghu Vamsi ;
Kant, Krishna .
IETE JOURNAL OF RESEARCH, 2015, 61 (05) :541-551
[44]   A Multi-channel Defense Against Jamming Attacks in Wireless Sensor Networks [J].
Alnifie, Ghada ;
Simon, Robert .
Q2SWINET'07: PROCEEDINGS OF THE THIRD ACM WORKSHOP ON Q2S AND SECURITY FOR WIRELESS AND MOBILE NETWORKS, 2007, :95-104
[45]   A Secure Scheme Against Power Exhausting Attacks in Hierarchical Wireless Sensor Networks [J].
Hsueh, Ching-Tsung ;
Wen, Chih-Yu ;
Ouyang, Yen-Chieh .
IEEE SENSORS JOURNAL, 2015, 15 (06) :3590-3602
[46]   Security Vulnerabilities and Countermeasures against Jamming Attacks in Wireless Sensor Networks: A Survey [J].
Jaitly, Sunakshi ;
Malhotra, Harshit ;
Bhushan, Bharat .
2017 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS AND ELECTRONICS (COMPTELIX), 2017, :559-564
[47]   A Secure Clock Synchronization Scheme for Wireless Sensor Networks Against Malicious Attacks [J].
Xuxin Zhang ;
Yanzhang Liu ;
Ya Zhang .
Journal of Systems Science and Complexity, 2021, 34 :2125-2138
[48]   A Secure Clock Synchronization Scheme for Wireless Sensor Networks Against Malicious Attacks [J].
Zhang Xuxin ;
Liu Yanzhang ;
Zhang Ya .
JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2021, 34 (06) :2125-2138
[49]   Using Channel Diversity to Defend Against Wormhole Attacks in Wireless Sensor Networks [J].
Zaidi, Syed Muhammad Asad ;
Baig, Waleed Akram ;
Kim, Ki-Hyung .
INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2012, 15 (05) :2031-2042
[50]   Mitigating Attacks against Virtual Coordinate Based Routing in Wireless Sensor Networks [J].
Dong, Jing ;
Ackermann, Kurt E. ;
Bavar, Brett ;
Nita-Rotaru, Cristina .
WISEC'08: PROCEEDINGS OF THE FIRST ACM CONFERENCE ON WIRELESS NETWORK SECURITY, 2008, :89-99