Browse > Article

Secure Routing Mechanism to Defend Multiple Attacks in Sensor Networks  

Moon, Soo-Young (School of Information and Communication Engineering, Sungkyunkwan University)
Cho, Tae-Ho (School of Information and Communication Engineering, Sungkyunkwan University)
Publication Information
Journal of Intelligence and Information Systems / v.16, no.1, 2010 , pp. 45-56 More about this Journal
Abstract
Sensor Networks are composed of many sensor nodes, which are capable of sensing, computing, and communicating with each other, and one or more sink node(s). Sensor networks collect information of various objects' identification and surrounding environment. Due to the limited resources of sensor nodes, use of wireless channel, and the lack of infrastructure, sensor networks are vulnerable to security threats. Most research of sensor networks have focused on how to detect and counter one type of attack. However, in real sensor networks, it is impractical to predict the attack to occur. Additionally, it is possible for multiple attacks to occur in sensor networks. In this paper, we propose the Secure Routing Mechanism to Defend Multiple Attacks in Sensor Networks. The proposed mechanism improves and combines existing security mechanisms, and achieves higher detection rates for single and multiple attacks.
Keywords
Wireless Sensor Networks; Wormhole Attacks; false Report Attacks;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Akyildiz, I. F., W. Su, Y. Sankarasubramaniam and E. Cayirci, "A Survey on Sensor Networks", IEEE Communications Magazine, Vol.40, No.8(2002), 102-116.   DOI   ScienceOn
2 Yun, J-H., I-H. Kim, J-H. Lim and S-W. Seo, "WODEM : Wormhole Attack Defense Mechanism in Wireless Sensor Networks", Lecture Notes in Computer Science (LNCS), Vol.4412(2007), 200-209.
3 Choi, H. M. and T. H. Cho, "Energy Efficient MAC Length Determination Method for Statistical En Route Filtering using Fuzzy Logic", Lecture Notes in Computer Science, Springer Verlag, LNCS 5754, (2009), 686-695.
4 Zhu, S. "Interleaved hop by hop authentication against false data injection attacks in sensor networks", ACM Transactions on Sensor Networks(TOSN), Vol.3, No.3(2007), 1-33.   DOI
5 Li, F. and J. Wu, "A Probabilistic Voting based Filtering Scheme in Wireless Sensor Networks", IWCMC '06(2006), 27-32.
6 전효진, 이건희, 김동규, 서정택, 손기욱, "애드혹 네트워크에서의 이웃노드 정보를 이용한 웜홀 탐지", 2006년도 한국정보과학회 가을 학술발표논문집, Vol.33, No.2(C)(2006), 586-591.
7 Hill, J., R. Szewczyk, A. Woo, S. Hollar, D. Culler and K. Pister, "System Architecture Directions for Networked Sensors", in Proc. ASPLOS(2000), 93-104.
8 Xbow sensor networks, http://www.xbow.com.
9 Hu, Y. C., A. Perrig, and D. B. Johnson, "Wormhole Attacks in Wireless Networks", IEEE Journal on Selected Areas in Communications, Vol.24, No.2(2006), 370-380.
10 Madria, S. and J. Yin, "SeRWA : A secure routing protocol against wormhole attacks in sensor networks", Ad Hoc Networks, Vol.7, No.6(2009), 1051-1063.   DOI   ScienceOn
11 Lee, H. Y. and T. H. Cho, "Fuzzy Adaptive Selection of Filtering Schemes for Energy Saving in Sensor Networks", IEICE Trans. Comm., Vol.E90 B, No.12(2007), 3346-3353.   DOI   ScienceOn
12 Ye, F., H. Luo, and S. Lu, "Statistical en route filtering of injected false data in sensor networks", IEEE Journal on Selected Areas in Communications, Vol.23, No.4(2005), 839-850.   DOI
13 Al Karaki, J. N. and A. E. Kamal, "Routing techniques in wireless sensor networks : a survey", IEEE Wireless Communication Magazine, Vol.11, No.6(2004), 6-28.   DOI   ScienceOn
14 Karlof, C. and D. Wagner, "Secure Routing in Wireless Sensor Networks : Attacks and Countermeasures", Elsevier, Elsevier's Ad Hoc Networks Journal, Special Issue on Sensor Network Protocols and Applications, Vol.1, No.2-3(2003), 293-315.
15 Djenouri, D., L. Khelladi and N. Badache, "A Survey of Security Issues in Mobile Ad Hoc and Sensor Networks", IEEE Communications Surveys and Tutorials, Vol.7, No.4(2005), 2-28.   DOI
16 Nghiem, P. T. and T. H. Cho, "A fuzzy based interleaved multi-hop authentication scheme in wireless sensor networks", Journal of Parallel and Distributed Computing, Vol.69, No.5(2009), 441-450.   DOI   ScienceOn
17 Lee, H. Y. and T. H. Cho, "Fuzzy Based Path Selection Method for Improving the Detection of False Reports in Sensor Networks", IEICE Trans. Inf. and Syst., Vol.E92 D,No.8(2009), 1574-1416.   DOI   ScienceOn
18 Sun, C. I., H. Y. Lee and T. H. Cho, "A Path Selection Method for Improving the Detection Power of the Statistical Filtering in Sensor Networks", Journal of Information Science and Engineering, Vol.25, No.4 (2009), 1163-1175.