Title :
Detecting Wormhole Attacks Using Probabilistic Routing and Redundancy Transmission
Author :
Wei, Guiyi ; Wang, Xueli ; Mao, Yuxin
Author_Institution :
Sch. of Comput. Sci. & Inf. Eng., Zhejiang Gongshang Univ., Hangzhou, China
Abstract :
With the emergence of wireless sensor networks in military surveillance, environmental monitoring and other fields, security has become an important issue. Wormhole attack can destabilize or disable a wireless sensor network. In typical wormhole attack, the attacker receives packets in the network, forward them through a wired or wireless link with high-bandwidth low-latency links than the network links, relay them to another point in the network. In this paper, we propose to use the key techniques and probabilistic multi-path redundancy transmission (PMRT) to detect wormhole attacks. Id-based key management scheme is used for wireless sensor networks to build security link and detect wormhole attack. Compared with existing methods, the proposed approach not only reduces the communication overhead, but also saves node energy.
Keywords :
probability; redundancy; telecommunication computing; telecommunication network routing; telecommunication security; wireless sensor networks; Id-based key management scheme; low-latency link; multipath redundancy transmission; network link; probabilistic routing; wireless sensor network; wormhole attack; Barium; Matrix decomposition; Redundancy; Security; Servers; Symmetric matrices; Wireless sensor networks; Wireless sensor network; key; probabilistic multi-path redundancy transmission; wormhole;
Conference_Titel :
Multimedia Information Networking and Security (MINES), 2010 International Conference on
Conference_Location :
Nanjing, Jiangsu
Print_ISBN :
978-1-4244-8626-7
Electronic_ISBN :
978-0-7695-4258-4
DOI :
10.1109/MINES.2010.111