DocumentCode :
1700420
Title :
Detecting Wormhole Attacks Using Probabilistic Routing and Redundancy Transmission
Author :
Wei, Guiyi ; Wang, Xueli ; Mao, Yuxin
Author_Institution :
Sch. of Comput. Sci. & Inf. Eng., Zhejiang Gongshang Univ., Hangzhou, China
fYear :
2010
Firstpage :
496
Lastpage :
500
Abstract :
With the emergence of wireless sensor networks in military surveillance, environmental monitoring and other fields, security has become an important issue. Wormhole attack can destabilize or disable a wireless sensor network. In typical wormhole attack, the attacker receives packets in the network, forward them through a wired or wireless link with high-bandwidth low-latency links than the network links, relay them to another point in the network. In this paper, we propose to use the key techniques and probabilistic multi-path redundancy transmission (PMRT) to detect wormhole attacks. Id-based key management scheme is used for wireless sensor networks to build security link and detect wormhole attack. Compared with existing methods, the proposed approach not only reduces the communication overhead, but also saves node energy.
Keywords :
probability; redundancy; telecommunication computing; telecommunication network routing; telecommunication security; wireless sensor networks; Id-based key management scheme; low-latency link; multipath redundancy transmission; network link; probabilistic routing; wireless sensor network; wormhole attack; Barium; Matrix decomposition; Redundancy; Security; Servers; Symmetric matrices; Wireless sensor networks; Wireless sensor network; key; probabilistic multi-path redundancy transmission; wormhole;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Multimedia Information Networking and Security (MINES), 2010 International Conference on
Conference_Location :
Nanjing, Jiangsu
Print_ISBN :
978-1-4244-8626-7
Electronic_ISBN :
978-0-7695-4258-4
Type :
conf
DOI :
10.1109/MINES.2010.111
Filename :
5670906
Link To Document :
بازگشت