Title :
Defend against topological attacks in sensor networks
Author :
Zhou, Yun ; Fang, Yuguang
Author_Institution :
Dept. of Electr. & Comput. Eng., Florida Univ., Gainesville, FL
Abstract :
Sensor networks are vulnerable to many active attacks due to the defects of the network protocols that are not designed carefully to involve security defenses at the beginning. Most of the attacks try to cause topological distortion by spoofing or replaying routing information. This paper proposes to use a location-based naming (LBN) mechanism for sensor nodes, in which location information is embedded into node identifier and acts as an inherent node characteristic to provide authentication service in local access control. When LBN is enforced, the impacts of many attacks to sensor network topology can be limited in a small area. A link layer authentication (LLA) scheme is also proposed to further decrease the impacts of those attacks. Our LBN and LLA can be combined and act as an efficient solution against a wide range of topological attacks in sensor networks
Keywords :
telecommunication network topology; telecommunication security; wireless sensor networks; authentication service; link layer authentication; location-based naming mechanism; sensor networks; topological attacks; Access control; Authentication; Computer security; Information security; Intelligent networks; Intelligent sensors; Intrusion detection; Network topology; Routing protocols; Sensor phenomena and characterization;
Conference_Titel :
Military Communications Conference, 2005. MILCOM 2005. IEEE
Conference_Location :
Atlantic City, NJ
Print_ISBN :
0-7803-9393-7
DOI :
10.1109/MILCOM.2005.1605774