Malicious node detection in wireless sensor networks

Summary form only given. This work provides a solution to identify malicious nodes in wireless sensor networks through detection of malicious message transmissions in a network. A message transmission is considered suspicious if its signal strength is incompatible with its originator's geographical position. We provide protocols for detecting suspicious transmissions - and the consequent identification of malicious nodes - and for disseminating this information in the network. We evaluate the detection rate and the efficiency of our solution along a number of parameters.

[1]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[2]  Peng Ning,et al.  LAD: Localization anomaly detection for wireless sensor networks , 2006, J. Parallel Distributed Comput..

[3]  Kristofer S. J. Pister,et al.  Smart Dust: Communicating with a Cubic-Millimeter Computer , 2001, Computer.

[4]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[5]  Yih-Chun Hu Packet Leashes : A Defense against Wormhole Attacks in Wireless Ad Hoc Networks , 2001 .

[6]  Viktor K. Prasanna,et al.  Energy-latency tradeoffs for data gathering in wireless sensor networks , 2004, IEEE INFOCOM 2004.

[7]  Gabor Karsai,et al.  Smart Dust: communicating with a cubic-millimeter computer , 2001 .

[8]  Randy H. Katz,et al.  Next century challenges: mobile networking for “Smart Dust” , 1999, MobiCom.

[9]  Randy H. Katz,et al.  Emerging challenges: Mobile networking for “Smart Dust” , 2000, Journal of Communications and Networks.

[10]  David E. Culler,et al.  A wireless embedded sensor architecture for system-level optimization , 2002 .

[11]  Sanjay Kumar Madria,et al.  Sensor networks: an overview , 2003 .

[12]  Leslie Lamport,et al.  The Byzantine Generals Problem , 1982, TOPL.

[13]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[14]  Dawn Xiaodong Song,et al.  SIA: secure information aggregation in sensor networks , 2003, SenSys '03.

[15]  Theodore S. Rappaport,et al.  Wireless communications - principles and practice , 1996 .

[16]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[17]  Dipankar Raychaudhuri,et al.  Routing protocols for self-organizing hierarchical ad-hoc wireless networks , 2003 .

[18]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[19]  John S. Heidemann,et al.  Ultra-low duty cycle MAC with scheduled channel polling , 2006, SenSys '06.

[20]  Haiyun Luo,et al.  Self-securing ad hoc wireless networks , 2002, Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications.

[21]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[22]  Satish Kumar,et al.  Next century challenges: scalable coordination in sensor networks , 1999, MobiCom.