2010
DOI: 10.1109/tmc.2010.36
|View full text |Cite
|
Sign up to set email alerts
|

Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes

Abstract: Abstract-Compromised-node and denial-of-service are two key attacks in wireless sensor networks (WSNs). In this paper, we study routing mechanisms that circumvent (bypass) black holes formed by these attacks. We argue that existing multi-path routing approaches are vulnerable to such attacks, mainly due to their deterministic nature. So once an adversary acquires the routing algorithm, it can compute the same routes known to the source, and hence endanger all information sent over these routes. In this paper, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 99 publications
(6 citation statements)
references
References 20 publications
0
6
0
Order By: Relevance
“…Mathur et al [8] have introduced similar approach by building a trust model against black hole. Few security solutions concern about mobile environment, network's scalability, its adaptability and node's energy [12,13,14]. Our work is motivated by the secu-rity solution presented by Wazid et al [16].…”
Section: Fig 1 Hierarchical Cluster Topology In Wirelessmentioning
confidence: 99%
“…Mathur et al [8] have introduced similar approach by building a trust model against black hole. Few security solutions concern about mobile environment, network's scalability, its adaptability and node's energy [12,13,14]. Our work is motivated by the secu-rity solution presented by Wazid et al [16].…”
Section: Fig 1 Hierarchical Cluster Topology In Wirelessmentioning
confidence: 99%
“…Liu et al [9] pointed out that there are mainly two categories, including packet-loss avoidance and packet-loss recovery. Packet-loss avoidance (e.g., [12]) attempts to reduce the occurrence of packet loss and packet-loss recovery (e.g., [25]) tries to recover from the packet loss when it happens. Because packet-loss avoidance methods need to pay a high price and from the cost consideration the most widely used mechanism in networks is based on packet-loss recovery.…”
Section: Related Workmentioning
confidence: 99%
“…Although many applications require that each data packet be successfully delivered to sink with statistical probability δ < 1, such as 60%–95%, some reports reveal that the wireless link packet loss rate may be up to 70% in real WSNs, which is far from being satisfactory [11,12,13]. Thus, it is more important to ensure reliability in communication.…”
Section: Introductionmentioning
confidence: 99%
“…Hence, optimal energy and application-specific QoS-aware routing for WMSNs have gained considerable research attention recently. The authors in [33] claim that classic multipath routing approaches are vulnerable to black holes attacks, mainly due to their deterministic nature. They also proposed mechanisms that generate randomized multipath routes.…”
Section: Wireless Sensor Network Routing Protocolsmentioning
confidence: 99%