Ieee Infocom 2009 2009
DOI: 10.1109/infcom.2009.5062244
|View full text |Cite
|
Sign up to set email alerts
|

Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes

Abstract: Abstract-Compromised-node and denial-of-service are two key attacks in wireless sensor networks (WSNs). In this paper, we study data delivery mechanisms that can with high probability circumvent black holes formed by these attacks. We argue that classic multipath routing approaches are vulnerable to such attacks, mainly due to their deterministic nature. So once the adversary acquires the routing algorithm, it can compute the same routes known to the source, hence making all information sent over these routes … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
84
0

Year Published

2010
2010
2018
2018

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 47 publications
(84 citation statements)
references
References 21 publications
0
84
0
Order By: Relevance
“…Due to their hostile and unattended environment, there is a very high chance of nodes being compromised in a WSN. A compromised node (CN) attack is an attack in which an adversary compromises a certain subset of nodes to passively intercept data packets traversing the compromised nodes [8,9]. Through simulations, this paper validates the vulnerability of secret sharing schemes under the relaxation of a secure area around the BS.…”
Section: Introductionmentioning
confidence: 63%
See 2 more Smart Citations
“…Due to their hostile and unattended environment, there is a very high chance of nodes being compromised in a WSN. A compromised node (CN) attack is an attack in which an adversary compromises a certain subset of nodes to passively intercept data packets traversing the compromised nodes [8,9]. Through simulations, this paper validates the vulnerability of secret sharing schemes under the relaxation of a secure area around the BS.…”
Section: Introductionmentioning
confidence: 63%
“…In addition, the presence of an adversary near the BS was not considered in their approach. The work in [9] addresses the shortcomings of H-SPREAD by using the randomized and highly dispersive nature of routing. This approach increased security compared to H-SPREAD with the help of random dispersion.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Karlof and Wagner [9] mentioned k disjoint multipath routing avoidance can completely defend against selective forwarding involving at most k compromised nodes. Several works illustrating that multipath routing defends against packet dropping attack can be found in [10] [11]. Although using this mechanism can make the information transmitted to BS more effectively, the communication cost is very high.…”
Section: ) Neighbor-based Monitoringmentioning
confidence: 99%
“…As long as the malicious nodes, including compromised nodes and outside jammers, cause more packet loss than a normal node does at a certain channel error rate, the attacks are always detectable. Tao Shu et al [10] proposed a mechanism that generates randomized multi-path routes. Under their design, the route taken by the "shares" of different packets change over time.…”
Section: Related Workmentioning
confidence: 99%