Bounding Packet Dropping and Injection Attacks in Sensor Networks

نویسندگان

  • Xin Zhang
  • Haowen Chan
  • Abhishek Jain
  • Adrian Perrig
چکیده

A malicious insider in a sensor network may sabotage the network at any level of operation. While most prior work on network-layer security has focused on providing control plane integrity (specifically, routing correctness), we approach a complementary and equally important problem: data plane reliability. In a data plane attack, the attacker does not attack the routing control logic, but instead directly manipulates the data payloads flowing on the network to cause disruption. We reduce the general problem of data-plane manipulation attacks to two specific attacks: packet dropping and injection, and propose two complementary protocols to address the problem as a whole. We address packet dropping with a probabilistic probing protocol which can bound the end-to-end drop rate below a fixed threshold for a given path in the presence of multiple adversarial nodes and natural packet loss. We address packet injection with a rate-limiting mechanism based on per-epoch audit to detect nodes which exceed their allotted data origination rates. In both protocols, an adversary can misbehave by at most a fixed amount on expectation, before it is detected; after detection, one of the links under its control will be removed. Hence, the total amount of misbehavior (packet injection or dropping) an adversary can inflict is a constant regardless of the lifetime of the network.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

IMNTV-Identifying Malicious Nodes using Trust Value in Wireless Sensor Networks

Security is the major area of concern in communication channel. Security is very crucial in wireless sensor networks which are deployed in remote environments. Adversary can disrupt the communication within multi hop sensor networks by launching the attack. The common attacks which disrupt the communication of nodes are packet dropping, packet modification, packet fake routing, badmouthing atta...

متن کامل

A Secure Routing Algorithm for Underwater Wireless Sensor Networks

Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet d...

متن کامل

An Adaptive Congestion Alleviating Protocol for Healthcare Applications in Wireless Body Sensor Networks: Learning Automata Approach

Wireless Body Sensor Networks (WBSNs) involve a convergence of biosensors, wireless communication and networks technologies. WBSN enables real-time healthcare services to users. Wireless sensors can be used to monitor patients’ physical conditions and transfer real time vital signs to the emergency center or individual doctors. Wireless networks are subject to more packet loss and congestion. T...

متن کامل

Recognition of Packet Dropping and Modification in WSN’s using Ranking Algorithms

In wireless sensor networks the Packet Droppers and Modifiers are common attacks. It is very difficult to identify such attacks and this attack interrupts the communication in wireless multi hop sensor networks. In this we can identify the Packet Droppers and Packet Modifiers using ranking algorithms and packet marks. The Performance is represented using detection rate and false positive probab...

متن کامل

A Survey of Solutions to Protect Against All Types of Attacks in Mobile Ad Hoc Networks

In recent years mobile networks have expanded dramatically, compared with other wireless networks. Routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. In this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007