Cross Verification-based Detection of the Evil Ring Attack in Wireless Sensor Networks

نویسندگان

  • Wei Shi
  • Michel Barbeau
  • Jean-Pierre Corriveau
چکیده

In ad hoc networks and wireless sensor networks, several routing algorithms rely on the knowledge by the network nodes of their own geographic location and those of others. For cases where a node doesn’t have its own positioning device (e.g., GPS), Alfaro et al. propose several algorithms that a node can run to determine its geographic position using position reports from neighbors. In this paper, we first present the evil ring attack, an attack on the geographic location algorithms of Alfaro et al. that misleads nodes about the true position of their neighbors. An attacker sends false reports with a position that sits on a circle centered at the victim’s location and of a radius equal to the distance between the victim and attacker. The attack succeeds because the calculation of the distance between the victim and attacker is not affected despite this fake position. We then present and analyze an evil ring attack detection algorithm in which a position-unaware sensor node crosschecks the consistency of the information it collects from its neighbors with the information collected by other trusted neighbors. This algorithm detects the existence of neighbors running the evil ring attack. We propose a general distributed algorithm for a) localizing sensors in a wireless sensor network in the presence of some malfunctioning ones, and b) detecting such malfunctioning sensors. Keywords-Wireless Sensor Network; Liar Detection; Localization; Algorithms.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Lightweight Intrusion Detection System Based on Specifications to Improve Security in Wireless Sensor Networks

Due to the prevalence of Wireless Sensor Networks (WSNs) in the many mission-critical applications such as military areas, security has been considered as one of the essential parameters in Quality of Service (QoS), and Intrusion Detection System (IDS) is considered as a fundamental requirement for security in these networks. This paper presents a lightweight Intrusion Detection System to prote...

متن کامل

Unauthenticated event detection in wireless sensor networks using sensors co-coverage

Wireless Sensor Networks (WSNs) offer inherent packet redundancy since each point within the network area is covered by more than one sensor node. This phenomenon, which is known as sensors co-coverage, is used in this paper to detect unauthenticated events. Unauthenticated event broadcasting in a WSN imposes network congestion, worsens the packet loss rate, and increases the network energy con...

متن کامل

Random Key Pre-Distribution Techniques against Sybil Attacks

Sybil attacks pose a serious threat for Wireless Sensor Networks (WSN) security. They can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. In a Sybil attack, the attacker masquerades as multiple sensor identities that are actually controlled by one or a few existing attacker nodes. Sybil identities are fabricated out of stolen keys, obt...

متن کامل

Intrusion Detection in Wireless Sensor Networks using Genetic Algorithm

Wireless sensor networks, due to the characteristics of sensors such as wireless communication channels, the lack of infrastructure and targeted threats, are very vulnerable to the various attacks. Routing attacks on the networks, where a malicious node from sending data to the base station is perceived. In this article, a method that can be used to transfer the data securely to prevent attacks...

متن کامل

Outlier Detection in Wireless Sensor Networks Using Distributed Principal Component Analysis

Detecting anomalies is an important challenge for intrusion detection and fault diagnosis in wireless sensor networks (WSNs). To address the problem of outlier detection in wireless sensor networks, in this paper we present a PCA-based centralized approach and a DPCA-based distributed energy-efficient approach for detecting outliers in sensed data in a WSN. The outliers in sensed data can be ca...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010