Detecting Wormhole Attacks Using Probabilistic Routing and Redundancy Transmission
With the emergence of wireless sensor networks in military surveillance, environmental monitoring and other fields, security has become an important issue. Wormhole attack can destabilize or disable a wireless sensor network. In typical wormhole attack, the attacker receives packets in the network, forward them through a wired or wireless link with high-bandwidth low-latency links than the network links, relay them to another point in the network. In this paper, we propose to use the key techniques and probabilistic multi-path redundancy transmission (PMRT) to detect wormhole attacks. Id-based key management scheme is used for wireless sensor networks to build security link and detect wormhole attack. Compared with existing methods, the proposed approach not only reduces the communication overhead, but also saves node energy.
Wireless sensor network wormhole key probabilistic multi-path redundancy transmission
Guiyi Wei Xueli Wang Yuxin Mao
School of Computer Science and Information Engineering, Zhejiang Gongshang University, China
国际会议
南京
英文
496-500
2010-11-01(万方平台首次上网日期,不代表论文的发表时间)