会议专题

Detecting Wormhole Attacks Using Probabilistic Routing and Redundancy Transmission

With the emergence of wireless sensor networks in military surveillance, environmental monitoring and other fields, security has become an important issue. Wormhole attack can destabilize or disable a wireless sensor network. In typical wormhole attack, the attacker receives packets in the network, forward them through a wired or wireless link with high-bandwidth low-latency links than the network links, relay them to another point in the network. In this paper, we propose to use the key techniques and probabilistic multi-path redundancy transmission (PMRT) to detect wormhole attacks. Id-based key management scheme is used for wireless sensor networks to build security link and detect wormhole attack. Compared with existing methods, the proposed approach not only reduces the communication overhead, but also saves node energy.

Wireless sensor network wormhole key probabilistic multi-path redundancy transmission

Guiyi Wei Xueli Wang Yuxin Mao

School of Computer Science and Information Engineering, Zhejiang Gongshang University, China

国际会议

2010年IEEE多媒体信息网络与安全国际会议

南京

英文

496-500

2010-11-01(万方平台首次上网日期,不代表论文的发表时间)