ETRI-Knowledge Sharing Plaform

KOREAN
논문 검색
Type SCI
Year ~ Keyword

Detail

Conference Paper Control Method for the number of Checkpoint Nodes for Detecting Selective Forwarding Attacks in Wireless Sensor Networks
Cited 2 time in scopus Share share facebook twitter linkedin kakaostory
Authors
Sang Jin Lee, In Geol Chun, Won Tae Kim, Seung Min Park
Issue Date
2010-11
Citation
International Conference on Information and Communication Technology Convergence (ICTC) 2010, pp.537-538
Publisher
IEEE
Language
English
Type
Conference Paper
DOI
https://dx.doi.org/10.1109/ICTC.2010.5674760
Abstract
Sensor networks are vulnerable to types of Denial-of-Service attacks such as the selective forwarding attack in which an adversary injects the compromised nodes, attempting to either deny these nodes of critical information or to deceive the base station. This attack can suppress or modify critical information such as the movement of enemy forces. However, such type of attacks faces the risk that neighboring nodes will conclude that the compromised node has failed and they will decide to find another route. To detect a selective forwarding attack, Xiao, Yu and Gao proposed the checkpoint-based multi-hop acknowledgement scheme (CHEMAS). The check-point nodes are used to detect the area where the selective forwarding attack is generated. However, CHEMAS has the static probability of selecting check-point nodes; it cannot achieve the flexibility to coordinate between the detection capability and energy consumption. This paper proposes a method that determines the number of checkpoint nodes for detecting selective forwarding attacks in wireless sensor networks. In the proposed method, a fuzzy rule-based system is exploited for selecting the checkpoint nodes by considering factors like the remaining energy of each path, the number of suspect nodes and the estimated distance from the BS to each node. © 2010 IEEE.
KSP Keywords
Compromised nodes, Critical information, Denial of service attack, Fuzzy rule-based system, Multi-Hop, Static probability, Wireless Sensor networks, base station, control method, denial of service(DoS), detection capability