ETRI-Knowledge Sharing Plaform

ENGLISH

성과물

논문 검색
구분 SCI
연도 ~ 키워드

상세정보

학술대회 Control Method for the number of Checkpoint Nodes for Detecting Selective Forwarding Attacks in Wireless Sensor Networks
Cited 2 time in scopus Download 1 time Share share facebook twitter linkedin kakaostory
저자
이상진, 전인걸, 김원태, 박승민
발행일
201011
출처
International Conference on Information and Communication Technology Convergence (ICTC) 2010, pp.537-538
DOI
https://dx.doi.org/10.1109/ICTC.2010.5674760
협약과제
10MS3900, 고신뢰 자율제어 SW를 위한 CPS(Cyber Physical Systems)핵심기술 개발, 박승민
초록
Sensor networks are vulnerable to types of Denial-of-Service attacks such as the selective forwarding attack in which an adversary injects the compromised nodes, attempting to either deny these nodes of critical information or to deceive the base station. This attack can suppress or modify critical information such as the movement of enemy forces. However, such type of attacks faces the risk that neighboring nodes will conclude that the compromised node has failed and they will decide to find another route. To detect a selective forwarding attack, Xiao, Yu and Gao proposed the checkpoint-based multi-hop acknowledgement scheme (CHEMAS). The check-point nodes are used to detect the area where the selective forwarding attack is generated. However, CHEMAS has the static probability of selecting check-point nodes; it cannot achieve the flexibility to coordinate between the detection capability and energy consumption. This paper proposes a method that determines the number of checkpoint nodes for detecting selective forwarding attacks in wireless sensor networks. In the proposed method, a fuzzy rule-based system is exploited for selecting the checkpoint nodes by considering factors like the remaining energy of each path, the number of suspect nodes and the estimated distance from the BS to each node. © 2010 IEEE.
KSP 제안 키워드
Compromised nodes, Critical information, Denial of service attack, Fuzzy Rule-based System(FRBS), Multi-Hop, Remaining energy, Static probability, Static wireless sensor networks(WSNs), base station(BS), control method, denial of service(DoS)