메뉴 건너뛰기




Volumn 8, Issue 2, 2010, Pages 148-164

UnMask: Utilizing neighbor monitoring for attack mitigation in multihop wireless sensor networks

Author keywords

Control attack; Data attack; Neighbor monitoring; Secure routing; Sensor network security

Indexed keywords

CONTROL TRAFFIC; DATA ATTACK; DATA ATTACKS; DATA TRAFFIC; DEPLOYMENT SCENARIOS; FUNDAMENTAL BUILDING BLOCKS; LIGHTWEIGHT PROTOCOLS; MALICIOUS NODES; MULTIHOP WIRELESS; MULTIPLE NODES; NEIGHBOR MONITORING; NEIGHBORING NODES; NS-2 SIMULATIONS; RESOURCE-CONSTRAINED; SECURE ROUTING; SECURE ROUTING PROTOCOLS; SYBIL ATTACK;

EID: 70349743699     PISSN: 15708705     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.adhoc.2009.06.002     Document Type: Article
Times cited : (48)

References (49)
  • 2
    • 84961572484 scopus 로고    scopus 로고
    • SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks
    • Hu Y.-C., Johnson D.B., and Perrig A. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks. WMCSA (2002) 3-13
    • (2002) WMCSA , pp. 3-13
    • Hu, Y.-C.1    Johnson, D.B.2    Perrig, A.3
  • 3
    • 0036957315 scopus 로고    scopus 로고
    • Ariadne: a secure on-demand routing protocol for ad hoc networks
    • Hu Y.-C., Perrig A., and Johnson D.B. Ariadne: a secure on-demand routing protocol for ad hoc networks. MobiCOM (2002) 12-23
    • (2002) MobiCOM , pp. 12-23
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3
  • 5
    • 0034539015 scopus 로고    scopus 로고
    • Directed diffusion: a scalable and robust communication paradigm for sensor networks
    • Intanagonwiwat C., Govindan R., and Estrin D. Directed diffusion: a scalable and robust communication paradigm for sensor networks. MobiCOM (2000) 56-67
    • (2000) MobiCOM , pp. 56-67
    • Intanagonwiwat, C.1    Govindan, R.2    Estrin, D.3
  • 6
    • 0034547115 scopus 로고    scopus 로고
    • GPSR: greedy perimeter stateless routing for wireless networks
    • Karp B., and Kung H.T. GPSR: greedy perimeter stateless routing for wireless networks. MobiCOM (2000) 243-254
    • (2000) MobiCOM , pp. 243-254
    • Karp, B.1    Kung, H.T.2
  • 8
    • 84904578657 scopus 로고    scopus 로고
    • A scalable solution to minimum cost forwarding in large sensor networks
    • Ye F., Chen A., Lu S., and Zhang L. A scalable solution to minimum cost forwarding in large sensor networks. ICCCN (2001) 304-309
    • (2001) ICCCN , pp. 304-309
    • Ye, F.1    Chen, A.2    Lu, S.3    Zhang, L.4
  • 9
    • 0033877788 scopus 로고    scopus 로고
    • Energy efficient communication protocol for wireless micro sensor networks
    • Heinzelman W.R., Chandrakasan A., and Balakrishnan H. Energy efficient communication protocol for wireless micro sensor networks. HICSS (2000) 3005-3014
    • (2000) HICSS , pp. 3005-3014
    • Heinzelman, W.R.1    Chandrakasan, A.2    Balakrishnan, H.3
  • 10
    • 0036986248 scopus 로고    scopus 로고
    • Rumor routing algorithm for sensor networks
    • Braginsky D., and Estrin D. Rumor routing algorithm for sensor networks. WSNA (2002) 22-31
    • (2002) WSNA , pp. 22-31
    • Braginsky, D.1    Estrin, D.2
  • 11
    • 3042785862 scopus 로고    scopus 로고
    • The Sybil attack in sensor networks: analysis and defenses
    • Newsome J., Shi E., Song D., and Perrig A. The Sybil attack in sensor networks: analysis and defenses. IPSN (2004) 259-268
    • (2004) IPSN , pp. 259-268
    • Newsome, J.1    Shi, E.2    Song, D.3    Perrig, A.4
  • 12
    • 0029530159 scopus 로고
    • A routing protocol for finding two node-disjoint paths in computer networks
    • Ishida K., Kakuda Y., and Kikuno T. A routing protocol for finding two node-disjoint paths in computer networks. ICNP (1992) 340-347
    • (1992) ICNP , pp. 340-347
    • Ishida, K.1    Kakuda, Y.2    Kikuno, T.3
  • 13
    • 0034772133 scopus 로고    scopus 로고
    • Geography-informed energy conservation for ad hoc routing
    • Xu Y., Heidemann J., and Estrin D. Geography-informed energy conservation for ad hoc routing. MobiCOM (2001) 70-84
    • (2001) MobiCOM , pp. 70-84
    • Xu, Y.1    Heidemann, J.2    Estrin, D.3
  • 14
    • 84942426861 scopus 로고    scopus 로고
    • Secure routing in sensor networks: attacks and countermeasures
    • Karlof C., and Wagner D. Secure routing in sensor networks: attacks and countermeasures. SNPA (2003) 113-127
    • (2003) SNPA , pp. 113-127
    • Karlof, C.1    Wagner, D.2
  • 15
    • 0034541756 scopus 로고    scopus 로고
    • Mitigating routing misbehavior in mobile ad hoc networks
    • Marti S., Giuli T.J., Lai K., and Baker M. Mitigating routing misbehavior in mobile ad hoc networks. MobiCOM (2000) 255-265
    • (2000) MobiCOM , pp. 255-265
    • Marti, S.1    Giuli, T.J.2    Lai, K.3    Baker, M.4
  • 16
    • 0041973497 scopus 로고    scopus 로고
    • Packet leashes: a defense against wormhole attacks in wireless networks
    • Hu Y.C., Perrig A., and Johnson D.B. Packet leashes: a defense against wormhole attacks in wireless networks. IEEE INFOCOM (2003) 1976-1986
    • (2003) IEEE INFOCOM , pp. 1976-1986
    • Hu, Y.C.1    Perrig, A.2    Johnson, D.B.3
  • 17
    • 84977898401 scopus 로고    scopus 로고
    • Using directional antennas to prevent wormhole attacks
    • Hu L., and Evans D. Using directional antennas to prevent wormhole attacks. NDSS (2004) 131-141
    • (2004) NDSS , pp. 131-141
    • Hu, L.1    Evans, D.2
  • 18
    • 1542317831 scopus 로고    scopus 로고
    • Rushing attacks and defense in wireless ad hoc network routing protocols
    • Hu Y.C., Perrig A., and Johnson D. Rushing attacks and defense in wireless ad hoc network routing protocols. WiSe (2003) 30-40
    • (2003) WiSe , pp. 30-40
    • Hu, Y.C.1    Perrig, A.2    Johnson, D.3
  • 20
    • 51949089156 scopus 로고    scopus 로고
    • PEGASIS: power-efficient gathering in sensor information systems
    • Lindsey S., and Raghavendra C. PEGASIS: power-efficient gathering in sensor information systems. IEEE Aerospace Conference 3 (2002) 1125-1130
    • (2002) IEEE Aerospace Conference , vol.3 , pp. 1125-1130
    • Lindsey, S.1    Raghavendra, C.2
  • 22
    • 3042822764 scopus 로고    scopus 로고
    • Establishing pair-wise keys in distributed sensor networks
    • Liu D., and Ning P. Establishing pair-wise keys in distributed sensor networks. CCS (2003) 52-61
    • (2003) CCS , pp. 52-61
    • Liu, D.1    Ning, P.2
  • 24
    • 1542287664 scopus 로고    scopus 로고
    • Secure message transmission in mobile ad hoc networks
    • Papadimitratos P., and Haas Z.J. Secure message transmission in mobile ad hoc networks. WiSe (2003) 41-50
    • (2003) WiSe , pp. 41-50
    • Papadimitratos, P.1    Haas, Z.J.2
  • 25
    • 0034844688 scopus 로고    scopus 로고
    • Split multipath routing with maximally disjoint paths in ad hoc networks
    • Lee S.J., and Gerla M. Split multipath routing with maximally disjoint paths in ad hoc networks. ICC (2001) 3201-3205
    • (2001) ICC , pp. 3201-3205
    • Lee, S.J.1    Gerla, M.2
  • 26
    • 0035425905 scopus 로고    scopus 로고
    • Performance of multipath routing for on-demand protocols in mobile ad hoc networks
    • Nasipuri A., Castaneda R., and Das S.R. Performance of multipath routing for on-demand protocols in mobile ad hoc networks. ACM Mobile Networks and Applications (MONET) 6 4 (2001) 339-349
    • (2001) ACM Mobile Networks and Applications (MONET) , vol.6 , Issue.4 , pp. 339-349
    • Nasipuri, A.1    Castaneda, R.2    Das, S.R.3
  • 27
    • 0042475197 scopus 로고    scopus 로고
    • A framework for reliable routing in mobile ad hoc networks
    • Ye Z., Krishnamurthy S.V., and Tripathi S.K. A framework for reliable routing in mobile ad hoc networks. IEEE INFOCOM 1 (2003) 270-280
    • (2003) IEEE INFOCOM , vol.1 , pp. 270-280
    • Ye, Z.1    Krishnamurthy, S.V.2    Tripathi, S.K.3
  • 28
    • 0033749075 scopus 로고    scopus 로고
    • Performance analysis of the IEEE 802.11 distributed coordination function
    • Bianchi G. Performance analysis of the IEEE 802.11 distributed coordination function. IEEE Journal on Selected Areas in Communications 18 3 (2000) 535-547
    • (2000) IEEE Journal on Selected Areas in Communications , vol.18 , Issue.3 , pp. 535-547
    • Bianchi, G.1
  • 31
    • 2442597363 scopus 로고    scopus 로고
    • Performance analysis of the CONFIDANT protocol: cooperation of nodes - fairness in distributed ad-hoc networks
    • Buchegger S., and Le Boudec J.-Y. Performance analysis of the CONFIDANT protocol: cooperation of nodes - fairness in distributed ad-hoc networks. MobiHoc (2002) 80-91
    • (2002) MobiHoc , pp. 80-91
    • Buchegger, S.1    Le Boudec, J.-Y.2
  • 32
    • 4544258840 scopus 로고    scopus 로고
    • A cooperative intrusion detection system for ad hoc networks
    • Huang Y., and Lee W. A cooperative intrusion detection system for ad hoc networks. SASN (2003) 135-147
    • (2003) SASN , pp. 135-147
    • Huang, Y.1    Lee, W.2
  • 34
    • 27544433189 scopus 로고    scopus 로고
    • Tibfit: trust index based fault tolerance for arbitrary data faults in sensor networks
    • Krasniewski M., Varadharajan P., Rabeler B., Bagchi S., and Hu Y.C. Tibfit: trust index based fault tolerance for arbitrary data faults in sensor networks. DSN (2005) 672-681
    • (2005) DSN , pp. 672-681
    • Krasniewski, M.1    Varadharajan, P.2    Rabeler, B.3    Bagchi, S.4    Hu, Y.C.5
  • 36
    • 27544468419 scopus 로고    scopus 로고
    • LiteWorp: a lightweight countermeasure for the wormhole attack in multihop wireless networks
    • Khalil I., Bagchi S., and Shroff N.B. LiteWorp: a lightweight countermeasure for the wormhole attack in multihop wireless networks. DSN (2005) 612-621
    • (2005) DSN , pp. 612-621
    • Khalil, I.1    Bagchi, S.2    Shroff, N.B.3
  • 37
    • 33847326821 scopus 로고    scopus 로고
    • DICAS: detection, diagnosis and isolation of control attacks in sensor networks
    • Khalil I., Bagchi S., and Nita-Rotaru C. DICAS: detection, diagnosis and isolation of control attacks in sensor networks. SecureComm (2005)
    • (2005) SecureComm
    • Khalil, I.1    Bagchi, S.2    Nita-Rotaru, C.3
  • 38
    • 85116427082 scopus 로고    scopus 로고
    • Defending against Sybil attacks in sensor networks
    • Zhang Q., Wang P., Reeves D.S., and Ning P. Defending against Sybil attacks in sensor networks. SDCS (2005) 185-191
    • (2005) SDCS , pp. 185-191
    • Zhang, Q.1    Wang, P.2    Reeves, D.S.3    Ning, P.4
  • 39
    • 27544510780 scopus 로고    scopus 로고
    • Neutralization of errors and attacks in wireless ad hoc networks
    • Basile C., Kalbarczyk Z., and Iyer R.K. Neutralization of errors and attacks in wireless ad hoc networks. DSN (2005) 518-527
    • (2005) DSN , pp. 518-527
    • Basile, C.1    Kalbarczyk, Z.2    Iyer, R.K.3
  • 40
    • 84866469313 scopus 로고    scopus 로고
    • SeRLoc: Robust localization for wireless sensor networks, The ACM Transactions on Sensor
    • L. Lazos, R. Poovendran, SeRLoc: robust localization for wireless sensor networks, The ACM Transactions on Sensor Networks (TOSN) 1(1) (2005) 73-100.
    • (2005) Networks (TOSN) , vol.1 , Issue.1 , pp. 73-100
    • Lazos, L.1    Poovendran, R.2
  • 41
    • 33845916834 scopus 로고    scopus 로고
    • A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks
    • R. Poovendran, L. Lazos, A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks, ACM Journal on Wireless Networks (WINET), 13 (1) (2007) 27-59.
    • (2007) ACM Journal on Wireless Networks (WINET) , vol.13 , Issue.1 , pp. 27-59
    • Poovendran, R.1    Lazos, L.2
  • 42
    • 11244309425 scopus 로고    scopus 로고
    • JANUS: towards robust and malicious resilient routing in hybrid wireless networks
    • Carbunar B., Ioannidis I., and Nita-Rotaru C. JANUS: towards robust and malicious resilient routing in hybrid wireless networks. WiSe (2004) 11-20
    • (2004) WiSe , pp. 11-20
    • Carbunar, B.1    Ioannidis, I.2    Nita-Rotaru, C.3
  • 44
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • L. Lamport, Password authentication with insecure communication, Communications of the ACM, 24(11) (1981) 770-772.
    • (1981) Communications of the ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 47
    • 33745736659 scopus 로고    scopus 로고
    • Statistical wormhole detection in sensor networks, ESAS 2005
    • R. Molva, G. Tsudik, D. Westhoff Eds
    • R. Molva, G. Tsudik, D. Westhoff (Eds.), Statistical wormhole detection in sensor networks, ESAS 2005, LNCS 3813, 2005, pp. 128-141.
    • (2005) LNCS , vol.3813 , pp. 128-141
  • 48
    • 70349749681 scopus 로고    scopus 로고
    • .


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.