Issue No. 05 - May (2012 vol. 23)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/TPDS.2011.117
Guiling Wang , Dept. of Comput. Sci., New Jersey Inst. of Technol., Newark, NJ, USA
Wensheng Zhang , Dept. of Comput. Sci., Iowa State Univ., Ames, IA, USA
Jinsook Kim , Dept. of Comput. Sci., Iowa State Univ., Ames, IA, USA
Taiming Feng , Dept. of Comput. Sci., Iowa State Univ., Ames, IA, USA
Chuang Wang , Dept. of Comput. Sci., Iowa State Univ., Ames, IA, USA
Packet dropping and modification are common attacks that can be launched by an adversary to disrupt communication in wireless multihop sensor networks. Many schemes have been proposed to mitigate or tolerate such attacks, but very few can effectively and efficiently identify the intruders. To address this problem, we propose a simple yet effective scheme, which can identify misbehaving forwarders that drop or modify packets. Extensive analysis and simulations have been conducted to verify the effectiveness and efficiency of the scheme.
wireless sensor networks, packet radio networks, packet switching, telecommunication security, packet modifying, packet dropper catching, modifier catching, wireless multihop sensor networks, intruder identification, Routing, Heuristic algorithms, Topology, Wireless sensor networks, Cryptography, Monitoring, Wireless communication, wireless sensor networks., Packet dropping, packet modification, intrusion detection
Guiling Wang, Wensheng Zhang, Jinsook Kim, Taiming Feng and Chuang Wang, "Catching Packet Droppers and Modifiers in Wireless Sensor Networks," in IEEE Transactions on Parallel & Distributed Systems, vol. 23, no. , pp. 835-843, 2012.