Detecting Wormhole Attacks Using Probabilistic Routing and Redundancy Transmission

Multimedia Information Networking and Security(2010)

引用 3|浏览0
暂无评分
摘要
With the emergence of wireless sensor networks in military surveillance, environmental monitoring and other fields, security has become an important issue. Wormhole attack can destabilize or disable a wireless sensor network. In typical wormhole attack, the attacker receives packets in the network, forward them through a wired or wireless link with high-bandwidth low-latency links than the network links, relay them to another point in the network. In this paper, we propose to use the key techniques and probabilistic multi-path redundancy transmission (PMRT) to detect wormhole attacks. Id-based key management scheme is used for wireless sensor networks to build security link and detect wormhole attack. Compared with existing methods, the proposed approach not only reduces the communication overhead, but also saves node energy.
更多
查看译文
关键词
redundancy transmission,id-based key management scheme,probabilistic routing,wormhole,wireless sensor network,detecting wormhole attacks,wireless link,typical wormhole attack,low-latency link,key,communication overhead,telecommunication computing,key technique,network link,multipath redundancy transmission,probabilistic multi-path redundancy transmission,wormhole attack,redundancy,high-bandwidth low-latency link,security link,wireless sensor networks,telecommunication security,telecommunication network routing,probability,barium,low latency,matrix decomposition,symmetric matrices,security,servers,key management
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要