SUMP: A Secure Unicast Messaging Protocol for Wireless Ad Hoc Sensor Networks

International Journal of Sensor Networks(2007)

引用 12|浏览28
暂无评分
摘要
Most wireless ad hoc sensor networks are susceptible to routing level attacks, in which an adversary masquerades as a legitimate node to convince neighboring nodes that it is the "logical" next hop or is on a "better" path for forwarding packets, and arbitrarily drops the packets forwarded by neighboring nodes. In this paper, we propose a secure unicast messaging protocol (SUMP) for wireless ad hoc sensor networks to mitigate the threat of routing level attacks. SUMP groups nodes into levels based on hop count to provide hop-by-hop group authentication using Merkel hash trees. This method allows for varied levels of security in accordance with a node's hop count from the base station and secure, directed unicast communications from the base station to individual nodes. Unlike other sensor network security protocols that require the storage of parent node information, a sensor node running SUMP does not store parent node information, therefore preventing an adversary from gaining information of other nodes from a compromised node.
更多
查看译文
关键词
base station,j.,sump groups node,sensor network,security protocol,huang,next hop,t. 2007 'sump: a secure unicast messaging protocol for wireless ad hoc sensor networks',level attack,c-t.,individual node,adversary masquerade,merkle hash tree,legitimate node,nos. 5/6,vol. 2,authenticated routing. reference to this paper should be made as follows: janies,secure unicast,int. j. sensor networks,non-existent path,johnson,neighbouring node,pp.358-367.,hop count,n.l. and richardson,wireless application protocol,packet forwarding,base stations,unicast,wireless sensor networks,routing protocols,information security
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要