Abstract

Wireless sensor networks (WSNs) consist of a large number of sensor nodes that monitor the environment and a few base stations that collect the sensor readings. Individual sensor nodes are subject to compromised security because they may be deployed in hostile environments and each sensor node communicates wirelessly. An adversary can inject false reports into the networks via compromised nodes. Furthermore, an adversary can create a wormhole by directly linking two compromised nodes or using out-of-band channels. If these two kinds of attacks occur simultaneously in a network, existing methods cannot defend against them adequately. We thus propose a secure routing method for detecting false report injections and wormhole attacks in wireless sensor networks. The proposed method uses ACK messages for detecting wormholes and is based on a statistical en-route filtering (SEF) scheme for detecting false reports. Simulation results show that the proposed method reduces energy consumption by up to 20% and provide greater network security.

Highlights

  • Recent advances in micro electro mechanical systems and digital electronic and wireless communication technologies have enabled the development of low-cost, multi-functional sensor nodes [1]

  • A probability comparison for wormhole detection between the LITEWORP+statistical en-route filtering (SEF) method and the proposed method is presented in Figure 8(a) and the probability of false alarms are presented in Figure 8(b) we calculate the probability of wormhole detection based on the percentage of isolated wormhole nodes and the probability of false alarms based on isolated normal nodes

  • We proposed a secure routing method for detecting false reports and wormhole attacks in wireless sensor networks

Read more

Summary

Introduction

Recent advances in micro electro mechanical systems and digital electronic and wireless communication technologies have enabled the development of low-cost, multi-functional sensor nodes [1]. A WSN consists of a large number of sensor nodes that monitor the environment and one or more base stations that collect the sensor readings [2] In many applications such as military surveillance, sensor nodes are deployed in open, large-scale, and even hostile environments and potential issues range from accidental node failure to intentional tampering. SEF carefully limits the amount of security information assigned to each node to prevent any single compromised node from disrupting the entire system. It relies on the collective decisions of multiple sensors for false report detection

Methods
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call