Abstract | ||
---|---|---|
Packet dropping and modification are common attacks that can be launched by an adversary to disrupt communication in wireless multihop sensor networks. Many schemes have been proposed to mitigate or tolerate such attacks, but very few can effectively and efficiently identify the intruders. To address this problem, we propose a simple yet effective scheme, which can identify misbehaving forwarders that drop or modify packets. Extensive analysis and simulations have been conducted to verify the effectiveness and efficiency of the scheme. |
Year | DOI | Venue |
---|---|---|
2009 | 10.1109/TPDS.2011.117 | IEEE Transactions on Parallel and Distributed Systems |
Keywords | DocType | Volume |
packet switching,intrusion detection,packet dropping,wireless multi-hop sensor network,packet modifying,modifier catching,packet modification,extensive analysis,wireless sensor network,wireless sensor networks.,packet droppers,common attack,packet radio networks,intruder identification,ns2 simulator,effective scheme,misbehaving forwarders,wireless sensor networks,telecommunication security,packet dropper catching,wireless multihop sensor networks,packet dropper,filtering,sensor network,data mining,routing,tree data structures,cryptography,pediatrics,computer science,topology,wireless communication | Conference | 23 |
Issue | ISSN | ISBN |
5 | 1045-9219 | 978-1-4244-2908-0 |
Citations | PageRank | References |
5 | 0.58 | 8 |
Authors | ||
5 |
Name | Order | Citations | PageRank |
---|---|---|---|
Chuang Wang | 1 | 56 | 3.14 |
Taiming Feng | 2 | 107 | 6.32 |
Jinsook Kim | 3 | 5 | 0.92 |
Guiling Wang | 4 | 573 | 34.93 |
Wensheng Zhang | 5 | 1415 | 80.30 |