TY - JOUR
T1 - Using overhearing technique to detect malicious packet-modifying attacks in wireless sensor networks
AU - Ssu, Kuo Feng
AU - Chou, Chih Hsun
AU - Cheng, Li Wen
N1 - Funding Information:
This research was supported in part by the Taiwan National Science Council under contracts NSC 95-2221-E-006-074 and 95-2221-E-006-092-MY2.
PY - 2007/9/10
Y1 - 2007/9/10
N2 - Recently, security issues in wireless sensor networks become more important. Many mechanisms have been proposed for solving varying types of malicious attacks. However, few of them discussed malicious packet-modifying attacks (MPA). The MPA come from some malicious nodes that modify contents of data packets while relaying. Once MPA occur, the sink node may make wrong decisions according to the incorrect packets. In this paper, an overhearing-based detection mechanism (OBD) is presented for detecting the occurrence of MPA. Both OBD and a traditional two-path detection mechanism were successfully implemented for comparison using the NS2. The simulation measured the metrics in successful detection rate, end-to-end delay, power consumption, and detection latency. Compared to the two-path detection mechanism, the overhearing-based mechanism not only incurred less overhead but provided more accurate failure detection performance.
AB - Recently, security issues in wireless sensor networks become more important. Many mechanisms have been proposed for solving varying types of malicious attacks. However, few of them discussed malicious packet-modifying attacks (MPA). The MPA come from some malicious nodes that modify contents of data packets while relaying. Once MPA occur, the sink node may make wrong decisions according to the incorrect packets. In this paper, an overhearing-based detection mechanism (OBD) is presented for detecting the occurrence of MPA. Both OBD and a traditional two-path detection mechanism were successfully implemented for comparison using the NS2. The simulation measured the metrics in successful detection rate, end-to-end delay, power consumption, and detection latency. Compared to the two-path detection mechanism, the overhearing-based mechanism not only incurred less overhead but provided more accurate failure detection performance.
UR - http://www.scopus.com/inward/record.url?scp=34548046194&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=34548046194&partnerID=8YFLogxK
U2 - 10.1016/j.comcom.2007.04.013
DO - 10.1016/j.comcom.2007.04.013
M3 - Article
AN - SCOPUS:34548046194
SN - 0140-3664
VL - 30
SP - 2342
EP - 2352
JO - Computer Communications
JF - Computer Communications
IS - 11-12
ER -