TY - GEN
T1 - DICAS
T2 - 1st International Conference on Security and Privacy for Emerging Areas in Communications Networks, SecureComm 2005
AU - Khalil, Issa
AU - Bagchi, Saurabh
AU - Nina-Rotaru, Cristina
PY - 2005
Y1 - 2005
N2 - Sensor networks enable a wide range of applications in both military and civilian domains. However, the deployment scenarios, the functionality requirements, and the limited capabilities of these networks expose them to a wide-range of attacks against control traffic (such as wormholes, Sybil attacks, rushing attacks, etc). In this paper we propose a lightweight protocol called DICAS that mitigates these attacks by detecting, diagnosing, and isolating the malicious nodes. DICAS uses as a fundamental building block the ability of a node to oversee its neighboring nodes' communication. On top of DICAS, we build a secure routing protocol, LSR, which in addition supports multiple node-disjoint paths. We analyze the security guarantees of DICAS and use ns-2 simulations to show its effectiveness against three representative attacks. Overhead analysis is conducted to prove the lightweight nature of DICAS.
AB - Sensor networks enable a wide range of applications in both military and civilian domains. However, the deployment scenarios, the functionality requirements, and the limited capabilities of these networks expose them to a wide-range of attacks against control traffic (such as wormholes, Sybil attacks, rushing attacks, etc). In this paper we propose a lightweight protocol called DICAS that mitigates these attacks by detecting, diagnosing, and isolating the malicious nodes. DICAS uses as a fundamental building block the ability of a node to oversee its neighboring nodes' communication. On top of DICAS, we build a secure routing protocol, LSR, which in addition supports multiple node-disjoint paths. We analyze the security guarantees of DICAS and use ns-2 simulations to show its effectiveness against three representative attacks. Overhead analysis is conducted to prove the lightweight nature of DICAS.
KW - Control attack
KW - Neighbor monitoring
KW - Node-disjoint paths
KW - Secure routing
KW - Sensor network security
UR - http://www.scopus.com/inward/record.url?scp=33847326821&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=33847326821&partnerID=8YFLogxK
U2 - 10.1109/SECURECOMM.2005.17
DO - 10.1109/SECURECOMM.2005.17
M3 - Conference contribution
AN - SCOPUS:33847326821
SN - 0769523692
SN - 9780769523699
T3 - Proceedings - First International Conference on Security and Privacy for Emerging Areas in Communications Networks, SecureComm 2005
SP - 89
EP - 100
BT - Proceedings - First International Conference on Security and Privacy for Emerging Areas in Communications Networks, SecureComm 2005
Y2 - 5 September 2005 through 9 September 2005
ER -