Abstract
Sensor networks enable a wide range of applications in both military and civilian domains. However, the deployment scenarios, the functionality requirements, and the limited capabilities of these networks expose them to a wide range of attacks against control traffic (such as wormholes, rushing, Sybil attacks, etc.) and data traffic (such as selective forwarding). In this paper we propose a framework called UnMask that mitigates such attacks by detecting, diagnosing, and isolating the malicious nodes. UnMask uses as a fundamental building block the ability of a node to oversee its neighboring nodes' communication. On top of UnMask, we build a secure routing protocol, Lsr, that provides additional protection against malicious nodes by supporting multiple node-disjoint paths. We analyze the security guarantees of UnMask and use ns-2 simulations to show its effectiveness against representative control and data attacks. The overhead analysis we present shows that UnMask is a lightweight protocol appropriate for securing resource constrained sensor networks.
Original language | English |
---|---|
Pages (from-to) | 148-164 |
Number of pages | 17 |
Journal | Ad Hoc Networks |
Volume | 8 |
Issue number | 2 |
DOIs | |
Publication status | Published - Mar 2010 |
Keywords
- Control attack
- Data attack
- Neighbor monitoring
- Secure routing
- Sensor network security
ASJC Scopus subject areas
- Software
- Hardware and Architecture
- Computer Networks and Communications