A resilient packet-forwarding scheme against maliciously packet-dropping nodes in sensor networks
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lee, S.-B. | - |
dc.contributor.author | Choi, Y.-H. | - |
dc.date.accessioned | 2022-02-07T07:43:13Z | - |
dc.date.available | 2022-02-07T07:43:13Z | - |
dc.date.created | 2022-02-07 | - |
dc.date.issued | 2006 | - |
dc.identifier.issn | 0000-0000 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/hongik/handle/2020.sw.hongik/25080 | - |
dc.description.abstract | This paper focuses on defending against compromised nodes' dropping of legitimate reports and investigates the misbehavior of a maliciously packet-dropping node in sensor networks. We present a resilient packet-forwarding scheme using Neighbor Watch System (NWS), specifically designed for hop-by-hop reliable delivery in face of malicious nodes that drop relaying packets, as well as faulty nodes that fail to relay packets. Unlike previous work with multipath data forwarding, our scheme basically employs single-path data forwarding, which consumes less power than multipath schemes. As the packet is forwarded along the single-path toward the base station, our scheme, however, converts into multipath data forwarding at the location where NWS detects relaying nodes' misbehavior. Simulation experiments show that, with the help of NWS, our forwarding scheme achieves a high success ratio in face of a large number of packet-dropping nodes, and effectively adjusts its forwarding style, depending on the number of packet-dropping nodes en-route to the base station. Copyright 2007 ACM. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.title | A resilient packet-forwarding scheme against maliciously packet-dropping nodes in sensor networks | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Choi, Y.-H. | - |
dc.identifier.doi | 10.1145/1180345.1180353 | - |
dc.identifier.scopusid | 2-s2.0-34547528552 | - |
dc.identifier.bibliographicCitation | Proceedings of the Fourth ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2006. A workshop held in conjuction with the 13th ACM Conference on Computer and Communications Security, CCS'06, pp.59 - 70 | - |
dc.relation.isPartOf | Proceedings of the Fourth ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2006. A workshop held in conjuction with the 13th ACM Conference on Computer and Communications Security, CCS'06 | - |
dc.citation.title | Proceedings of the Fourth ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2006. A workshop held in conjuction with the 13th ACM Conference on Computer and Communications Security, CCS'06 | - |
dc.citation.startPage | 59 | - |
dc.citation.endPage | 70 | - |
dc.type.rims | ART | - |
dc.type.docType | Conference Paper | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scopus | - |
dc.subject.keywordAuthor | Packet-dropping attacks | - |
dc.subject.keywordAuthor | Reliable delivery | - |
dc.subject.keywordAuthor | Secure routing | - |
dc.subject.keywordAuthor | Sensor network security | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
94, Wausan-ro, Mapo-gu, Seoul, 04066, Korea02-320-1314
COPYRIGHT 2020 HONGIK UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.