Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
A transmission control scheme for media access in sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
Wireless sensor networks: a survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
Directed diffusion for wireless sensor networking
IEEE/ACM Transactions on Networking (TON)
BISS: building secure routing out of an incomplete set of security associations
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Secure data transmission in mobile ad hoc networks
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Taming the underlying challenges of reliable multihop routing in sensor networks
Proceedings of the 1st international conference on Embedded networked sensor systems
Combs, needles, haystacks: balancing push and pull for discovery in large-scale sensor networks
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
The emergence of networking abstractions and techniques in TinyOS
NSDI'04 Proceedings of the 1st conference on Symposium on Networked Systems Design and Implementation - Volume 1
A performance evaluation of intrusion-tolerant routing in wireless sensor networks
IPSN'03 Proceedings of the 2nd international conference on Information processing in sensor networks
Hi-index | 0.00 |
Malicious nodes dropping data packets is a serious security problem in a multihop sensor network because the misbehavior obstructs the mission of sensor networks for collecting and sending data to sinks. In this paper, we propose the quasimultipath data forwarding scheme. If a data packet is discarded by an adversarial node, the quasimultipath scheme enables a benign node in the network to retransmit the packet to a different neighbor node to bypass the adversarial node. In quasimultipath, we introduce a new mechanism of differential timeout to enable energy efficient retransmission against adversary dropping packets. To evaluate the performance, we model and simulate the defense against attacks. The simulation results show that the proposed scheme circumvents adversaries and achieves several-fold reduction in sensor node energy cost, compared to the state-of-the-art multipath method.