Recovery in distributed systems using optimistic message logging and check-pointing
Journal of Algorithms
Artificial intelligence: a modern approach
Artificial intelligence: a modern approach
An architecture for adaptive intelligent systems
Artificial Intelligence - Special volume on computational research on interaction and agency, part 1
Artificial life meets entertainment: lifelike autonomous agents
Communications of the ACM
The Byzantine Generals Problem
ACM Transactions on Programming Languages and Systems (TOPLAS)
Denial of Service in Sensor Networks
Computer
Recovery in the Mobile Wireless Environment Using Mobile Agents
IEEE Transactions on Mobile Computing
A taxonomy of DDoS attack and DDoS defense mechanisms
ACM SIGCOMM Computer Communication Review
Simulating the power consumption of large-scale sensor network applications
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
Defending against path-based DoS attacks in wireless sensor networks
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Design of a wireless sensor network platform for detecting rare, random, and ephemeral events
IPSN '05 Proceedings of the 4th international symposium on Information processing in sensor networks
NPC '07 Proceedings of the 2007 IFIP International Conference on Network and Parallel Computing Workshops
Sensor networks with mobile agents
MILCOM'03 Proceedings of the 2003 IEEE conference on Military communications - Volume I
Tampering with motes: real-world physical attacks on wireless sensor networks
SPC'06 Proceedings of the Third international conference on Security in Pervasive Computing
Service vulnerability scanning based on service-oriented architecture in Web service environments
Journal of Systems Architecture: the EUROMICRO Journal
WSN in cyber physical systems: Enhanced energy management routing approach using software agents
Future Generation Computer Systems
Hi-index | 0.00 |
Wireless sensor networks represent a new generation of real-time embedded systems with significantly different communication constraints from the traditional networked systems. With their development, a new attack called a path-based DoS (PDoS) attack has appeared. In a PDoS attack, an adversary, either inside or outside the network, overwhelms sensor nodes by flooding a multi-hop end-to-end communication path with either replayed packets or injected spurious packets. Detection and recovery from PDoS attacks have not been given much attention in the literature. In this article, we consider wireless sensor networks designed to collect and store data. In a path-based attack, both sensor nodes and the database containing collected data can be compromised. We propose a recovery method using mobile agents which can detect PDoS attacks easily and efficiently and recover the compromised nodes along with the database.