Directed diffusion: a scalable and robust communication paradigm for sensor networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
GPSR: greedy perimeter stateless routing for wireless networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Password authentication with insecure communication
Communications of the ACM
Geography-informed energy conservation for Ad Hoc routing
Proceedings of the 7th annual international conference on Mobile computing and networking
Performance of multipath routing for on-demand protocols in mobile ad hoc networks
Mobile Networks and Applications
Highly-resilient, energy-efficient multipath routing in wireless sensor networks
ACM SIGMOBILE Mobile Computing and Communications Review
Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
Rumor routing algorthim for sensor networks
WSNA '02 Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications
SPINS: security protocols for sensor networks
Wireless Networks
A Secure Routing Protocol for Ad Hoc Networks
ICNP '02 Proceedings of the 10th IEEE International Conference on Network Protocols
Energy-Efficient Communication Protocol for Wireless Microsensor Networks
HICSS '00 Proceedings of the 33rd Hawaii International Conference on System Sciences-Volume 8 - Volume 8
Reducing The Cost Of Security In Link-State Routing
SNDSS '97 Proceedings of the 1997 Symposium on Network and Distributed System Security
Ad-hoc On-Demand Distance Vector Routing
WMCSA '99 Proceedings of the Second IEEE Workshop on Mobile Computer Systems and Applications
SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks
WMCSA '02 Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and Applications
A routing protocol for finding two node-disjoint paths in computer networks
ICNP '95 Proceedings of the 1995 International Conference on Network Protocols
Rushing attacks and defense in wireless ad hoc network routing protocols
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Secure data transmission in mobile ad hoc networks
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Establishing pairwise keys in distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Establishing trust in pure ad-hoc networks
ACSC '04 Proceedings of the 27th Australasian conference on Computer science - Volume 26
The sybil attack in sensor networks: analysis & defenses
Proceedings of the 3rd international symposium on Information processing in sensor networks
A cooperative intrusion detection system for ad hoc networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
JANUS: towards robust and malicious resilient routing in hybrid wireless networks
Proceedings of the 3rd ACM workshop on Wireless security
Defending against Sybil Attacks in Sensor Networks
ICDCSW '05 Proceedings of the Second International Workshop on Security in Distributed Computing Systems (SDCS) (ICDCSW'05) - Volume 02
SeRLoc: Robust localization for wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Neutralization of Errors and Attacks in Wireless Ad Hoc Networks
DSN '05 Proceedings of the 2005 International Conference on Dependable Systems and Networks
LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks
DSN '05 Proceedings of the 2005 International Conference on Dependable Systems and Networks
TIBFIT: Trust Index Based Fault Tolerance for Arbitrary Data Faults in Sensor Networks
DSN '05 Proceedings of the 2005 International Conference on Dependable Systems and Networks
DICAS: Detection, Diagnosis and Isolation of Control Attacks in Sensor Networks
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
On the Survivability of Routing Protocols in Ad Hoc Wireless Networks
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
SLAM: Sleep-Wake Aware Local Monitoring in Sensor Networks
DSN '07 Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks
Statistical wormhole detection in sensor networks
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
Performance analysis of the IEEE 802.11 distributed coordination function
IEEE Journal on Selected Areas in Communications
Neighborhood monitoring in ad hoc networks
Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research
International Journal of Ad Hoc and Ubiquitous Computing
Hi-index | 0.00 |
Sensor networks enable a wide range of applications in both military and civilian domains. However, the deployment scenarios, the functionality requirements, and the limited capabilities of these networks expose them to a wide range of attacks against control traffic (such as wormholes, rushing, Sybil attacks, etc.) and data traffic (such as selective forwarding). In this paper we propose a framework called UnMask that mitigates such attacks by detecting, diagnosing, and isolating the malicious nodes. UnMask uses as a fundamental building block the ability of a node to oversee its neighboring nodes' communication. On top of UnMask, we build a secure routing protocol, Lsr, that provides additional protection against malicious nodes by supporting multiple node-disjoint paths. We analyze the security guarantees of UnMask and use ns-2 simulations to show its effectiveness against representative control and data attacks. The overhead analysis we present shows that UnMask is a lightweight protocol appropriate for securing resource constrained sensor networks.