{"title":"An Efficient Security Framework for Detection and Isolation of Attackers in Low Rate Wireless Personal Area Networks","authors":"S. Priya, J. Pradhan","doi":"10.1109/SECTECH.2008.55","DOIUrl":null,"url":null,"abstract":"LR-WPANs mainly target low data rate and short range applications. Packet delivery in such networks is achieved through routing and packet forwarding. So we should provide security for both operations. In this paper, these two types of threats within the current LR-WPAN security architecture are identified and an efficient security framework (ESF) is presented. It protects both routing and data forwarding attacks. The framework involves detection of malicious nodes by the modified AODV routing and isolation of malicious nodes by using multi-signature based tickets. Through both analysis and simulation results, we demonstrate the effectiveness of our framework in detecting and isolating the misbehaving nodes.","PeriodicalId":377461,"journal":{"name":"2008 International Conference on Security Technology","volume":"226 1-2","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 International Conference on Security Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SECTECH.2008.55","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
LR-WPANs mainly target low data rate and short range applications. Packet delivery in such networks is achieved through routing and packet forwarding. So we should provide security for both operations. In this paper, these two types of threats within the current LR-WPAN security architecture are identified and an efficient security framework (ESF) is presented. It protects both routing and data forwarding attacks. The framework involves detection of malicious nodes by the modified AODV routing and isolation of malicious nodes by using multi-signature based tickets. Through both analysis and simulation results, we demonstrate the effectiveness of our framework in detecting and isolating the misbehaving nodes.