{"title":"Secure routing in wireless sensor networks: attacks and countermeasures","authors":"Chris Karlof, D. Wagner","doi":"10.1109/SNPA.2003.1203362","DOIUrl":null,"url":null,"abstract":"We consider routing security in wireless sensor networks. Many sensor network routing protocols have been proposed, but none of them have been designed with security as a goal. We propose security goals for routing in sensor networks, show how attacks against ad-hoc and peer-to-peer networks can be adapted into powerful attacks against sensor networks, introduce two classes of novel attacks against sensor networks sinkholes and HELLO floods, and analyze the security of all the major sensor network routing protocols. We describe crippling attacks against all of them and suggest countermeasures and design considerations. This is the first such analysis of secure routing in sensor networks.","PeriodicalId":329641,"journal":{"name":"Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003.","volume":"44 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2003-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3706","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SNPA.2003.1203362","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3706
Abstract
We consider routing security in wireless sensor networks. Many sensor network routing protocols have been proposed, but none of them have been designed with security as a goal. We propose security goals for routing in sensor networks, show how attacks against ad-hoc and peer-to-peer networks can be adapted into powerful attacks against sensor networks, introduce two classes of novel attacks against sensor networks sinkholes and HELLO floods, and analyze the security of all the major sensor network routing protocols. We describe crippling attacks against all of them and suggest countermeasures and design considerations. This is the first such analysis of secure routing in sensor networks.