Securing Ad-Hoc On-Demand Distance Vector Protocol in Wireless Sensor Networks: Working with What the Node Can Offer

Shaikha B. AlKhuder
{"title":"Securing Ad-Hoc On-Demand Distance Vector Protocol in Wireless Sensor Networks: Working with What the Node Can Offer","authors":"Shaikha B. AlKhuder","doi":"10.1109/ICCSE1.2018.8374222","DOIUrl":null,"url":null,"abstract":"Wireless sensor networks (WSNs) are considered to be one of the most important technologies of the 21st century. As a result, WSNs have been used in numerous applications in industry, health monitoring, environmental monitoring, and other related fields. However, the unprotected nature of WSN protocols such as the Ad-hoc On-Demand Distance Vector (AODV) Protocol makes them prone to malicious attacks. One such attack is the replay attack. A single sensor node has limited computation and communication capabilities, but processing routing information through data structures with acceptable time and space complexity can lead to secure data acquisition and sensing. Sensor nodes have limited energy resources, so this attack can have a serious impact on network functionality. In this work, Bloom filters are used to identify the legitimacy of a packet. Sensor nodes will be able to distinguish between legitimate and replayed packets along a path, thus improving a node's decision as to whether it should transmit or discard the received packet.","PeriodicalId":383579,"journal":{"name":"2018 International Conference on Computing Sciences and Engineering (ICCSE)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Conference on Computing Sciences and Engineering (ICCSE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCSE1.2018.8374222","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Wireless sensor networks (WSNs) are considered to be one of the most important technologies of the 21st century. As a result, WSNs have been used in numerous applications in industry, health monitoring, environmental monitoring, and other related fields. However, the unprotected nature of WSN protocols such as the Ad-hoc On-Demand Distance Vector (AODV) Protocol makes them prone to malicious attacks. One such attack is the replay attack. A single sensor node has limited computation and communication capabilities, but processing routing information through data structures with acceptable time and space complexity can lead to secure data acquisition and sensing. Sensor nodes have limited energy resources, so this attack can have a serious impact on network functionality. In this work, Bloom filters are used to identify the legitimacy of a packet. Sensor nodes will be able to distinguish between legitimate and replayed packets along a path, thus improving a node's decision as to whether it should transmit or discard the received packet.
保护无线传感器网络中的自组织按需距离矢量协议:使用节点可以提供的功能
无线传感器网络被认为是21世纪最重要的技术之一。因此,无线传感器网络在工业、健康监测、环境监测等相关领域得到了广泛的应用。然而,无线传感器网络协议(如Ad-hoc按需距离矢量(AODV)协议)的无保护性质使它们容易受到恶意攻击。其中一种攻击是重放攻击。单个传感器节点具有有限的计算和通信能力,但是通过具有可接受的时间和空间复杂性的数据结构处理路由信息可以导致安全的数据采集和感知。传感器节点的能量有限,因此这种攻击会对网络功能产生严重影响。在这项工作中,布鲁姆过滤器用于识别数据包的合法性。传感器节点将能够区分路径上的合法数据包和重播数据包,从而改进节点是否应该传输或丢弃接收到的数据包的决策。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信