{"title":"无线传感器网络中的虫洞攻击检测","authors":"M. Bendjima, M. Feham","doi":"10.1109/SAI.2016.7556151","DOIUrl":null,"url":null,"abstract":"A wireless sensor network (WSN) consists of a large number of sensor nodes with limited batteries, the sensoring devices are deployed randomly on a zone to collect data. WSNs are threatened by several malicious behaviors caused by some nodes. The impact of such behaviors can be serious, even fatal, due to the collaborative nature of nodes in a network without fixed infrastructure. Then, in this work we have referred to the need for a secure network communication network with mechanisms that take into account the limited resources of the nodes. In order to achieve such a security, the network can be split into sectors, and mobile agents (MAs) can be used to reject traffic intruders caused by Wormhole attacks taking into account energy constraint. Wormhole attack is a denial of service attack launched by malicious nodes by creating a tunnel through which the packets are replayed to malicious nodes disrupting the communication channel and corrupting network routing. In order to evaluate the performance of our proposal, we have carried out several simulation tests using the SINALGO simulator. The results obtained show that our proposal extends the life of the network, in terms of energy consumption and the rate of packet delivery.","PeriodicalId":219896,"journal":{"name":"2016 SAI Computing Conference (SAI)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"52","resultStr":"{\"title\":\"Wormhole attack detection in wireless sensor networks\",\"authors\":\"M. Bendjima, M. Feham\",\"doi\":\"10.1109/SAI.2016.7556151\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A wireless sensor network (WSN) consists of a large number of sensor nodes with limited batteries, the sensoring devices are deployed randomly on a zone to collect data. WSNs are threatened by several malicious behaviors caused by some nodes. The impact of such behaviors can be serious, even fatal, due to the collaborative nature of nodes in a network without fixed infrastructure. Then, in this work we have referred to the need for a secure network communication network with mechanisms that take into account the limited resources of the nodes. In order to achieve such a security, the network can be split into sectors, and mobile agents (MAs) can be used to reject traffic intruders caused by Wormhole attacks taking into account energy constraint. Wormhole attack is a denial of service attack launched by malicious nodes by creating a tunnel through which the packets are replayed to malicious nodes disrupting the communication channel and corrupting network routing. In order to evaluate the performance of our proposal, we have carried out several simulation tests using the SINALGO simulator. The results obtained show that our proposal extends the life of the network, in terms of energy consumption and the rate of packet delivery.\",\"PeriodicalId\":219896,\"journal\":{\"name\":\"2016 SAI Computing Conference (SAI)\",\"volume\":\"43 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-07-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"52\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 SAI Computing Conference (SAI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SAI.2016.7556151\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 SAI Computing Conference (SAI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SAI.2016.7556151","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Wormhole attack detection in wireless sensor networks
A wireless sensor network (WSN) consists of a large number of sensor nodes with limited batteries, the sensoring devices are deployed randomly on a zone to collect data. WSNs are threatened by several malicious behaviors caused by some nodes. The impact of such behaviors can be serious, even fatal, due to the collaborative nature of nodes in a network without fixed infrastructure. Then, in this work we have referred to the need for a secure network communication network with mechanisms that take into account the limited resources of the nodes. In order to achieve such a security, the network can be split into sectors, and mobile agents (MAs) can be used to reject traffic intruders caused by Wormhole attacks taking into account energy constraint. Wormhole attack is a denial of service attack launched by malicious nodes by creating a tunnel through which the packets are replayed to malicious nodes disrupting the communication channel and corrupting network routing. In order to evaluate the performance of our proposal, we have carried out several simulation tests using the SINALGO simulator. The results obtained show that our proposal extends the life of the network, in terms of energy consumption and the rate of packet delivery.