Detecção de nós maliciosos em redes de sensores sem fio

  • Waldir Ribeiro Pires Júnior UFMG
  • Thiago H. de Paula Figueiredo UFMG
  • Hao Chi Wong UFMG
  • Antonio A. F. Loureiro UFMG

Abstract


This work provides a solution to identify malicious nodes in wireless sensor networks through detection of malicious message transmissions in a network. A message transmission is considered suspicious if its signal strength is incompatible with its originator’s geographical position. We provide protocols for detecting suspicious transmissions – and the consequent identification of malicious nodes – and for disseminating this information in the network. We evaluate the detection rate and the efficiency of our solution along a number of parameters.

References

Banerjee, S. and Mishra, A. (2002). Secure spaces: location-based secure wireless group communication. Mobile Computing and Communications Review, 1(2).

Chipcon (2003). SmartRF CC1000 single chip very low power RF transceiver. http://www.chipcon.com/files/CC1000_Data_Sheet_2_1.pdf.

Debar, H., Dacier, M., and Wespi, A. (1999). Towards a taxonomy of intrusion-detection systems. Computer Networks, 31(9):805-822.

Hill, J. and Culler, D. (2001). A wireless embedded sensor architecture for system-level optimization. Technical report, University of California, Berkeley.

Hu, Y.-C., Perrig, A., and Johnson, D. B. (2003). Packet leashes: A defense against wormhole attacks in wireless ad hoc networks. Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2003).

Karlof, C. and Wagner, D. (2003). Secure routing in wireless sensor networks: Attacks and countermeasures. First IEEE International Workshop on Sensor Network Protocols and Applications.

Lippmann, R., Fried, D., Graf, I., Haines, J., Kendall, K., McClung, D., Weber, D., Webster, S., Wyschogrod, D., Cunningham, R., and Zissman, M. (2000). Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation. In Proceedings of the DARPA Information Survivability Conference and Exposition, Los Alamitos, CA. IEEE Computer Society Press.

Marti, S., Giuli, T. J., Lai, K., and Baker, M. (2000). Mitigating routing misbehavior in mobile ad hoc networks. In Mobile Computing and Networking, pages 255-265.

Mica2 Radio Stack for TinyOS (2003). http://webs.cs.berkeley.edu/tos/tinyos-1.x/doc/mica2radio/CC1000.html.

Rappaport, T. S. (2002). Wireless communications: principles and practice. Prentice Hall, 2nd edition.

Tao, P., Rudys, A., Ladd, A. M., and Wallach, D. S. (2003). Wireless lan location-sensing for security applications. In Proceedings of the ACM Workshop on Wireless Security, San Diego, CA.

Zhang, Y. and Lee, W. (2000). Intrusion detection in wireless ad-hoc networks. In Mobile Computing and Networking, pages 275-283.
Published
2004-05-10
PIRES JÚNIOR, Waldir Ribeiro; FIGUEIREDO, Thiago H. de Paula; WONG, Hao Chi; LOUREIRO, Antonio A. F.. Detecção de nós maliciosos em redes de sensores sem fio. In: BRAZILIAN SYMPOSIUM ON CYBERSECURITY (SBSEG), 4. , 2004, Gramado. Anais [...]. Porto Alegre: Sociedade Brasileira de Computação, 2004 . p. 176-187. DOI: https://doi.org/10.5753/sbseg.2004.21236.

Most read articles by the same author(s)

1 2 3 4 5 > >>