Detecção de Intrusos por Rotas Redundantes em RSSF
Abstract
Several types of attacks can be launched in wireless sensor networks (WSN). Some factors make the WSN more vulnerable to enemy action than the conventional networks: limited computer resources, hostile environment and wireless communication. This paper presents a mechanism for protection of WSN against some denial of service attacks in routing, like black hole and selective forwarding. This mechanism is able to detect intruders that promote these attacks, using alternative routes.References
Karlof, C. and Wagner, D. (2003). Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures. on appear First IEEE International Workshop on Sensor Network Protocols and Applications, May.
Staddon, J., Balfanz, D, and Durfee, G. (2002). Efficient Tracing of Failed Nodes in Sensor Networks. Atlanta, Geórgia, USA.
Karlof, C., Li, Y., and Polastre, J. (2002). ARRIVE: Algorithm for Robust Routing in Volatile Environments. Technical Report UCB/CSD-03-1233, University of California.
Deng, J., Han, R. and Mishra,S. (2003). INSENS: Intrusion-Tolerant Routing in Wireless Sensor Networks. Poster paper In the 23rd IEEE International Conference on Distributed Computing Systems, Providence, RI.
Staddon, J., Balfanz, D, and Durfee, G. (2002). Efficient Tracing of Failed Nodes in Sensor Networks. Atlanta, Geórgia, USA.
Karlof, C., Li, Y., and Polastre, J. (2002). ARRIVE: Algorithm for Robust Routing in Volatile Environments. Technical Report UCB/CSD-03-1233, University of California.
Deng, J., Han, R. and Mishra,S. (2003). INSENS: Intrusion-Tolerant Routing in Wireless Sensor Networks. Poster paper In the 23rd IEEE International Conference on Distributed Computing Systems, Providence, RI.
Published
2005-09-26
How to Cite
PAULA, Wellington P. de; OLIVEIRA, Sérgio de; NOGUEIRA, José Marcos; WONG, Hao Chi.
Detecção de Intrusos por Rotas Redundantes em RSSF. In: BRAZILIAN SYMPOSIUM ON CYBERSECURITY (SBSEG), 5. , 2005, Florianópolis.
Anais [...].
Porto Alegre: Sociedade Brasileira de Computação,
2005
.
p. 170-173.
DOI: https://doi.org/10.5753/sbseg.2005.21546.
