Defend against topological attacks in sensor networks

Yun Zhou, Yuguang Fang

Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review

2 Citations (Scopus)

Abstract

Sensor networks are vulnerable to many active attacks due to the defects of the network protocols that are not designed carefully to involve security defenses at the beginning. Most of the attacks try to cause topological distortion by spoofing or replaying routing information. This paper proposes to use a location-based naming (LBN) mechanism for sensor nodes, in which location information is embedded into node identifier and acts as an inherent node characteristic to provide authentication service in local access control. When LBN is enforced, the impacts of many attacks to sensor network topology can be limited in a small area. A link layer authentication (LLA) scheme is also proposed to further decrease the impacts of those attacks. Our LBN and LLA can be combined and act as an efficient solution against a wide range of topological attacks in sensor networks.
Original languageEnglish
Title of host publicationMILCOM 2005: Military Communications Conference 2005
Volume2005
DOIs
Publication statusPublished - 2005
Externally publishedYes
EventMILCOM 2005: Military Communications Conference 2005 - Atlatnic City, NJ, United States
Duration: 17 Oct 200520 Oct 2005

Publication series

NameProceedings - IEEE Military Communications Conference MILCOM
Volume2005

Conference

ConferenceMILCOM 2005: Military Communications Conference 2005
PlaceUnited States
CityAtlatnic City, NJ
Period17/10/0520/10/05

Bibliographical note

Publication details (e.g. title, author(s), publication statuses and dates) are captured on an “AS IS” and “AS AVAILABLE” basis at the time of record harvesting from the data source. Suggestions for further amendments or supplementary information can be sent to [email protected].

Fingerprint

Dive into the research topics of 'Defend against topological attacks in sensor networks'. Together they form a unique fingerprint.

Cite this