Defending against false-endorsement-based DoS attacks in wireless sensor networks

Christoph Krauß, Markus Schneider, Claudia Eckert

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

13 Scopus citations

Abstract

Node compromise is a serious threat in wireless sensor networks. An adversary can use compromised sensor nodes to inject false data to deceive the base station or he can try to deplete the energy resources of the sensor nodes. One approach to mitigate the impact of node compromise exploits the redundancy property of many wireless sensor networks. If a node initiates a report generation for the base station, then this report must be endorsed by multiple neighboring sensor nodes. Already proposed schemes using this approach introduce a new possible attack, called False-Endorsement-Based Denial of Service attack, where a compromised node sends a false endorsement which invalidates the collaboratively generated report. We propose an extension scheme, which enables the detection and exclusion of false endorsing nodes and is efficient in terms of storage and energy consumption.

Original languageEnglish
Title of host publicationWiSec'08
Subtitle of host publicationProceedings of the 1st ACM Conference on Wireless Network Security
Pages13-23
Number of pages11
DOIs
StatePublished - 2008
Externally publishedYes
EventWiSec'08: 1st ACM Conference on Wireless Network Security - Alexandria, VA, United States
Duration: 31 Mar 20082 Apr 2008

Publication series

NameWiSec'08: Proceedings of the 1st ACM Conference on Wireless Network Security

Conference

ConferenceWiSec'08: 1st ACM Conference on Wireless Network Security
Country/TerritoryUnited States
CityAlexandria, VA
Period31/03/082/04/08

Keywords

  • Denial-of-service attacks
  • Node compromise
  • Report generation
  • Security
  • Wireless sensor network

Fingerprint

Dive into the research topics of 'Defending against false-endorsement-based DoS attacks in wireless sensor networks'. Together they form a unique fingerprint.

Cite this