Secure routing in wireless sensor networks: Attacks and countermeasures

被引:193
作者
Karlof, C [1 ]
Wagner, D [1 ]
机构
[1] Univ Calif Berkeley, Berkeley, CA 94720 USA
来源
PROCEEDINGS OF THE FIRST IEEE INTERNATIONAL WORKSHOP ON SENSOR NETWORK PROTOCOLS AND APPLICATIONS | 2003年
关键词
D O I
10.1109/SNPA.2003.1203362
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
We consider routing security in wireless sensor networks. Many sensor network routing protocols have been proposed, but none of them have been designed with security as a goal. We propose security goals for routing in sensor networks, show how attacks against ad-hoc and peer-to-peer networks can be adapted into powerful attacks against sensor networks, introduce two classes of novel attacks against sensor networks sinkholes and HELLO floods, and analyze the security of all the major sensor network routing protocols. We describe crippling attacks against all of them and suggest countermeasures and design considerations. This is the first such analysis of secure routing in sensor networks.
引用
收藏
页码:113 / 127
页数:15
相关论文
共 44 条
[1]  
[Anonymous], 2001, IPDPS
[2]  
[Anonymous], 2002, 1 INT WORKSH PEER TO
[3]  
[Anonymous], 2001, P 7 ANN ACM IEEE INT
[4]  
[Anonymous], 2000, P 6 ANN INT C MOB CO
[5]  
[Anonymous], ACM WIRELESS NETWORK
[6]  
BANERJEA A, 1996, P ECMAST, V26, P129
[7]  
BASAGNI S, 2001, ACM INT S MOB AD HOC, P156
[8]   Authenticated ad hoc routing at the link layer for mobile systems [J].
Binkley, J ;
Trost, W .
WIRELESS NETWORKS, 2001, 7 (02) :139-145
[9]  
BRAGINSKY D, 2002, 1 ACM INT WORKSH WIR
[10]   Nodes bearing grudges: Towards routing security, fairness, and robustness in mobile ad hoc networks [J].
Buchegger, S ;
Le Boudec, JY .
10TH EUROMICRO WORKSHOP ON PARALLEL, DISTRIBUTED AND NETWORK-BASED PROCESSING, PROCEEDINGS, 2002, :403-410