Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
A low-cost secure neighbor verification protocol for wireless sensor networks
Laboratory for Computer Communications and Applications, EPFL.
Laboratory for Computer Communications and Applications, EPFL.
Laboratory for Computer Communications and Applications, EPFL.
KTH, School of Electrical Engineering (EES). Laboratory for Computer Communications and Applications, EPFL.ORCID iD: 0000-0002-3267-5374
Show others and affiliations
2008 (English)Report (Other academic)
Abstract [en]

Wireless networking relies on a fundamental building block,neighbor  discovery(ND).  However,  the  nature  of  wirelesscommunications makes attacks against ND easy:  an adver-sary can simply replay or relay (wormhole) packets acrossthe network and misleaddisconnectednodes they commu-nicate  directly.   Such  attacks  can  compromise  the  overly-ing protocols and applications.  Proposals in the literatureseek tosecureND, allowing nodes toverifythey are neigh-bors.  However, they either rely on specialized hardware orinfrastructure,  or  oer  limited  security,  often  only  againstan  attack  mounted  by  at  most  two  adversarial  nodes  (a2-end  wormhole).   In  this  paper,  we  address  these  prob-lems,  designing  a  secureneighbor  vericationprotocol  forlow-costandconstrainedWireless Sensor networks (WSN).Our scheme relies on nodes' distance estimation and simplegeometric  tests,  and  it  is  fullydistributed.   We  prove  ourprotocol secure against the classical 2-end wormhole attack,and we show it makes it hard to mount ak-end wormholeattack (k >2):  For non-negligible yet limited chance of suc-cess,  the  adversary  must  know  the  locations  of  all  victimnodes and deploy a relay (wormhole) node close toeachvic-tim.  We provided a proof-of-concept implementation witho-the-shelfWSN equipment, Cricket Motes.  The protocolis the rst applicable method that achieves a high level ofsecurity for WSN against sophisticated wormhole attacks.

Place, publisher, year, edition, pages
2008. , 12 p.
Series
LCA-REPORT, 2008-020
National Category
Engineering and Technology
Identifiers
URN: urn:nbn:se:kth:diva-116117OAI: oai:DiVA.org:kth-116117DiVA: diva2:590154
Note

QC 20130619

Available from: 2013-01-21 Created: 2013-01-15 Last updated: 2013-06-19Bibliographically approved

Open Access in DiVA

No full text

Other links

http://infoscience.epfl.ch/record/125716/files/SND_WSN_O08.pdf

Search in DiVA

By author/editor
Papadimitratos, Panos
By organisation
School of Electrical Engineering (EES)
Engineering and Technology

Search outside of DiVA

GoogleGoogle Scholar

urn-nbn

Altmetric score

urn-nbn
Total: 27 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf