access icon free Non-repeatedly marking traceback model for wireless sensor networks

When networks are under attack, traceback schemes can be used to locate the compromised node and remove the compromised node from the network. To resolve the problem that marked information has been easy to be covered by the information of down-stream node in the traceback schemes based on probabilistic packet marking (PPM), ‘a non-repeatedly marking traceback scheme for wireless sensor networks (NMtrace) is proposed to locate the compromised nodes in this study’. In the NMtrace, when a packet is forwarding to the base station, if the edge information of the packet has been marked by forwarding nodes, the packet will not be marked again by the other nodes. The security shows that the NMtrace can resilience against various attacks which are launched by the compromised forwarding nodes collude with compromised source node. The performance evaluation shows that with the length of the attack path increasing, ‘the NMtrace needs fewer’ packets to reconstruct the attack path than the PPM-based schemes, the complete convergence rate less affected by the marking probability p and the energy ‘consumption of the NMtrace is also’ less than PPM-based schemes.

Inspec keywords: wireless sensor networks

Other keywords: forwarding nodes; energy consumption; PPM-based schemes; NMtrace; performance evaluation; probabilistic packet marking; base station; wireless sensor networks; down-stream node; nonrepeatedly marking traceback model; traceback schemes

Subjects: Wireless sensor networks

References

    1. 1)
      • 14. Saurabh, S., Sairam, A.S.: ‘Linear and remainder packet marking for fast IP traceback’. 2012 Fourth Int. Conf. on Communication Systems and Networks (COMSNETS), January 2012, pp. 18.
    2. 2)
      • 12. Savage, S., Wetherall, D., Karlin, A., Anderson, T.: ‘Practical network support for IP traceback’. Proc. ACM SIGCOMM, 2000, pp. 295306.
    3. 3)
    4. 4)
      • 16. Duwairi, B., Chakrabarti, A., Manimaran, G.: ‘An efficient packet marking scheme for IP traceback’. Proc. Networking 2004, Athens, Greece, 2004, vol. 34, no. 2, pp. 3954.
    5. 5)
      • 13. Akyuz, T., Sogukpinar, I.: ‘Packet marking with distance based probabilities for IP traceback’. First Int. Conf. on Networks and Communications, 2009, pp. 433438.
    6. 6)
    7. 7)
    8. 8)
      • 5. Enzmann, M., Krauß, C., Eckert, C.: ‘PDoS-resilient push protocols for sensor networks’. Third Int. Conf. on Sensor Technologies and Applications, Athens, Glyfada, Greece, 2009, pp. 455461.
    9. 9)
      • 3. Ye, F., Luo, H., Lu, S., Zhang, L.: ‘Statistical en-route filtering of injected false data in sensor networks’. Proc. 23rd Annual Joint Conf. of the IEEE Computer and Communications Societies (INFOCOM 2004), Hong Kong, 2004, pp. 24462457.
    10. 10)
      • 11. Xu, J., Zhou, X., Yang, F.: ‘Edge-based traceback in sensor networks’. 2010 Sixth Int. Conf. on Wireless Communications, Networking and Mobile Computing, Chengdu, China, 2010, pp. 14.
    11. 11)
      • 18. Siradjev, D., Yunusov, L., Young-Tak, K.: ‘Security management with scalable distributed IP traceback’. IFIP/IEEE Int. Symp. on Integrated Network Management, June 2009, pp. 598605.
    12. 12)
    13. 13)
      • 17. Gong, C., Sarac, K.: ‘IP traceback based on packet marking and logging’. IEEE Int. Conf. on Communications (ICC 2005), Seoul, Korea, 2005, vol. 3, no. 4, pp. 10431047.
    14. 14)
      • 4. Yu, Z., Guan, Y.: ‘A dynamic en-route scheme for filtering false data injection in wireless sensor networks’. 25th IEEE Int. Conf. on Computer Communications, Barcelona, Spain, 23 April–29 April 2006, pp. 294295.
    15. 15)
      • 8. Sy, D., Bao, L.: ‘CAPTRA: CoordinAted Packet TRAceback’. The Fifth Int. Conf. on Information Processing in Sensor Networks (IPSN), Nashville, TN, 19–21 April 2006, pp. 152159.
    16. 16)
    17. 17)
      • 10. Ye, F., Yang, H., Liu, Z.: ‘Catching moles in sensor networks’. IEEE Int. Conf. on Distributed Computing Systems (ICDCS), Toronto, Canada, 2007, pp. 6977.
    18. 18)
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-wss.2014.0005
Loading

Related content

content/journals/10.1049/iet-wss.2014.0005
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading