MCC

Mitigating colluding collision attacks in wireless sensor networks

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Citations (Scopus)

Abstract

Stealthy packet dropping in multihop wireless sensor networks can be realized by the colluding collision attack. Colluding collision attack disrupts a packet from reaching its destination by malicious collusion at intermediate nodes. Moreover, the malicious nodes give the impression to their neighbors that they performed the legitimate forwarding action. Therefore, a legitimate node comes under suspicion. We provide a protocol called MCC to remedy the attack. MCC builds forwarding counters at each neighbor of the suspicious node and collaboratively compare the values of these counters to detect any discrepancy that could be caused by malicious packet dropping. We show through analysis and simulation that the basic local monitoring (BLM) fails to efficiently mitigate stealthy colluding collision attacks while MCC successfully mitigates them.

Original languageEnglish
Title of host publicationGLOBECOM - IEEE Global Telecommunications Conference
DOIs
Publication statusPublished - 1 Dec 2010
Externally publishedYes
Event53rd IEEE Global Communications Conference, GLOBECOM 2010 - Miami, FL, United States
Duration: 6 Dec 201010 Dec 2010

Other

Other53rd IEEE Global Communications Conference, GLOBECOM 2010
CountryUnited States
CityMiami, FL
Period6/12/1010/12/10

Fingerprint

Wireless sensor networks
Network protocols
Monitoring

Keywords

  • Colluding collision
  • Local monitoring
  • Malicious node
  • Multi-hop wireless networks
  • Packet dropping

ASJC Scopus subject areas

  • Electrical and Electronic Engineering

Cite this

MCC : Mitigating colluding collision attacks in wireless sensor networks. / Khalil, Issa.

GLOBECOM - IEEE Global Telecommunications Conference. 2010. 5683731.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Khalil, I 2010, MCC: Mitigating colluding collision attacks in wireless sensor networks. in GLOBECOM - IEEE Global Telecommunications Conference., 5683731, 53rd IEEE Global Communications Conference, GLOBECOM 2010, Miami, FL, United States, 6/12/10. https://doi.org/10.1109/GLOCOM.2010.5683731
Khalil, Issa. / MCC : Mitigating colluding collision attacks in wireless sensor networks. GLOBECOM - IEEE Global Telecommunications Conference. 2010.
@inproceedings{63efe66a5c384cf9b90504409942fff0,
title = "MCC: Mitigating colluding collision attacks in wireless sensor networks",
abstract = "Stealthy packet dropping in multihop wireless sensor networks can be realized by the colluding collision attack. Colluding collision attack disrupts a packet from reaching its destination by malicious collusion at intermediate nodes. Moreover, the malicious nodes give the impression to their neighbors that they performed the legitimate forwarding action. Therefore, a legitimate node comes under suspicion. We provide a protocol called MCC to remedy the attack. MCC builds forwarding counters at each neighbor of the suspicious node and collaboratively compare the values of these counters to detect any discrepancy that could be caused by malicious packet dropping. We show through analysis and simulation that the basic local monitoring (BLM) fails to efficiently mitigate stealthy colluding collision attacks while MCC successfully mitigates them.",
keywords = "Colluding collision, Local monitoring, Malicious node, Multi-hop wireless networks, Packet dropping",
author = "Issa Khalil",
year = "2010",
month = "12",
day = "1",
doi = "10.1109/GLOCOM.2010.5683731",
language = "English",
isbn = "9781424456383",
booktitle = "GLOBECOM - IEEE Global Telecommunications Conference",

}

TY - GEN

T1 - MCC

T2 - Mitigating colluding collision attacks in wireless sensor networks

AU - Khalil, Issa

PY - 2010/12/1

Y1 - 2010/12/1

N2 - Stealthy packet dropping in multihop wireless sensor networks can be realized by the colluding collision attack. Colluding collision attack disrupts a packet from reaching its destination by malicious collusion at intermediate nodes. Moreover, the malicious nodes give the impression to their neighbors that they performed the legitimate forwarding action. Therefore, a legitimate node comes under suspicion. We provide a protocol called MCC to remedy the attack. MCC builds forwarding counters at each neighbor of the suspicious node and collaboratively compare the values of these counters to detect any discrepancy that could be caused by malicious packet dropping. We show through analysis and simulation that the basic local monitoring (BLM) fails to efficiently mitigate stealthy colluding collision attacks while MCC successfully mitigates them.

AB - Stealthy packet dropping in multihop wireless sensor networks can be realized by the colluding collision attack. Colluding collision attack disrupts a packet from reaching its destination by malicious collusion at intermediate nodes. Moreover, the malicious nodes give the impression to their neighbors that they performed the legitimate forwarding action. Therefore, a legitimate node comes under suspicion. We provide a protocol called MCC to remedy the attack. MCC builds forwarding counters at each neighbor of the suspicious node and collaboratively compare the values of these counters to detect any discrepancy that could be caused by malicious packet dropping. We show through analysis and simulation that the basic local monitoring (BLM) fails to efficiently mitigate stealthy colluding collision attacks while MCC successfully mitigates them.

KW - Colluding collision

KW - Local monitoring

KW - Malicious node

KW - Multi-hop wireless networks

KW - Packet dropping

UR - http://www.scopus.com/inward/record.url?scp=79551638042&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=79551638042&partnerID=8YFLogxK

U2 - 10.1109/GLOCOM.2010.5683731

DO - 10.1109/GLOCOM.2010.5683731

M3 - Conference contribution

SN - 9781424456383

BT - GLOBECOM - IEEE Global Telecommunications Conference

ER -