Reliable Transmission Scheme Against Security Attacks in Wireless Sensor Networks
Title | Reliable Transmission Scheme Against Security Attacks in Wireless Sensor Networks |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Siasi, Nazli, Aldalbahi, Adel, Jasim, Mohammed A. |
Conference Name | 2019 International Symposium on Networks, Computers and Communications (ISNCC) |
Date Published | jun |
Keywords | cluster head, cluster routing protocols, composability, cyber physical systems, delays, diversity coding, encoding, Human Behavior, LEACH protocol, low energy adaptive clustering hierarchy, malicious security attacks, Metrics, network coding, Predictive Metrics, Protocols, pubcrawl, reliable transmission scheme, Resiliency, robust recovery schemes, Routing, Routing protocols, security, security attacks, selective forwarding attack, selective forwarding attacks, sensor security, telecommunication network reliability, telecommunication security, Wireless Sensor Network, Wireless sensor networks |
Abstract | Routing protocols in wireless sensor network are vulnerable to various malicious security attacks that can degrade network performance and lifetime. This becomes more important in cluster routing protocols that is composed of multiple node and cluster head, such as low energy adaptive clustering hierarchy (LEACH) protocol. Namely, if an attack succeeds in failing the cluster head, then the entire set of nodes fail. Therefore, it is necessary to develop robust recovery schemes to overcome security attacks and recover packets at short times. Hence this paper proposes a detection and recovery scheme for selective forwarding attacks in wireless sensor networks using LEACH protocol. The proposed solution features near-instantaneous recovery times, without the requirement for feedback or retransmissions once an attack occurs. |
DOI | 10.1109/ISNCC.2019.8909123 |
Citation Key | siasi_reliable_2019 |
- pubcrawl
- wireless sensor networks
- Wireless Sensor Network
- telecommunication security
- telecommunication network reliability
- sensor security
- selective forwarding attacks
- selective forwarding attack
- security attacks
- security
- Routing protocols
- Routing
- robust recovery schemes
- Resiliency
- reliable transmission scheme
- cluster head
- Protocols
- Predictive Metrics
- network coding
- Metrics
- malicious security attacks
- low energy adaptive clustering hierarchy
- LEACH protocol
- Human behavior
- encoding
- diversity coding
- delays
- cyber physical systems
- composability
- cluster routing protocols