2007
DOI: 10.1016/j.comcom.2007.04.013
|View full text |Cite
|
Sign up to set email alerts
|

Using overhearing technique to detect malicious packet-modifying attacks in wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2009
2009
2020
2020

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(11 citation statements)
references
References 29 publications
(36 reference statements)
0
11
0
Order By: Relevance
“…There are two possible ways to know if the acknowledged packet was forwarded or not, either by monitoring the node using overhearing capability (see [20] or [10]) or by having feedback from other nodes that are on the route to the destination. Feedback from other nodes will include communication overhead and is not instant.…”
Section: B General Frameworkmentioning
confidence: 99%
“…There are two possible ways to know if the acknowledged packet was forwarded or not, either by monitoring the node using overhearing capability (see [20] or [10]) or by having feedback from other nodes that are on the route to the destination. Feedback from other nodes will include communication overhead and is not instant.…”
Section: B General Frameworkmentioning
confidence: 99%
“…modify the packets and then forward them), not to forward the packets and forward them to the destination, respectively. The actions of the agents can be observed by overhearing agents' transmissions, which is possible due to the broadcast nature of wireless transmissions [4], [8]. In this work we assume that an IDS periodically performs the overhearing process and then the TMS updates the trust values of the agents and disseminates the new ones to them.…”
Section: System Model a Agents' Interactions And Modelingmentioning
confidence: 99%
“…The monitoring mechanisms deployed for detecting agents' actions and especially misbehavior patterns are called Intrusion Detection Systems (IDS). The most commonly used IDS technique is overhearing an agent's transmissions [1], [4], [8]. However, low energy budget networks, such as WSNs, may employ partial monitoring IDS schemes that periodically sample the agents' packets to decide on their behavior as discussed in [9].…”
Section: Introductionmentioning
confidence: 99%
“…In [8], Ssu et al proposed the overhearing-based detection mechanism (ODB) in which PMAs launched by a forwarding node can be detected in collaboration among its surrounding nodes in WSNs. For each forwarding node, some of its neighboring nodes are chosen as its committee nodes.…”
Section: Overhearing-based Detection Mechanism (Obd)mentioning
confidence: 99%
“…Another type of potential insider attacks is packet modification attacks (PMAs) [8]. In PMAs, an adversary uses some compromised nodes to skillfully modify some legitimate packets passing through the nodes, with the goal of preventing notifications of critical events to the BSs or BSs' control over downstream nodes.…”
Section: Introductionmentioning
confidence: 99%