EACK: End-to-End acknowledgement-based method for reliable data collection in wireless sensor networks

Vahid Heydari, Seong Moo Yoo

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

Reliability is the vital requirement in Wireless Sensor Networks (WSNs). Most routing protocols in WSNs assume that every node in the network is trustworthy. However, due to the open medium, the wide distribution, and the lack of nodes' physical protection, attackers can easily compromise WSNs by inserting misbehaving nodes, black hole attacks, into the network. In this paper a special end-to-end acknowledgment-based method, named EACK, for reliable data collection in WSNs is developed that, contrary to existing methods, resists collusion black hole attacks without using public-key cryptography, independent of MAC layer protocol, and does not need node-disjoint paths. Analytical and simulation results demonstrate that the EACK considerably decreases the network overhead and increases the packet delivery ratio compared to the existing methods.

Original languageEnglish (US)
Title of host publication2015 IEEE 2nd International Conference on InformationScience and Security, ICISS 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781467386111
DOIs
StatePublished - Jan 4 2016
Event2nd IEEE International Conference on Information Science and Security, ICISS 2015 - Seoul, Korea, Republic of
Duration: Dec 14 2015Dec 16 2015

Publication series

Name2015 IEEE 2nd International Conference on InformationScience and Security, ICISS 2015

Other

Other2nd IEEE International Conference on Information Science and Security, ICISS 2015
CountryKorea, Republic of
CitySeoul
Period12/14/1512/16/15

Fingerprint

Wireless sensor networks
Public key cryptography
Routing protocols
Network protocols

All Science Journal Classification (ASJC) codes

  • Safety, Risk, Reliability and Quality
  • Computer Networks and Communications
  • Information Systems

Cite this

Heydari, V., & Yoo, S. M. (2016). EACK: End-to-End acknowledgement-based method for reliable data collection in wireless sensor networks. In 2015 IEEE 2nd International Conference on InformationScience and Security, ICISS 2015 [7370998] (2015 IEEE 2nd International Conference on InformationScience and Security, ICISS 2015). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ICISSEC.2015.7370998
Heydari, Vahid ; Yoo, Seong Moo. / EACK : End-to-End acknowledgement-based method for reliable data collection in wireless sensor networks. 2015 IEEE 2nd International Conference on InformationScience and Security, ICISS 2015. Institute of Electrical and Electronics Engineers Inc., 2016. (2015 IEEE 2nd International Conference on InformationScience and Security, ICISS 2015).
@inproceedings{a783eec401af4fc28db27208cb601f59,
title = "EACK: End-to-End acknowledgement-based method for reliable data collection in wireless sensor networks",
abstract = "Reliability is the vital requirement in Wireless Sensor Networks (WSNs). Most routing protocols in WSNs assume that every node in the network is trustworthy. However, due to the open medium, the wide distribution, and the lack of nodes' physical protection, attackers can easily compromise WSNs by inserting misbehaving nodes, black hole attacks, into the network. In this paper a special end-to-end acknowledgment-based method, named EACK, for reliable data collection in WSNs is developed that, contrary to existing methods, resists collusion black hole attacks without using public-key cryptography, independent of MAC layer protocol, and does not need node-disjoint paths. Analytical and simulation results demonstrate that the EACK considerably decreases the network overhead and increases the packet delivery ratio compared to the existing methods.",
author = "Vahid Heydari and Yoo, {Seong Moo}",
year = "2016",
month = "1",
day = "4",
doi = "10.1109/ICISSEC.2015.7370998",
language = "English (US)",
series = "2015 IEEE 2nd International Conference on InformationScience and Security, ICISS 2015",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
booktitle = "2015 IEEE 2nd International Conference on InformationScience and Security, ICISS 2015",
address = "United States",

}

Heydari, V & Yoo, SM 2016, EACK: End-to-End acknowledgement-based method for reliable data collection in wireless sensor networks. in 2015 IEEE 2nd International Conference on InformationScience and Security, ICISS 2015., 7370998, 2015 IEEE 2nd International Conference on InformationScience and Security, ICISS 2015, Institute of Electrical and Electronics Engineers Inc., 2nd IEEE International Conference on Information Science and Security, ICISS 2015, Seoul, Korea, Republic of, 12/14/15. https://doi.org/10.1109/ICISSEC.2015.7370998

EACK : End-to-End acknowledgement-based method for reliable data collection in wireless sensor networks. / Heydari, Vahid; Yoo, Seong Moo.

2015 IEEE 2nd International Conference on InformationScience and Security, ICISS 2015. Institute of Electrical and Electronics Engineers Inc., 2016. 7370998 (2015 IEEE 2nd International Conference on InformationScience and Security, ICISS 2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - EACK

T2 - End-to-End acknowledgement-based method for reliable data collection in wireless sensor networks

AU - Heydari, Vahid

AU - Yoo, Seong Moo

PY - 2016/1/4

Y1 - 2016/1/4

N2 - Reliability is the vital requirement in Wireless Sensor Networks (WSNs). Most routing protocols in WSNs assume that every node in the network is trustworthy. However, due to the open medium, the wide distribution, and the lack of nodes' physical protection, attackers can easily compromise WSNs by inserting misbehaving nodes, black hole attacks, into the network. In this paper a special end-to-end acknowledgment-based method, named EACK, for reliable data collection in WSNs is developed that, contrary to existing methods, resists collusion black hole attacks without using public-key cryptography, independent of MAC layer protocol, and does not need node-disjoint paths. Analytical and simulation results demonstrate that the EACK considerably decreases the network overhead and increases the packet delivery ratio compared to the existing methods.

AB - Reliability is the vital requirement in Wireless Sensor Networks (WSNs). Most routing protocols in WSNs assume that every node in the network is trustworthy. However, due to the open medium, the wide distribution, and the lack of nodes' physical protection, attackers can easily compromise WSNs by inserting misbehaving nodes, black hole attacks, into the network. In this paper a special end-to-end acknowledgment-based method, named EACK, for reliable data collection in WSNs is developed that, contrary to existing methods, resists collusion black hole attacks without using public-key cryptography, independent of MAC layer protocol, and does not need node-disjoint paths. Analytical and simulation results demonstrate that the EACK considerably decreases the network overhead and increases the packet delivery ratio compared to the existing methods.

UR - http://www.scopus.com/inward/record.url?scp=84964671835&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84964671835&partnerID=8YFLogxK

U2 - 10.1109/ICISSEC.2015.7370998

DO - 10.1109/ICISSEC.2015.7370998

M3 - Conference contribution

AN - SCOPUS:84964671835

T3 - 2015 IEEE 2nd International Conference on InformationScience and Security, ICISS 2015

BT - 2015 IEEE 2nd International Conference on InformationScience and Security, ICISS 2015

PB - Institute of Electrical and Electronics Engineers Inc.

ER -

Heydari V, Yoo SM. EACK: End-to-End acknowledgement-based method for reliable data collection in wireless sensor networks. In 2015 IEEE 2nd International Conference on InformationScience and Security, ICISS 2015. Institute of Electrical and Electronics Engineers Inc. 2016. 7370998. (2015 IEEE 2nd International Conference on InformationScience and Security, ICISS 2015). https://doi.org/10.1109/ICISSEC.2015.7370998