TY - GEN
T1 - EACK
T2 - 2nd IEEE International Conference on Information Science and Security, ICISS 2015
AU - Heydari, Vahid
AU - Yoo, Seong Moo
N1 - Publisher Copyright:
© 2015 IEEE.
PY - 2016/1/4
Y1 - 2016/1/4
N2 - Reliability is the vital requirement in Wireless Sensor Networks (WSNs). Most routing protocols in WSNs assume that every node in the network is trustworthy. However, due to the open medium, the wide distribution, and the lack of nodes' physical protection, attackers can easily compromise WSNs by inserting misbehaving nodes, black hole attacks, into the network. In this paper a special end-to-end acknowledgment-based method, named EACK, for reliable data collection in WSNs is developed that, contrary to existing methods, resists collusion black hole attacks without using public-key cryptography, independent of MAC layer protocol, and does not need node-disjoint paths. Analytical and simulation results demonstrate that the EACK considerably decreases the network overhead and increases the packet delivery ratio compared to the existing methods.
AB - Reliability is the vital requirement in Wireless Sensor Networks (WSNs). Most routing protocols in WSNs assume that every node in the network is trustworthy. However, due to the open medium, the wide distribution, and the lack of nodes' physical protection, attackers can easily compromise WSNs by inserting misbehaving nodes, black hole attacks, into the network. In this paper a special end-to-end acknowledgment-based method, named EACK, for reliable data collection in WSNs is developed that, contrary to existing methods, resists collusion black hole attacks without using public-key cryptography, independent of MAC layer protocol, and does not need node-disjoint paths. Analytical and simulation results demonstrate that the EACK considerably decreases the network overhead and increases the packet delivery ratio compared to the existing methods.
UR - http://www.scopus.com/inward/record.url?scp=84964671835&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84964671835&partnerID=8YFLogxK
U2 - 10.1109/ICISSEC.2015.7370998
DO - 10.1109/ICISSEC.2015.7370998
M3 - Conference contribution
AN - SCOPUS:84964671835
T3 - 2015 IEEE 2nd International Conference on InformationScience and Security, ICISS 2015
BT - 2015 IEEE 2nd International Conference on InformationScience and Security, ICISS 2015
PB - Institute of Electrical and Electronics Engineers Inc.
Y2 - 14 December 2015 through 16 December 2015
ER -