EACK: End-to-End acknowledgement-based method for reliable data collection in wireless sensor networks

Vahid Heydari, Seong Moo Yoo

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

Abstract

Reliability is the vital requirement in Wireless Sensor Networks (WSNs). Most routing protocols in WSNs assume that every node in the network is trustworthy. However, due to the open medium, the wide distribution, and the lack of nodes' physical protection, attackers can easily compromise WSNs by inserting misbehaving nodes, black hole attacks, into the network. In this paper a special end-to-end acknowledgment-based method, named EACK, for reliable data collection in WSNs is developed that, contrary to existing methods, resists collusion black hole attacks without using public-key cryptography, independent of MAC layer protocol, and does not need node-disjoint paths. Analytical and simulation results demonstrate that the EACK considerably decreases the network overhead and increases the packet delivery ratio compared to the existing methods.

Original languageEnglish (US)
Title of host publication2015 IEEE 2nd International Conference on InformationScience and Security, ICISS 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781467386111
DOIs
StatePublished - Jan 4 2016
Externally publishedYes
Event2nd IEEE International Conference on Information Science and Security, ICISS 2015 - Seoul, Korea, Republic of
Duration: Dec 14 2015Dec 16 2015

Publication series

Name2015 IEEE 2nd International Conference on InformationScience and Security, ICISS 2015

Other

Other2nd IEEE International Conference on Information Science and Security, ICISS 2015
Country/TerritoryKorea, Republic of
CitySeoul
Period12/14/1512/16/15

All Science Journal Classification (ASJC) codes

  • Safety, Risk, Reliability and Quality
  • Computer Networks and Communications
  • Information Systems

Fingerprint

Dive into the research topics of 'EACK: End-to-End acknowledgement-based method for reliable data collection in wireless sensor networks'. Together they form a unique fingerprint.

Cite this