Openly accessible

Using mobile agents to detect node compromise in path-based DoS attacks on wireless sensor networks

Li, Bai and Batten, Lynn 2007, Using mobile agents to detect node compromise in path-based DoS attacks on wireless sensor networks, in WICOM 2007 Proceedings of the International Conference on Wireless Communications, Networking and Mobile Computing, Institute of Electrical and Electronics Engineers (IEEE), Piscataway, N.J., pp. 2507-2510.

Attached Files
Name Description MIMEType Size Downloads
batten-usingmobileagentstodetect-2007.pdf Published version application/pdf 316.27KB 92

Title Using mobile agents to detect node compromise in path-based DoS attacks on wireless sensor networks
Author(s) Li, Bai
Batten, Lynn
Conference name International Conference on Wireless Communications, Networking and Mobile Computing (2007: Shanghai, China)
Conference location Shanghai, China
Conference dates 21-25 September 2007
Title of proceedings WICOM 2007 Proceedings of the International Conference on Wireless Communications, Networking and Mobile Computing
Editor(s) Zhou, Huaibei
Burgmeyer, A. H.
Romeo, D
Publication date 2007
Conference series International Conference on Wireless Communications, Networking and Mobile Computing
Start page 2507
End page 2510
Total pages 4
Publisher Institute of Electrical and Electronics Engineers (IEEE)
Place of publication Piscataway, N.J.
Keyword(s) denial of service attack
detection
sensor networks
Summary Wireless sensor networks represent a new generation of real-time  embedded systems with significantly different communication constraints from the traditional networked systems. With their development, a new attack called a path-based DoS (PDoS) attack has appeared. In a PDoS attack, an adversary, either inside or outside the network, overwhelms sensor nodes by flooding a multi-hop endto- end communication path with either replayed packets or injected spurious packets. In this article, we propose a solution using mobile agents which can detect PDoS attacks easily.
ISBN 1424413117
9781424413119
Language eng
Field of Research 100599 Communications Technologies not elsewhere classified
Socio Economic Objective 970110 Expanding Knowledge in Technology
HERDC Research category E1 Full written paper - refereed
Copyright notice ©2007, Institute of Electrical and Electronics Engineers (IEEE)
Persistent URL http://hdl.handle.net/10536/DRO/DU:30007962

Document type: Conference Paper
Collections: School of Engineering and Information Technology
Open Access Collection
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 1 times in TR Web of Science
Scopus Citation Count Cited 2 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 464 Abstract Views, 92 File Downloads  -  Detailed Statistics
Created: Mon, 29 Sep 2008, 09:02:52 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.