Openly accessible

Using mobile agents to detect and recover from node compromise in path-based DoS attacks in wireless sensor networks

Li, Bai and Batten, Lynn 2007, Using mobile agents to detect and recover from node compromise in path-based DoS attacks in wireless sensor networks, in 2007 IFIP International Conference on Network and Parallel Computing Workshops : proceedings : NPC 2007, 18-21 September, 2007, Dalian, China, IEEE Computer Society Press, Piscataway, N.J., pp. 156-163.

Attached Files
Name Description MIMEType Size Downloads
batten-usingmobileagents-2007.pdf Published version application/pdf 401.86KB 122

Title Using mobile agents to detect and recover from node compromise in path-based DoS attacks in wireless sensor networks
Author(s) Li, Bai
Batten, Lynn
Conference name NPC 2007 (2007 : Dalian, China)
Conference location Dalian, China
Conference dates 18-21 September 2007
Title of proceedings 2007 IFIP International Conference on Network and Parallel Computing Workshops : proceedings : NPC 2007, 18-21 September, 2007, Dalian, China
Editor(s) Li, Keqiu
Xiang, Yang
Jin, Hai
Qu, Wenyu
Cao, Zhiying
Publication date 2007
Conference series IFIP Conference on Network and Parallel Computing Workshops
Start page 156
End page 163
Publisher IEEE Computer Society Press
Place of publication Piscataway, N.J.
Keyword(s) denial of service attack
detection
recovery
sensor networks
Summary Wireless sensor networks represent a new generation of real-time embedded systems with significantly different communication constraints from the traditional networked systems. With their development, a new attack called a path-based DoS (PDoS) attack has appeared. In a PDoS attack, an adversary, either inside or outside the network, overwhelms sensor nodes by flooding a multi-hop end-to end communication path with either replayed packets or injected spurious packets. Detection and recovery from PDoS attacks have not been given much attention in the literature. In this article, we propose a solution using mobile agents which can detect PDoS attacks easily and efficiently and recover the compromised nodes.
Notes This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.
ISBN 3540747834
9783540747833
Language eng
Field of Research 100599 Communications Technologies not elsewhere classified
Socio Economic Objective 970110 Expanding Knowledge in Technology
HERDC Research category E1 Full written paper - refereed
Copyright notice ©2007, IEEE.
Persistent URL http://hdl.handle.net/10536/DRO/DU:30007963

Document type: Conference Paper
Collections: School of Engineering and Information Technology
Open Access Collection
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 0 times in TR Web of Science
Google Scholar Search Google Scholar
Access Statistics: 453 Abstract Views, 196 File Downloads  -  Detailed Statistics
Created: Mon, 29 Sep 2008, 09:02:53 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.