Using mobile agents to recover from node and database compromise in path-based DoS attacks in wireless sensor networks

Li, Bai and Batten, Lynn 2009, Using mobile agents to recover from node and database compromise in path-based DoS attacks in wireless sensor networks, Journal of network and computer applications, vol. 32, no. 2, pp. 377-387.

Attached Files
Name Description MIMEType Size Downloads

Title Using mobile agents to recover from node and database compromise in path-based DoS attacks in wireless sensor networks
Author(s) Li, Bai
Batten, Lynn
Journal name Journal of network and computer applications
Volume number 32
Issue number 2
Start page 377
End page 387
Publisher Academic Press
Place of publication London, England
Publication date 2009-03
ISSN 1084-8045
1095-8592
Keyword(s) denial of service attack
database
recovery
sensor networks
Summary Wireless sensor networks represent a new generation of real-time embedded systems with significantly different communication constraints from the traditional networked systems. With their development, a new attack called a path-based DoS (PDoS) attack has appeared. In a PDoS attack, an adversary, either inside or outside the network, overwhelms sensor nodes by flooding a multi-hop end-to-end communication path with either replayed packets or injected spurious packets. Detection and recovery from PDoS attacks have not been given much attention in the literature. In this article, we consider wireless sensor networks designed to collect and store data. In a path-based attack, both sensor nodes and the database containing collected data can be compromised. We propose a recovery method using mobile agents which can detect PDoS attacks easily and efficiently and recover the compromised nodes along with the database.
Language eng
Field of Research 100510 Wireless Communications
Socio Economic Objective 810106 Logistics
HERDC Research category C1 Refereed article in a scholarly journal
ERA Research output type C Journal article
HERDC collection year 2009
Copyright notice ©2008, Elsevier
Persistent URL http://hdl.handle.net/10536/DRO/DU:30019920

Document type: Journal Article
Collection: School of Information Technology
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 1 times in TR Web of Science
Scopus Citation Count Cited 7 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 470 Abstract Views, 6 File Downloads  -  Detailed Statistics
Created: Fri, 25 Sep 2009, 10:30:43 EST by Bai Li

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.