Abstract
Recently, sensor networks support solutions for various applications. These sensor networks have limitations of system resource. Therefore, there are a number of proposals to solve these problems. Those, however, do not consider security problem. In the sensor networks, the security is a critical issue since an entire resource of sensor nodes can be consumed by attackers. In this paper, we will consider security problems about the MAC protocol which extends lifetime of node using active signal that prevents receiving duplicate messages, and the routing algorithm which considers node’s lifetime. Then we propose countermeasures that establish the trust relationship between neighboring sensor nodes, checks the bi-directionality each nodes, and authenticates node’s information messages.
This research was supported by the MIC(Ministry of Information and Communication), Korea, under the ITRC(Information Technology Research Center) support program supervised by the IITA(Institute of Information Technology Assessment).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Chris, K., David, W.: Secure Routing in Wireless Sensor Network. Attacks and Countermeasures, 113–127 (2003)
Chunlong, G., Lizhi Charlie, Z., Jan, M.: Low power distributed MAC for ad-hoc sensor radio networks, pp. 2944–2948. IEEE, Los Alamitos (2001)
Jungahn, H.: Protocols to extend lifetime and to improve QoS in wireless sensor networks (2004)
Douceur, J.R.: The Sybil Attack (2002)
Perring, A., Johnson, D.B.: Wormhole detection in wireless ad-hoc networks (2002)
Perring, A., Szewczyk., R., Wen, V., Culler, D., Tygar, J.D.: SPINS: Security protocols for sensor networks (2001)
Ye, F., Chen, A., Lu, S., Zhang, L.: A scalable solution to minimum cost forwarding in large sensor networks, pp. 243–254 (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Mun, Y., Shin, C. (2005). Secure Routing in Sensor Networks: Security Problem Analysis and Countermeasures. In: Gervasi, O., et al. Computational Science and Its Applications – ICCSA 2005. ICCSA 2005. Lecture Notes in Computer Science, vol 3480. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11424758_48
Download citation
DOI: https://doi.org/10.1007/11424758_48
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-25860-5
Online ISBN: 978-3-540-32043-2
eBook Packages: Computer ScienceComputer Science (R0)