MCC: Mitigating colluding collision attacks in wireless sensor networks

Issa Khalil*

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

11 Citations (Scopus)

Abstract

Stealthy packet dropping in multihop wireless sensor networks can be realized by the colluding collision attack. Colluding collision attack disrupts a packet from reaching its destination by malicious collusion at intermediate nodes. Moreover, the malicious nodes give the impression to their neighbors that they performed the legitimate forwarding action. Therefore, a legitimate node comes under suspicion. We provide a protocol called MCC to remedy the attack. MCC builds forwarding counters at each neighbor of the suspicious node and collaboratively compare the values of these counters to detect any discrepancy that could be caused by malicious packet dropping. We show through analysis and simulation that the basic local monitoring (BLM) fails to efficiently mitigate stealthy colluding collision attacks while MCC successfully mitigates them.

Original languageEnglish
Title of host publication2010 IEEE Global Telecommunications Conference, GLOBECOM 2010
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Print)9781424456383
DOIs
Publication statusPublished - 2010
Externally publishedYes
Event53rd IEEE Global Communications Conference, GLOBECOM 2010 - Miami, United States
Duration: 6 Dec 201010 Dec 2010

Publication series

NameGLOBECOM - IEEE Global Telecommunications Conference

Conference

Conference53rd IEEE Global Communications Conference, GLOBECOM 2010
Country/TerritoryUnited States
CityMiami
Period6/12/1010/12/10

Keywords

  • Colluding collision
  • Local monitoring
  • Malicious node
  • Multi-hop wireless networks
  • Packet dropping

Fingerprint

Dive into the research topics of 'MCC: Mitigating colluding collision attacks in wireless sensor networks'. Together they form a unique fingerprint.

Cite this