Font Size: a A A

Directed diffusion routing protocol: Attacks and countermeasures

Posted on:2006-07-29Degree:M.SType:Thesis
University:Oklahoma State UniversityCandidate:Vijayaraman, RajkumarFull Text:PDF
GTID:2458390008962193Subject:Computer Science
Abstract/Summary:
Many routing protocols have been proposed for sensor networks, but none addresses the security problems. Directed diffusion is one of the routing protocols for sensor networks. In this paper we study possible attacks on the directed diffusion routing protocol and propose the integration of LEAP, a keying mechanism in to the directed diffusion routing protocol. Our main goal is to identify the potential range of attacks in sensor network and minimize the effects of these attacks. We propose the use of three types of keys to help prevent the various attacks on the sensor nodes. Since the size of each type of key is only 8 bytes, a laptop class adversary can actually break the keys used by the sensor nodes. To minimize this type of attack we extend our approach by proposing new neighbor comparison algorithm.; Our simulation result show that the memory space requirement is not an issue for a reasonable number of neighbors, but the communication cost is high in our proposed algorithm. (Abstract shortened by UMI.)...
Keywords/Search Tags:Directed diffusion, Attacks, Sensor
Related items