Exploiting routing tree construction in CTP

1Citations
Citations of this article
21Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Sensor nodes in a Wireless Sensor Network (WSN) are scattered in an environment to collect data. These nodes are limited in resources and cannot process the collected data or store it for long periods of time. Thus, the sensor nodes rely on routing protocols to relay the collected data wirelessly to a central controller for analysis and storage. However, the routing protocols are not immune against malicious nodes because they sacrifice the security aspect to meet the limited resources of the sensor nodes. In this paper, we demonstrate how a malicious node can exploit the computation of link qualities in the Collection Tree routing Protocol (CTP) to disrupt the construction of routing trees. We propose a lightweight detection system to detect this malicious node. The proposed detection system is implemented and evaluated using the network simulator ns-2. The simulation results show that the detection system provides a robust detection. © 2012 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Hegazy, I., Safavi-Naini, R., & Williamson, C. (2012). Exploiting routing tree construction in CTP. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7115 LNCS, pp. 256–270). https://doi.org/10.1007/978-3-642-27890-7_21

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free