TY - GEN
T1 - Security of electrostatic field persistent routing
T2 - 9th European Dependable Computing Conference, EDCC 2012
AU - Ghica, Oliviu C.
AU - Nita-Rotaru, Cristina
AU - Trajcevski, Goce
AU - Scheuermann, Peter
N1 - Copyright:
Copyright 2012 Elsevier B.V., All rights reserved.
PY - 2012
Y1 - 2012
N2 - Electrostatic Field-based Routing (EFR) is a form of geographical multi-path routing where packets are routed along a collection of electrostatic field lines, defined by electrostatic charges associated with source and sink nodes. EFR provides an efficient and scalable solution to the workload balancing problem. However, it assumes that nodes behave in a cooperative manner making EFR-based routing protocols vulnerable to various attacks. We investigate the security aspects of EFR-based routing protocols. We focus on an instance of EFR, called Multi-Pole Field Persistent Routing (MP-FPR), for which we identify attacks that can target different components of the protocol, and propose a set of corresponding defense mechanisms. We present extensive experimental evaluations of the impact of the different attacks and the effectiveness of the proposed defense mechanisms.
AB - Electrostatic Field-based Routing (EFR) is a form of geographical multi-path routing where packets are routed along a collection of electrostatic field lines, defined by electrostatic charges associated with source and sink nodes. EFR provides an efficient and scalable solution to the workload balancing problem. However, it assumes that nodes behave in a cooperative manner making EFR-based routing protocols vulnerable to various attacks. We investigate the security aspects of EFR-based routing protocols. We focus on an instance of EFR, called Multi-Pole Field Persistent Routing (MP-FPR), for which we identify attacks that can target different components of the protocol, and propose a set of corresponding defense mechanisms. We present extensive experimental evaluations of the impact of the different attacks and the effectiveness of the proposed defense mechanisms.
KW - routing
KW - security
KW - wireless sensor networks
UR - http://www.scopus.com/inward/record.url?scp=84864242561&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84864242561&partnerID=8YFLogxK
U2 - 10.1109/EDCC.2012.23
DO - 10.1109/EDCC.2012.23
M3 - Conference contribution
AN - SCOPUS:84864242561
SN - 9780769546711
T3 - Proceedings - 9th European Dependable Computing Conference, EDCC 2012
SP - 102
EP - 113
BT - Proceedings - 9th European Dependable Computing Conference, EDCC 2012
Y2 - 8 May 2012 through 11 May 2012
ER -