Abstract
In a hostile environment, sensor nodes may be compromised and then be used to launch various attacks. One severe attack is false data injection which is becoming a serious threat to wireless sensor networks. An attacker uses the compromised node to flood the network and exhaust network resources by injecting a large number of bogus packets. In this paper, we study how to locate the attack node using a framework of packet marking and packet logging. We propose a combined packet marking and logging scheme for traceback (CPMLT). In CPMLT, one packet can be marked by up to M nodes, each node marks a packet with certain probability. When one packet is marked by M nodes, the next marking node will log this packet. Through combining packet marking and logging, we can reconstruct the entire attack path to locate the attack node by collecting enough packets. In our simulation, CPMLT achieves fast traceback with little logging overhead.
Similar content being viewed by others
References
Culler D, Estrin D, Srivastava M. Overview of sensor networks. IEEE Computer Magazine, 2004, 37(8): 41–49
Szewczyk R, Osterweil E, Polastre J, Hamilton M, Mainwaring A, Estrin D. Application driven systems research: habitat monitoring with sensor networks. Communications of the ACM, 2004, 47(6): 34–40
Zhu S, Setia S, Jajodia S, Ning P. An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks. In: Proceedings of 2004 IEEE Symposium on Security and Privacy. 2004, 259–271
Yang H, Ye F, Yuan Y, Lu S, Arbaugh W. Toward resilient security in wireless sensor networks. In: Proceedings of 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing. 2005, 34–45
Ye F, Yang H, Liu Z. Catching “moles” in sensor networks. In: Proceedings of 27th IEEE International Conference on Distributed Computing Systems. 2007
Sy D, Bao L. CAPTRA: coordinated packet traceback. In: Proceedings of 5th International Conference on Information Processing in Sensor Networks. 2006, 152–159
Savage S, Wetherall D, Karlin A, Anderson T. Practical network support for IP traceback. In: Proceedings of 2000 SIGCOMM. 2000, 295–306
Snoeren A C, Partridge C, Sanchez L A, Jones C E, Tchakountio F, Kent S T, Timothy Strayer W. Hash-based IP traceback. In: Proceedings of 2001 SIGCOMM. 2001, 3–14
Song D, Perrig A. Advanced and authenticated marking schemes for IP traceback. In: Proceedings of 20th IEEE INFOCOM. 2001, 878–886
Li J, Sung M, Xu J, Li L, Zhao Q. Large-scale IP traceback in high-speed internet: practical techniques and theoretical foundation. In: Proceedings of 2004 IEEE Symposium on Security and Privacy. 2004, 115–129
Burch H, Cheswick B. Tracing anonymous packets to their approximate source. In: Proceedings of 14th USENIX conference on System administration. 2000, 319–328
Garber L. Denial-of-service attacks Rip the internet. Computer, 2000, 33(4): 12–17
Karp B, Kung H T. Gpsr: greedy perimeter stateless routing for wireless networks. In: Proceedings of 2000 ACM International Conference on Mobile Computing and Networking. 2000, 243–254
Kim Y J, Govindan R, Karp B, Shenker S. Geographic routing made practical. In: Proceedings of 2nd USENIX Symposium on Network Design and Implementation. 2005, 217–230
Fonseca R, Ratnasamy S, Zhao J, Tien Ee C, Culler D, Shenker S, Stoica I. Beacon vector routing: scalable point-to-point routing in wireless sensornets. In: Proceedings of 2nd USENIX Symposium on Network Design and Implementation. 2005, 329–342
Author information
Authors and Affiliations
Corresponding author
Additional information
Jun Xu received B.S. Degree in computer science from Jinan University, China, in 2006. Currently, he is a Ph.D. student of Department of Computer Science of University of Science and Technology of China under the supervision of Prof. Xuehai Zhou. His current research interests include wireless sensor networks and operating system.
Xuehai Zhou received the B.Sc., M.Sc. and Ph.D. degrees in computer science from University of Science and Technology of China (USTC), China, in 1987, 1990 and 1997. He is currently a professor and Ph.D. candidate supervisor in the Department of Computer Science of University of Science and Technology of China (USTC), China, and he is also the dean of collage of software engineer in USTC. He has chaired and participated in multiple national research projects supported by State 863 and the National Natural Science Foundation of China. His research interests include computer architecture, embedded system, wireless sensor networks and mobile cloud computing.
Feng Yang received the Ph.D. degree in computer science from University of Science and Technology of China (USTC), China, in 2009. Currently, he is a postdoctoral in the Department of Computer Science at USTC. His research interests include wireless sensor networks and smart phone security.
Rights and permissions
About this article
Cite this article
Xu, J., Zhou, X. & Yang, F. Traceback in wireless sensor networks with packet marking and logging. Front. Comput. Sci. China 5, 308–315 (2011). https://doi.org/10.1007/s11704-011-0361-y
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11704-011-0361-y