Abstract:
In WSNs, packets are delivered through mostly static shortest paths to their destination. However, static packet delivery makes WSNs highly vulnerable to traffic analysis...Show MoreMetadata
Abstract:
In WSNs, packets are delivered through mostly static shortest paths to their destination. However, static packet delivery makes WSNs highly vulnerable to traffic analysis attacks due to open area deployment. Existing defence proposals fail to achieve a balance between the protection level and the resource constraints. In this paper, we present a proactive SDN-based Route Mutation (SRRM) scheme that enables changing the routes of the multiple flows in WSNs simultaneously to defend against passive and stealthy reconnaissance and sniffer attacks while preserving reliable and energy-aware routing. Multiple routes are ranked for packet flow based on node reliability, energy consumption, link cost, and route overlapping. Our extensive simulation results show that these techniques can effectively provide route obfuscation for software-defined WSNs.
Published in: 2021 IEEE Global Communications Conference (GLOBECOM)
Date of Conference: 07-11 December 2021
Date Added to IEEE Xplore: 02 February 2022
ISBN Information:
Keywords assist with retrieval of results and provide a means to discovering other relevant content. Learn more.
- IEEE Keywords
- Index Terms
- Mutation Strategy ,
- Energy Consumption ,
- Resource Constraints ,
- Shortest Path ,
- Multiple Routes ,
- Reliable Route ,
- Similarity Score ,
- Network Topology ,
- Flow Control ,
- Levels Of Damage ,
- Central Node ,
- Betweenness Centrality ,
- Communication Range ,
- Threat Model ,
- Datapath ,
- Sink Node ,
- Network Lifetime ,
- Control Path ,
- Flow Table ,
- Flow Rule ,
- Hop Count ,
- DoS Attacks ,
- Attack Success Rate ,
- Routing Mechanism ,
- Traffic Assignment ,
- Receiver Node ,
- Power Loss ,
- Energy Levels ,
- Boolean Variable ,
- Routing Cost
- Author Keywords
Keywords assist with retrieval of results and provide a means to discovering other relevant content. Learn more.
- IEEE Keywords
- Index Terms
- Mutation Strategy ,
- Energy Consumption ,
- Resource Constraints ,
- Shortest Path ,
- Multiple Routes ,
- Reliable Route ,
- Similarity Score ,
- Network Topology ,
- Flow Control ,
- Levels Of Damage ,
- Central Node ,
- Betweenness Centrality ,
- Communication Range ,
- Threat Model ,
- Datapath ,
- Sink Node ,
- Network Lifetime ,
- Control Path ,
- Flow Table ,
- Flow Rule ,
- Hop Count ,
- DoS Attacks ,
- Attack Success Rate ,
- Routing Mechanism ,
- Traffic Assignment ,
- Receiver Node ,
- Power Loss ,
- Energy Levels ,
- Boolean Variable ,
- Routing Cost
- Author Keywords