Incident-Avoidance Routing in Wireless Sensor Networks
Wireless Sensor Networks (WSNs) are being deployed widely thanks to recent advances in wireless communication technologies. Many WSNs may form in hostile environments, especially in military applications. Sensor nodes are thus prone to different types of attacks such as jamming, collision attacks, and eavesdropping. Once a sensor node is compromised, it is likely that the information passing through this node will be revealed to the attacker, or will never reach the destination (e.g., in jamming attacks). In this paper, the authors propose a cross-layer scheme that uses information from the application layer to locate compromised nodes, computes a new, secure path connecting the source and destination and routes data packets along the new path to the destination.