ABSTRACT
This paper focuses on defending against compromised nodes' dropping of legitimate reports and investigates the misbehavior of a maliciously packet-dropping node in sensor networks. We present a resilient packet-forwarding scheme using Neighbor Watch System (NWS), specifically designed for hop-by-hop reliable delivery in face of malicious nodes that drop relaying packets, as well as faulty nodes that fail to relay packets. Unlike previous work with multipath data forwarding, our scheme basically employs single-path data forwarding, which consumes less power than multipath schemes. As the packet is forwarded along the single-path toward the base station, our scheme, however, converts into multipath data forwarding at the location where NWS detects relaying nodes' misbehavior. Simulation experiments show that, with the help of NWS, our forwarding scheme achieves a high success ratio in face of a large number of packet-dropping nodes, and effectively adjusts its forwarding style, depending on the number of packet-dropping nodes en-route to the base station.
- R. Anderson, H. Chan, and A. Perrig, Key Infection: Smart Trust for Smart Dust, IEEE ICNP 2004 Google ScholarDigital Library
- Burton H. Bloom, Space/Time Trade-offs in Hash Coding with Allowable Errors, Communication of the ACM, vol. 13, 422--426, 1970 Google ScholarDigital Library
- B. Carbunar, I. Ioannidis, and C. Nita-Rotaru, JANUS: Towards Robust and Malicious Resilient Routing in Hybrid Wireless Networks, ACM workshop on Wireless security (WiSe'04), Oct. 2004 Google ScholarDigital Library
- H. Chan, A. Perrig, and D. Song, Random Key Predistribution Schemes for Sensor Networks, IEEE Symposium on Security and Privacy, pp. 197-213, May 2003. Google ScholarDigital Library
- B. Deb, S. Bhatnagar, and B. Nath, ReInForM: Reliable Information Forwarding Using Multiple Paths in Sensor Networks, IEEE Local Computer Networks (LCN 2003), pp. 406--415, Oct. 2003. Google ScholarDigital Library
- J. Deng, R. Han, and S. Mishra, A Performance Evaluation of Intrusion- Tolerant Routing in Wireless Sensor Networks, 2nd International Workshop on Information Processing in Sensor Networks (IPSN 03), pp. 349--364, Apr. 2003. Google ScholarDigital Library
- J. Deng, R. Han, and S. Mishra, Intrusion Tolerance and Anti-Traffic Analysis Strategies for Wireless Sensor Networks, IEEE International Conference on Dependable Systems and Networks (DSN), pp. 594--603, 2004. Google ScholarDigital Library
- J. Deng, R. Han, and S. Mishra, Defending against Path-based DoS Attacks in Wireless Sensor Networks, ACM Workshop on Security of Ad-Hoc and Sensor Networks (SASN'05), Nov, 2005. Google ScholarDigital Library
- K. Fall and K. Varadhan (editors), NS notes and documentation, The VINT project, LBL, Feb 2000, http://www.isi.edu/nsnam/ns/Google Scholar
- D. Ganesan, R. Govindan, S. Shenker, and D. Estrin, Highly Resilient, Energy-Efficient Multipath Routing in Wireless Sensor Networks, Computing and Communications Review (MC2R) Vol 1., pp. 11--25, 2002. Google ScholarDigital Library
- V. D. Gligor, Security of Emergent Properties in Ad-Hoc Networks, International Workshop on Security Protocols, Apr. 2004. Google ScholarDigital Library
- O. Goldreich, S. Goldwasser, and S. Micali, How to Construct Random Functions, Journal of the ACM, Vol. 33, No. 4, 210--217, 1986 Google ScholarDigital Library
- L. Eschenauer and V. D. Gligor, A Key-Management Scheme for Distributed Sensor Networks, 9th ACM Conference on Computer and Communication Security (CCS), pp. 41--47, Nov. 2002. Google ScholarDigital Library
- C. Hartung, J. Balasalle, and R. Han, Node Compromise in Sensor Networks: The Need for Secure Systems, Technical Report CU-CS-990-05, Department of Computer Science University of Colorado at Boulder, Jan. 2005Google Scholar
- T. He, S. Krishnamurthy, J. A. Stankovic, T. F. Abdelzaher, L. Luo, R. Stoleru, T. Yan, L. Gu, J. Hui, and B. Krogh, An Energy-Efficient Surveillance System Using Wireless Sensor Networks, ACM MobiSys'04, June, 2004 Google ScholarDigital Library
- W.R. Heinzelman, J. Kulik, H. Balakrishnan, Adaptive Protocols for Information Dissemination in Wireless Sensor Networks, ACM MobiCom99, pp. 174--185, 1999. Google ScholarDigital Library
- J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. Culler, and K. Pister, System Architecture Directions for Networked Sensors, ACU ASPLOS IX, November 2000. Google ScholarDigital Library
- X. Hong, M. Gerla, W. Hanbiao, and L. Clare, Load Balanced, Energy-Aware Communications for Mars Sensor Networks, IEEE Aerospace Conference, vol.3, 1109--1115, 2002.Google ScholarCross Ref
- Y.-C. Hu, D. B. Johnson, and A. Perrig, SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks, IEEE Workshop on Mobile Computing Systems and Applications, pp. 3--13, Jun. 2002. Google ScholarDigital Library
- Y.-C. Hu, A. Perrig, and D. B. Johnson, Efficient Security Mechanisms for Routing Protocols, NDSS 2003, pp. 57--73, Feb. 2003.Google Scholar
- C. Intanagonwiwat, R. Govindan and D. Estrin, Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks, MobiCom'00, Aug. 2000. Google ScholarDigital Library
- D. Johnson, D.A. Maltz, and J. Broch, The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (Internet-Draft), Mobile Ad-hoc Network (MANET) Working Group, IETF, Oct. 1999.Google Scholar
- C. Karlof and D. Wagner, Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures, The First IEEE International Workshop on Sensor Network Protocols and Applications, pp. 113--127, May 2003Google ScholarCross Ref
- C. Karlof, N. Sastry, and D. Wagner, TinySec: A Link Layer Security Architecture for Wireless Sensor Networks, ACM SensSys'04, pp. 162--175, Nov. 2004. Google ScholarDigital Library
- I. Khalil, S. Bagchi, and C. Nina-Rotaru, DICAS: Detection, Diagnosis and Isolation of Control Attacks in Sensor Networks, IEEE SecureComm 2005, pp. 89--100, Sep. 2005 Google ScholarDigital Library
- Y. Liu and W. K.G. Seah, A Priority-Based Multi-Path Routing Protocol for Sensor Networks, 15th IEEE International Symposium on Volume 1, 216--220, 2004Google Scholar
- S.-B. Lee and Y.-H. Choi, A Secure Alternate Path Routing in Sensor Networks, Computer Communications (2006), doi:10.1016/j.comcom.2006.08.006. Google ScholarDigital Library
- S. Marti, T.J. Giuli, K. Lai, and M. Baker, Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, ACM/IEEE International Conference on Mobile Computing and Networking, pp. 255--265, 2000 Google ScholarDigital Library
- H. Morcos, I. Matta, and A. Bestavros, $M^2RC$: Multiplicative-Increase/Additive-Decrease Multipath Routing Control for Wireless Sensor Networks, ACM SIGBED Review, Vol. 2, Jan 2005. Google ScholarDigital Library
- J. Newsome, E. Shi, D. Song, and A. Perrig, The Sybil Attack in Sensor Networks: Analysis and Defenses, IEEE IPSN'04, pp. 259--268, Apr. 2004. Google ScholarDigital Library
- B. Parno, A. Perrig, and V. D. Gligor, Distributed Detection of Node Replication Attacks in Sensor Networks, the 2005 IEEE Symposium on Security and Privacy, pp. 49--63, May 2005. Google ScholarDigital Library
- A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. Tygar, SPINS: Security Protocols for Sensor Networks, ACM MobiCom'01, pp. 189--199, 2001. Google ScholarDigital Library
- A. Perrig, J. Stankovic, and D. Wagner, Security in Wireless Sensor Networks, Communications of the ACM, 47(6), Special Issue on Wireless sensor networks, pp.53--57, Jun. 2004 Google ScholarDigital Library
- B. Przydatek, D. Song, and A. Perrig, SIA: Secure Information Aggregation in Sensor Networks, 1st International Conference on Embedded Networked Sensor Systems, 255--256, 2003 Google ScholarDigital Library
- E. Shi and A. Perrig, Designing Secure Sensor Networks, Wireless Communications, IEEE Volume 11, Issue 6, pp. 38--43, Dec. 2004. Google ScholarDigital Library
- D. Tian and N.D. Georganas, Energy Efficient Routing with Guaranteed Delivery in Wireless Sensor Networks, IEEE Wireless Communications and Networking (WCNC 2003), IEEE Volume 3, 1923--1929, March 2003Google Scholar
- A. Woo, T. Tong, and D. Culler, Taming the Underlying Challenges of Reliable Multhop Routing in Sensor Networks, ACM SenSys 03, Nov, 2003 Google ScholarDigital Library
- A. Wood and J. Stankovic, Denial of Service in Sensor Networks, IEEE Computer, Vol.35, 54--62, Oct. 2002 Google ScholarDigital Library
- H. Yang, F. Ye, Y. Yuan, S. Lu and W. Arbough, Toward Resilient Security in Wireless Sensor Networks, ACM MobiHoc'05, 34--45, May 2005 Google ScholarDigital Library
- Y. Yang, X. Wang, S. Zhu, and G. Cao SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks, ACM MobiHoc'06 May 2006 Google ScholarDigital Library
- F. Ye, H. Luo, S. Lu and L. Zhang, Statictial En-route Filtering of Injected False Data in Sensor Networks, IEEE INFOCOM, 2004 Google ScholarDigital Library
- F. Ye, G. Zhong, S. Lu and L. Zhang, GRAdient Broadcast: A Robust Data Delivery Protocol for Large Scale Sensor Networks, ACM Wireless Networks (WINET), March 2005 Google ScholarDigital Library
- Y. Yu, R. Govindan, and D. Estrin, Geographical and Energy Aware Routing: a recursive data dissemination protocol for wireless sensor networks, UCLA Computer Science Department Technical Report UCLA/CSD-TR-01-0023, May 2001.Google Scholar
- W. Zhang and G. Cao, Group Rekeying for Filtering False Data in Sensor Networks: A Predistribution and Local Collaboration-Based Approach, IEEE INFOCOM'05. Vol. 1, 503--514, March 2005Google Scholar
- G. Zhou, T. He, S. Krishnamurthy, and J. A. Stankovic, Impact of radio irregularity on wireless sensor networks, the 2nd International Conference on Mobile Systems, Applications, and Services (MobiSys 04), June, 2004 Google ScholarDigital Library
- S. Zhu, S. Setia, and S. Jajodia, LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks, The 10th ACM Conference on Computer and Communications Security (CCS '03), 62--72, 2003 Google ScholarDigital Library
- S. Zhu, S. Setia, S. Jajodia, and P. Ning, An Interleaved Hop-by-Hop Authentication Scheme for Filtering False Data in Sensor Networks, IEEE Symposium on Security and Privacy, 2004Google Scholar
Index Terms
- A resilient packet-forwarding scheme against maliciously packet-dropping nodes in sensor networks
Recommendations
A secure alternate path routing in sensor networks
This paper presents a secure alternate path routing in sensor networks. Our alternate path scheme makes the routing protocol resilient in the presence of malicious nodes that launch selective forwarding attacks. SeRINS (a Secure alternate path Routing ...
Detection of Packet Dropping in Wireless Sensor Networks
ITNG '10: Proceedings of the 2010 Seventh International Conference on Information Technology: New GenerationsSelective forwarding attacks may corrupt the transfer of data for both sensitive and non-sensitive applications. In selective forwarding attacks, malicious nodes behave like normal nodes and selectively drop packets. The selection of dropping nodes may ...
Secure Routing Protocol with Malicious Nodes Detection for Ad Hoc Networks
AINAW '08: Proceedings of the 22nd International Conference on Advanced Information Networking and Applications - WorkshopsAn ad hoc network is a highly dynamic routing network cooperated by a set of wireless mobile nodes without any assistance of centralized access point. ARIADNE is a well-known secure on-demand ad hoc network routing protocol. After finishing the Route ...
Comments