skip to main content
10.1145/1180345.1180353acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

A resilient packet-forwarding scheme against maliciously packet-dropping nodes in sensor networks

Published:30 October 2006Publication History

ABSTRACT

This paper focuses on defending against compromised nodes' dropping of legitimate reports and investigates the misbehavior of a maliciously packet-dropping node in sensor networks. We present a resilient packet-forwarding scheme using Neighbor Watch System (NWS), specifically designed for hop-by-hop reliable delivery in face of malicious nodes that drop relaying packets, as well as faulty nodes that fail to relay packets. Unlike previous work with multipath data forwarding, our scheme basically employs single-path data forwarding, which consumes less power than multipath schemes. As the packet is forwarded along the single-path toward the base station, our scheme, however, converts into multipath data forwarding at the location where NWS detects relaying nodes' misbehavior. Simulation experiments show that, with the help of NWS, our forwarding scheme achieves a high success ratio in face of a large number of packet-dropping nodes, and effectively adjusts its forwarding style, depending on the number of packet-dropping nodes en-route to the base station.

References

  1. R. Anderson, H. Chan, and A. Perrig, Key Infection: Smart Trust for Smart Dust, IEEE ICNP 2004 Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Burton H. Bloom, Space/Time Trade-offs in Hash Coding with Allowable Errors, Communication of the ACM, vol. 13, 422--426, 1970 Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. B. Carbunar, I. Ioannidis, and C. Nita-Rotaru, JANUS: Towards Robust and Malicious Resilient Routing in Hybrid Wireless Networks, ACM workshop on Wireless security (WiSe'04), Oct. 2004 Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. H. Chan, A. Perrig, and D. Song, Random Key Predistribution Schemes for Sensor Networks, IEEE Symposium on Security and Privacy, pp. 197-213, May 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. B. Deb, S. Bhatnagar, and B. Nath, ReInForM: Reliable Information Forwarding Using Multiple Paths in Sensor Networks, IEEE Local Computer Networks (LCN 2003), pp. 406--415, Oct. 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. J. Deng, R. Han, and S. Mishra, A Performance Evaluation of Intrusion- Tolerant Routing in Wireless Sensor Networks, 2nd International Workshop on Information Processing in Sensor Networks (IPSN 03), pp. 349--364, Apr. 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. J. Deng, R. Han, and S. Mishra, Intrusion Tolerance and Anti-Traffic Analysis Strategies for Wireless Sensor Networks, IEEE International Conference on Dependable Systems and Networks (DSN), pp. 594--603, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. J. Deng, R. Han, and S. Mishra, Defending against Path-based DoS Attacks in Wireless Sensor Networks, ACM Workshop on Security of Ad-Hoc and Sensor Networks (SASN'05), Nov, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. K. Fall and K. Varadhan (editors), NS notes and documentation, The VINT project, LBL, Feb 2000, http://www.isi.edu/nsnam/ns/Google ScholarGoogle Scholar
  10. D. Ganesan, R. Govindan, S. Shenker, and D. Estrin, Highly Resilient, Energy-Efficient Multipath Routing in Wireless Sensor Networks, Computing and Communications Review (MC2R) Vol 1., pp. 11--25, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. V. D. Gligor, Security of Emergent Properties in Ad-Hoc Networks, International Workshop on Security Protocols, Apr. 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. O. Goldreich, S. Goldwasser, and S. Micali, How to Construct Random Functions, Journal of the ACM, Vol. 33, No. 4, 210--217, 1986 Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. L. Eschenauer and V. D. Gligor, A Key-Management Scheme for Distributed Sensor Networks, 9th ACM Conference on Computer and Communication Security (CCS), pp. 41--47, Nov. 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. C. Hartung, J. Balasalle, and R. Han, Node Compromise in Sensor Networks: The Need for Secure Systems, Technical Report CU-CS-990-05, Department of Computer Science University of Colorado at Boulder, Jan. 2005Google ScholarGoogle Scholar
  15. T. He, S. Krishnamurthy, J. A. Stankovic, T. F. Abdelzaher, L. Luo, R. Stoleru, T. Yan, L. Gu, J. Hui, and B. Krogh, An Energy-Efficient Surveillance System Using Wireless Sensor Networks, ACM MobiSys'04, June, 2004 Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. W.R. Heinzelman, J. Kulik, H. Balakrishnan, Adaptive Protocols for Information Dissemination in Wireless Sensor Networks, ACM MobiCom99, pp. 174--185, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. Culler, and K. Pister, System Architecture Directions for Networked Sensors, ACU ASPLOS IX, November 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. X. Hong, M. Gerla, W. Hanbiao, and L. Clare, Load Balanced, Energy-Aware Communications for Mars Sensor Networks, IEEE Aerospace Conference, vol.3, 1109--1115, 2002.Google ScholarGoogle ScholarCross RefCross Ref
  19. Y.-C. Hu, D. B. Johnson, and A. Perrig, SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks, IEEE Workshop on Mobile Computing Systems and Applications, pp. 3--13, Jun. 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Y.-C. Hu, A. Perrig, and D. B. Johnson, Efficient Security Mechanisms for Routing Protocols, NDSS 2003, pp. 57--73, Feb. 2003.Google ScholarGoogle Scholar
  21. C. Intanagonwiwat, R. Govindan and D. Estrin, Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks, MobiCom'00, Aug. 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. D. Johnson, D.A. Maltz, and J. Broch, The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (Internet-Draft), Mobile Ad-hoc Network (MANET) Working Group, IETF, Oct. 1999.Google ScholarGoogle Scholar
  23. C. Karlof and D. Wagner, Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures, The First IEEE International Workshop on Sensor Network Protocols and Applications, pp. 113--127, May 2003Google ScholarGoogle ScholarCross RefCross Ref
  24. C. Karlof, N. Sastry, and D. Wagner, TinySec: A Link Layer Security Architecture for Wireless Sensor Networks, ACM SensSys'04, pp. 162--175, Nov. 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. I. Khalil, S. Bagchi, and C. Nina-Rotaru, DICAS: Detection, Diagnosis and Isolation of Control Attacks in Sensor Networks, IEEE SecureComm 2005, pp. 89--100, Sep. 2005 Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Y. Liu and W. K.G. Seah, A Priority-Based Multi-Path Routing Protocol for Sensor Networks, 15th IEEE International Symposium on Volume 1, 216--220, 2004Google ScholarGoogle Scholar
  27. S.-B. Lee and Y.-H. Choi, A Secure Alternate Path Routing in Sensor Networks, Computer Communications (2006), doi:10.1016/j.comcom.2006.08.006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. S. Marti, T.J. Giuli, K. Lai, and M. Baker, Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, ACM/IEEE International Conference on Mobile Computing and Networking, pp. 255--265, 2000 Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. H. Morcos, I. Matta, and A. Bestavros, $M^2RC$: Multiplicative-Increase/Additive-Decrease Multipath Routing Control for Wireless Sensor Networks, ACM SIGBED Review, Vol. 2, Jan 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. J. Newsome, E. Shi, D. Song, and A. Perrig, The Sybil Attack in Sensor Networks: Analysis and Defenses, IEEE IPSN'04, pp. 259--268, Apr. 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. B. Parno, A. Perrig, and V. D. Gligor, Distributed Detection of Node Replication Attacks in Sensor Networks, the 2005 IEEE Symposium on Security and Privacy, pp. 49--63, May 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. Tygar, SPINS: Security Protocols for Sensor Networks, ACM MobiCom'01, pp. 189--199, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. A. Perrig, J. Stankovic, and D. Wagner, Security in Wireless Sensor Networks, Communications of the ACM, 47(6), Special Issue on Wireless sensor networks, pp.53--57, Jun. 2004 Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. B. Przydatek, D. Song, and A. Perrig, SIA: Secure Information Aggregation in Sensor Networks, 1st International Conference on Embedded Networked Sensor Systems, 255--256, 2003 Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. E. Shi and A. Perrig, Designing Secure Sensor Networks, Wireless Communications, IEEE Volume 11, Issue 6, pp. 38--43, Dec. 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. D. Tian and N.D. Georganas, Energy Efficient Routing with Guaranteed Delivery in Wireless Sensor Networks, IEEE Wireless Communications and Networking (WCNC 2003), IEEE Volume 3, 1923--1929, March 2003Google ScholarGoogle Scholar
  37. A. Woo, T. Tong, and D. Culler, Taming the Underlying Challenges of Reliable Multhop Routing in Sensor Networks, ACM SenSys 03, Nov, 2003 Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. A. Wood and J. Stankovic, Denial of Service in Sensor Networks, IEEE Computer, Vol.35, 54--62, Oct. 2002 Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. H. Yang, F. Ye, Y. Yuan, S. Lu and W. Arbough, Toward Resilient Security in Wireless Sensor Networks, ACM MobiHoc'05, 34--45, May 2005 Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Y. Yang, X. Wang, S. Zhu, and G. Cao SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks, ACM MobiHoc'06 May 2006 Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. F. Ye, H. Luo, S. Lu and L. Zhang, Statictial En-route Filtering of Injected False Data in Sensor Networks, IEEE INFOCOM, 2004 Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. F. Ye, G. Zhong, S. Lu and L. Zhang, GRAdient Broadcast: A Robust Data Delivery Protocol for Large Scale Sensor Networks, ACM Wireless Networks (WINET), March 2005 Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Y. Yu, R. Govindan, and D. Estrin, Geographical and Energy Aware Routing: a recursive data dissemination protocol for wireless sensor networks, UCLA Computer Science Department Technical Report UCLA/CSD-TR-01-0023, May 2001.Google ScholarGoogle Scholar
  44. W. Zhang and G. Cao, Group Rekeying for Filtering False Data in Sensor Networks: A Predistribution and Local Collaboration-Based Approach, IEEE INFOCOM'05. Vol. 1, 503--514, March 2005Google ScholarGoogle Scholar
  45. G. Zhou, T. He, S. Krishnamurthy, and J. A. Stankovic, Impact of radio irregularity on wireless sensor networks, the 2nd International Conference on Mobile Systems, Applications, and Services (MobiSys 04), June, 2004 Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. S. Zhu, S. Setia, and S. Jajodia, LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks, The 10th ACM Conference on Computer and Communications Security (CCS '03), 62--72, 2003 Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. S. Zhu, S. Setia, S. Jajodia, and P. Ning, An Interleaved Hop-by-Hop Authentication Scheme for Filtering False Data in Sensor Networks, IEEE Symposium on Security and Privacy, 2004Google ScholarGoogle Scholar

Index Terms

  1. A resilient packet-forwarding scheme against maliciously packet-dropping nodes in sensor networks

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      SASN '06: Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
      October 2006
      186 pages
      ISBN:1595935541
      DOI:10.1145/1180345

      Copyright © 2006 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 30 October 2006

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • Article

      Upcoming Conference

      CCS '24
      ACM SIGSAC Conference on Computer and Communications Security
      October 14 - 18, 2024
      Salt Lake City , UT , USA

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader