skip to main content
10.1145/1368436.1368452acmconferencesArticle/Chapter ViewAbstractPublication PagesconextConference Proceedingsconference-collections
research-article

Secure sensor network routing: a clean-slate approach

Published: 04 December 2006 Publication History

Abstract

The deployment of sensor networks in security- and safety-critical environments requires secure communication primitives. In this paper, we design, implement, and evaluate a new secure routing protocol for sensor networks. Our protocol requires no special hardware and provides message delivery even in an environment with active adversaries. We adopt a clean-slate approach and design a new sensor network routing protocol with security and efficiency as central design parameters. Our protocol is efficient yet highly resilient to active attacks. We demonstrate the performance of our algorithms with simulation results as well as an implementation on Telos sensor nodes.

References

[1]
P. Bose, P. Morin, I. Stojmenovic, and J. Urrutia. Routing with guaranteed delivery in ad hoc wireless networks. In Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications, 1999.
[2]
H. Chan and A. Perrig. PIKE: Peer intermediaries for key establishment in sensor networks. In IEEE Infocom, Mar. 2005.
[3]
J. Deng, R. Han, and S. Mishra. A performance evaluation of intrusion-tolerant routing in wireless sensor networks. In IEEE Workshop on Information Processing in Sensor Networks (IPSN), pages 349--364, Apr. 2003.
[4]
J. Deng, R. Han, and S. Mishra. Intrusion-tolerant routing for wireless sensor networks. Elsevier Journal on Computer Communications, Special Issue on Dependable Wireless Sensor Networks, 2005.
[5]
J. R. Douceur. The Sybil attack. In First International Workshop on Peer-to-Peer Systems (IPTPS), Mar. 2002.
[6]
R. Fonseca, S. Ratnasamy, J. Zhao, C. T. Ee, D. Culler, S. Shenker, and I. Stoica. Beacon-Vector Routing: Scalable point-to-point routing in wireless sensor networks. In Proceedings of USENIX/ACM Symposium on Networked System Design and Implementation (NSDI), May 2005.
[7]
D. Ganesan, R. Govindan, S. Shenker, and D. Estrin. Highly resilient, energy-efficient multipath routing in wireless sensor networks. Mobile Computing and Communication Review, 5(4):10--24, 2002.
[8]
T. He, C. Huang, B. Blum, J. A. Stankovic, and T. Abdelzaher. Range-free localization schemes for large scale sensor networks. In Proceedings of ACM Mobicom, pages 81--95, Sept. 2003.
[9]
W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan. Energy-efficient communication protocol for wireless microsensor networks. In Hawaii Int'l Conference on Systems Sciences, 2000.
[10]
Y.-C. Hu, D. B. Johnson, and A. Perrig. SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks. Ad Hoc Networks, 1(1):175--192, 2003.
[11]
Y.-C. Hu, A. Perrig, and D. B. Johnson. Ariadne: A secure on-demand routing protocol for ad hoc networks. In Proceedings of ACM Mobicom, Sept. 2002.
[12]
Y.-C. Hu, A. Perrig, and D. B. Johnson. Packet leashes: A defense against wormhole attacks in wireless ad hoc networks. In Proceedings of IEEE INFOCOM, April 2003.
[13]
C. Intanagonwiwat, R. Govindan, and D. Estrin. Directed diffusion: a scalable and robust communication paradigm for sensor networks. In Proceedings of ACM Mobicom, pages 56--67, 2000.
[14]
C. Karlof, Y. Li, and J. Polastre. ARRIVE: Algorithm for robust routing in volatile environments. Technical Report UCB/CSD-03-1233, University of California at Berkeley, May 2002.
[15]
C. Karlof and D. Wagner. Secure routing in wireless sensor networks: Attacks and countermeasures. Elsevier's AdHoc Networks Journal, Special Issue on Sensor Network Applications and Protocols, 1(2--3):293--315, Sept. 2003.
[16]
S. Kent, C. Lynn, and K. Seo. Secure border gateway protocol (S-BGP). IEEE Journal on Selected Areas in Communications, 18(4):582--592, Apr. 2000.
[17]
Y.-J. Kim, R. Govindan, B. Karp, and S. Shenker. Geographic routing made practical. In Proceedings of USENIX/ACM Symposium on Networked System Design and Implementation (NSDI), May 2005.
[18]
L. Kleinrock and F. Kamoun. Hierarchical routing for large networks: Performance evaluation and optimization. Computer Networks, 1:155--174, 1977.
[19]
S. Marti, T. Giuli, K. Lai, and M. Baker. Mitigating routing misbehaviour in mobile ad hoc networks. In Proceedings of ACM Mobicom, pages 255--265, Aug. 2000.
[20]
A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone. Handbook of Applied Cryptography. CRC Press, 1997.
[21]
R. Merkle. Protocols for public key cryptosystems. In 1980 IEEE Symposium on Security and Privacy, 1980.
[22]
J. Newsome and D. Song. GEM: Graph embedding for sensor motes. In Proceedings of ACM SenSys, Oct. 2003.
[23]
V. N. Padmanabhan and D. R. Simon. Secure traceroute to detect faulty or malicious routing. SIGCOMM Computer Communication Review (CCR), 33(1):77--82, 2003.
[24]
B. Parno, A. Perrig, and V. Gligor. Distributed detection of node replication attacks in sensor networks. In Proceedings of IEEE Symposium on Security and Privacy, May 2005.
[25]
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar. SPINS: Security protocols for sensor networks. Wireless Networks, 8(5):521--534, Sept. 2002.
[26]
R. Poovendran and L. Lazos. A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks. ACM Journal on Wireless Networks (WINET), to appear.
[27]
B. Przydatek, D. Song, and A. Perrig. SIA: Secure information aggregation in sensor networks. In ACM SenSys, Nov 2003.
[28]
A. Rao, C. Papadimitriou, S. Ratnasamy, S. Shenker, and I. Stoica. Geographic routing without location information. In Proceedings of ACM MobiCom, Sept. 2003.
[29]
S. Ratnasamy, B. Karp, L. Yin, F. Yu, D. Estrin, R. Govindan, and S. Shenker. GHT: A geographic hash table for data-centric storage. In Proceedings of ACM WSNA, Sept. 2002.
[30]
D. G. Thaler and C. V. Ravishankar. Distributed top-down hierarchy construction. In Proceedings of INFOCOM, 1998.
[31]
P. F. Tsuchiya. The landmark hierarchy: a new hierarchy for routing in very large networks. In Proceedings of SIGCOMM, 1988.
[32]
A. Wood and J. Stankovic. Denial of service in sensor networks. IEEE Computer, pages 54--62, Oct. 2002.
[33]
A. D. Wood, L. Fang, J. A. Stankovic, and T. He. SIGF: A family of configurable, secure routing protocols for wireless sensor networks. In Proceedings of ACM SASN, Oct. 2006.
[34]
A. D. Wood, J. A. Stankovic, and S. H. Son. JAM: A jammed-area mapping service for sensor networks. In Proceedings of Real-Time Systems Symposium (RTSS), 2003.
[35]
M. G. Zapata. Secure Ad hoc On-Demand Distance Vector (SAODV) routing. Internet draft, Internet Engineering Task Force, Aug. 2001.

Cited By

View all
  • (2023)Detection of Vampire Attacks in Ad-Hoc Wireless Sensor Network using PLGP protocolInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology10.32628/CSEIT2390135(195-199)Online publication date: 5-Feb-2023
  • (2023)An Approach against Vampire Attack for Successful Transmission in Wireless Sensor Network2023 3rd International Conference on Intelligent Communication and Computational Techniques (ICCT)10.1109/ICCT56969.2023.10076140(1-7)Online publication date: 19-Jan-2023
  • (2022)Resource-Conserving Protection against Energy Draining (RCPED) Routing Protocol for Wireless Sensor NetworksNetwork10.3390/network20100072:1(83-105)Online publication date: 11-Feb-2022
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
CoNEXT '06: Proceedings of the 2006 ACM CoNEXT conference
December 2006
318 pages
ISBN:1595934561
DOI:10.1145/1368436
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 04 December 2006

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article

Funding Sources

Acceptance Rates

Overall Acceptance Rate 198 of 789 submissions, 25%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)0
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2023)Detection of Vampire Attacks in Ad-Hoc Wireless Sensor Network using PLGP protocolInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology10.32628/CSEIT2390135(195-199)Online publication date: 5-Feb-2023
  • (2023)An Approach against Vampire Attack for Successful Transmission in Wireless Sensor Network2023 3rd International Conference on Intelligent Communication and Computational Techniques (ICCT)10.1109/ICCT56969.2023.10076140(1-7)Online publication date: 19-Jan-2023
  • (2022)Resource-Conserving Protection against Energy Draining (RCPED) Routing Protocol for Wireless Sensor NetworksNetwork10.3390/network20100072:1(83-105)Online publication date: 11-Feb-2022
  • (2021)Cybersecurity for digital twins in the built environment: current research and future directionsJournal of Information Technology in Construction10.36680/j.itcon.2021.01026(159-173)Online publication date: 26-Apr-2021
  • (2021)Sensor Switching Control Under Attacks Detectable by Finite Sample Dynamic Watermarking TestsIEEE Transactions on Automatic Control10.1109/TAC.2020.303208566:10(4560-4574)Online publication date: Oct-2021
  • (2021)Trusted cognitive sensor based dual routing network on Internet of thingsInternational Journal of Communication Systems10.1002/dac.483634:10Online publication date: 20-Apr-2021
  • (2020)A Systematic Review on Clone Node Detection in Static Wireless Sensor NetworksIEEE Access10.1109/ACCESS.2020.29830918(65450-65461)Online publication date: 2020
  • (2019)USCDRP: unequal secure cluster-based distributed routing protocol for wireless sensor networksThe Journal of Supercomputing10.1007/s11227-019-03040-zOnline publication date: 7-Nov-2019
  • (2018)Statistical Watermarking for Networked Control Systems2018 Annual American Control Conference (ACC)10.23919/ACC.2018.8431569(5467-5472)Online publication date: Jun-2018
  • (2018)Secure Data Access Through Electronic Devices Using Artificial Intelligence2018 3rd International Conference on Communication and Electronics Systems (ICCES)10.1109/CESYS.2018.8724060(673-677)Online publication date: Oct-2018
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media