A novel joint logging and migrating traceback scheme for achieving low storage requirement and long lifetime in WSNs

Abstract In this paper, a logging joint marking (LM) traceback scheme is proposed. The main point of LM scheme is: node marks each received packet; it logs the mark information until the times of packets marking reach v . If node's storage is deficiency for having log more mark, it will do migrating, that is, migrate the stored mark information to those nodes which are far away from sink and have large storage space left. Compared with previous traceback scheme, the advantages of LM scheme are as follows: (1) Longer network lifetime. (2) Less required storage capacity. (3) Higher safety performance. Since all the nodes are used to store marked packets, it will preserve more marked packets. As a result, the victims can acquire more information when backtracking and location the source of the malicious packet more rapidly and accurately. Our analysis show that compared with marking and logging scheme, LM scheme can increase network lifetime by 21%, reduce the storage capacity by 80%, and in the meantime reduce convergence time by 40%.

[1]  Craig Partridge,et al.  Hash-based IP traceback , 2001, SIGCOMM.

[2]  Byung kwan Lee,et al.  An IP Traceback Protocol using a Compressed Hash Table, a Sinkhole Router and Data Mining based on Network Forensics against Network Attacks , 2014, Future Gener. Comput. Syst..

[3]  Syed Obaid Amin,et al.  Hop-by-Hop Traceback in Wireless Sensor Networks , 2012, IEEE Communications Letters.

[4]  Xin Jin,et al.  Deployment guidelines for achieving maximum lifetime and avoiding energy holes in sensor network , 2013, Inf. Sci..

[5]  Jiming Chen,et al.  Maintaining Quality of Sensing with Actors in Wireless Sensor Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.

[6]  Xi Zhang,et al.  Defending collaborative false data injection attacks in wireless sensor networks , 2014, Inf. Sci..

[7]  Fan Ye,et al.  Catching "Moles" in Sensor Networks , 2007, 27th International Conference on Distributed Computing Systems (ICDCS '07).

[8]  Ivan Howitt,et al.  Realistic energy model based energy balanced optimization for Low Rate WPAN network , 2009, IEEE Southeastcon 2009.

[9]  Xin-Lin Huang,et al.  QoS-Adaptive Routing Protocol Design for Multi-Hop Cognitive Radio Networks Considering Multi-Link Interference , 2012 .

[10]  Ivan Stojmenovic,et al.  Optimizing Communication Overhead while Reducing Path Length in Beaconless Georouting with Guaranteed Delivery for Wireless Sensor Networks , 2013, IEEE Transactions on Computers.

[11]  Yuxin Liu,et al.  Analysis and Improvement of Send-and-Wait Automatic Repeat-reQuest Protocols for Wireless Sensor Networks , 2015, Wirel. Pers. Commun..

[12]  Xuemin Shen,et al.  Design principles and improvement of cost function based energy aware routing algorithms for wireless sensor networks , 2012, Comput. Networks.

[13]  Anfeng Liu,et al.  Lifetime maximization through dynamic ring-based routing scheme for correlated data collecting in WSNs , 2015, Comput. Electr. Eng..

[14]  Xin-Lin Huang,et al.  Primate-inspired adaptive routing in intermittently connected mobile communication systems , 2014, Wirel. Networks.

[15]  Jiming Chen,et al.  Energy-Efficient Capture of Stochastic Events under Periodic Network Coverage and Coordinated Sleep , 2012, IEEE Transactions on Parallel and Distributed Systems.

[16]  Bo-Chao Cheng,et al.  A packet marking with fair probability distribution function for minimizing the convergence time in wireless sensor networks , 2008, Comput. Commun..

[17]  Jiming Chen,et al.  Energy Provisioning in Wireless Rechargeable Sensor Networks , 2013, IEEE Trans. Mob. Comput..

[18]  Philip N. Klein,et al.  Using router stamping to identify the source of IP packets , 2000, CCS.

[19]  B. Paramasivan,et al.  Energy efficient multipath data transfer scheme to mitigate false data injection attack in wireless sensor networks , 2013, Comput. Electr. Eng..

[20]  Jun Xu,et al.  Traceback in wireless sensor networks with packet marking and logging , 2011, Frontiers of Computer Science in China.

[21]  John Zic,et al.  A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks , 2013, Comput. Secur..

[22]  Antonio Alfredo Ferreira Loureiro,et al.  A distributed data storage protocol for heterogeneous wireless sensor networks with mobile sinks , 2013, Ad Hoc Networks.

[23]  Anfeng Liu,et al.  On mitigating hotspots to maximize network lifetime in multi-hop wireless sensor network with guaranteed transport delay and reliability , 2012, Peer-to-Peer Networking and Applications.

[24]  Gilles Sicard,et al.  Hardware compression scheme based on low complexity arithmetic encoding for low power image transmission over WSNs , 2014 .

[25]  Yi Qian,et al.  A time dependent performance model for multihop wireless networks with CBR traffic , 2010, International Performance Computing and Communications Conference.

[26]  Man Hon Wong,et al.  An Efficient Distributed Algorithm to Identify and Traceback DDoS Traffic , 2006, Comput. J..

[27]  D. Sy,et al.  CAPTRA: coordinated packet traceback , 2006, 2006 5th International Conference on Information Processing in Sensor Networks.

[28]  Yi Qian,et al.  Time-Varying Performance Analysis of Multihop Wireless Networks With CBR Traffic , 2014, IEEE Transactions on Vehicular Technology.

[29]  Xin Jin,et al.  An elaborate chronological and spatial analysis of energy hole for wireless sensor networks , 2013, Comput. Stand. Interfaces.