Byzantine Fault-Tolerant Routing for Large-Scale Wireless Sensor Networks Based on Fast ECDSA

Wireless sensor networks are a favorite target of Byzantine malicious attackers because of their limited energy, low calculation capability, and dynamic topology, and other important characteristics. The Byzantine Generals Problem is one of the classical problems in the area of fault tolerance, and has wide application, especially in distributed databases and systems. There is a lot of research in agreement and replication techniques that tolerate Byzantine faults. However, most of this work is not suited to large-scale wireless sensor networks, due to its high computational complexity. By introducing Fast ECDSA (Elliptic Curve Digital Signature Algorithm), which can resist timing and energy attacks, and reduce the proportion of verifying signature algorithm to generating signature algorithm to 1.2 times, we propose a new Byzantine fault-tolerant routing algorithm for large-scale wireless sensor networks with double-level hierarchical architecture. In different levels, the algorithm runs different BFT protocols. Theory and simulation results have proved that this algorithm has high security and the number of communication rounds between clusters is reduced by 1/3, which balances the network load. At the same time, the application of Fast ECDSA improves the security level of the network without burdening it.

[1]  Pramod K. Varshney,et al.  Target tracking in Wireless Sensor Networks in the presence of Byzantines , 2013, Proceedings of the 16th International Conference on Information Fusion.

[2]  Niu Zhihua The research of the promotion for ECDSA algorithm based on Montgomery-form ECC , 2010 .

[3]  Pramod K. Varshney,et al.  False discovery rate based distributed detection in the presence of Byzantines , 2014, IEEE Transactions on Aerospace and Electronic Systems.

[4]  Qinye Yin,et al.  An energy-efficient geographic routing based on cooperative transmission in wireless sensor networks , 2012, Science China Information Sciences.

[5]  Mihaela Cardei,et al.  A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks , 2007 .

[6]  Benjamin Vandiver,et al.  Detecting and tolerating Byzantine faults in database systems , 2008 .

[7]  Lin Qiang,et al.  Trust based secure routing algorithm for wireless sensor networks , 2008 .

[8]  Luca Veltri,et al.  Byzantine Generals Problem in the Light of P2P Computing , 2006, 2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services.

[9]  Yvo Desmedt,et al.  Some Recent Research Aspects of Threshold Cryptography , 1997, ISW.

[10]  Lawrence Wai-Choong Wong,et al.  Mitigating byzantine attacks in data fusion process for wireless sensor networks using witnesses , 2014, 2014 IEEE International Conference on Communication Systems.

[11]  Miguel Castro,et al.  Authenticated Byzantine Fault Tolerance Without Public-Key Cryptography , 1999 .

[12]  Jonathan Kirsch,et al.  Scaling Byzantine Fault-Tolerant Replication toWide Area Networks , 2006, International Conference on Dependable Systems and Networks (DSN'06).

[13]  Jie Wu,et al.  Frequency and Similarity-Aware Partitioning for cloud storage based on Space-Time Utility Maximization Model , 2015 .

[14]  Jie Wu,et al.  Deploying Wireless Sensor Networks with Fault-Tolerance for Structural Health Monitoring , 2015, IEEE Trans. Computers.

[15]  Zheng Yang,et al.  Sensorless Sensing with WiFi , 2015 .

[16]  Rodrigo Rodrigues,et al.  Tolerating Byzantine Faulty Clients in a Quorum System , 2006, 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06).

[17]  John Lane,et al.  Steward: Scaling Byzantine Fault-Tolerant Replication to Wide Area Networks , 2010, IEEE Transactions on Dependable and Secure Computing.