Energy Efficiency Routing with Node Compromised Resistance in Wireless Sensor Networks

For the energy limited wireless sensor networks, the critical problem is how to achieve the energy efficiency. Many attackers can consume the limited network energy, by the method of capturing some legal nodes then control them to start DoS and flooding attack, which is difficult to be detected by only the classic cryptography based techniques with common routing protocols in wireless sensor networks (WSNs). We argue that under the condition of attacking, existing routing schemes are low energy-efficient and vulnerable to inside attack due to their deterministic nature. To avoid the energy consumption caused by the inside attack initiated by the malicious nodes, this paper proposes a novel energy efficiency routing with node compromised resistance (EENC) based on Ant Colony Optimization. Under our design, each node computes the trust value of its 1-hop neighbors based on their multiple behavior attributes evaluation and builds a trust management by the trust value. By this way, sensor nodes act as router to achieve dynamic and adaptive routing, where the node can select much energy efficiency and faithful forwarding node from its neighbors according to their remaining energy and trust values in the next process of data collection. Simulation results indicate that the established routing can bypass most compromised nodes in the transmission path and EENC has high performance in energy efficiency, which can prolong the network lifetime.

[1]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[2]  José D. P. Rolim,et al.  Energy balanced data propagation in wireless sensor networks , 2006, Wirel. Networks.

[3]  Mohammad S. Obaidat,et al.  An ant colony optimization approach for reputation and quality-of-service-based security in wireless sensor networks , 2009, Secur. Commun. Networks.

[4]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[5]  Victor C. M. Leung,et al.  Applications and design issues for mobile agents in wireless sensor networks , 2007, IEEE Wireless Communications.

[6]  Keqiu Li,et al.  Multi-Attribute Data Fusion for Energy Equilibrium Routing in Wireless Sensor Networks , 2010, KSII Trans. Internet Inf. Syst..

[7]  Panganamala Ramana Kumar,et al.  Maximizing the functional lifetime of sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[8]  Naixue Xiong,et al.  Game and Balance Multicast Architecture Algorithms for Sensor Grid , 2009, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[9]  Alfonso Valdes,et al.  A Mission-Impact-Based Approach to INFOSEC Alarm Correlation , 2002, RAID.

[10]  Nitin H. Vaidya,et al.  Leveraging Channel Diversity for Key Establishment in Wireless Sensor Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[11]  Victor C. M. Leung,et al.  Directional geographical routing for real-time video communications in wireless sensor networks , 2007, Comput. Commun..

[12]  Andrew Blyth Footprinting for intrusion detection and threat assessment , 1999, Inf. Secur. Tech. Rep..

[13]  Catherine Rosenberg,et al.  Design guidelines for wireless sensor networks: communication, clustering and aggregation , 2004, Ad Hoc Networks.

[14]  Haiyun Luo,et al.  Statistical en-route filtering of injected false data in sensor networks , 2005, IEEE J. Sel. Areas Commun..

[15]  Bülent Yener,et al.  Combinatorial design of key distribution mechanisms for wireless sensor networks , 2007, TNET.

[16]  Victor C. M. Leung,et al.  Hybrid Geographic Routing for Flexible Energy—Delay Tradeoff , 2009, IEEE Transactions on Vehicular Technology.

[17]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, ACM Trans. Inf. Syst. Secur..

[18]  Min Chen,et al.  Adaptive Reliable Routing Based on Cluster Hierarchy for Wireless Multimedia Sensor Networks , 2010, EURASIP J. Wirel. Commun. Netw..

[19]  José D. P. Rolim,et al.  Energy optimal data propagation in wireless sensor networks , 2005, J. Parallel Distributed Comput..

[20]  Athanasios V. Vasilakos,et al.  Routing for disruption tolerant networks: taxonomy and design , 2010, Wirel. Networks.

[21]  Victor C. M. Leung,et al.  Mobile Agent-Based Directed Diffusion in Wireless Sensor Networks , 2007, EURASIP J. Adv. Signal Process..

[22]  Victor C. M. Leung,et al.  Receiver-oriented load-balancing and reliable routing in wireless sensor networks , 2009 .

[23]  D. Rubenstein,et al.  Distributed Algorithms for Secure Multipath Routing in Attack-Resistant Networks , 2007, IEEE/ACM Transactions on Networking.

[24]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[25]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[26]  Jian Li,et al.  Analytical modeling and mitigation techniques for the energy hole problem in sensor networks , 2007, Pervasive Mob. Comput..

[27]  Jie Wu,et al.  Sensor Distribution on Coverage in Sensor Networks , 2010, QSHINE.

[28]  David E. Culler,et al.  SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.

[29]  Victor C. M. Leung,et al.  Directional Controlled Fusion in Wireless Sensor Networks , 2008, QShine '08.

[30]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, TSEC.

[31]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[32]  Yuguang Fang,et al.  Location-based compromise-tolerant security mechanisms for wireless sensor networks , 2006, IEEE Journal on Selected Areas in Communications.

[33]  Wenjing Lou,et al.  LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks , 2008, IEEE Trans. Mob. Comput..

[34]  Min Chen,et al.  Energy-efficient differentiated directed diffusion (EDDD) in wireless sensor networks , 2006, Comput. Commun..

[35]  Yong Guan,et al.  A Dynamic En-Route Scheme for Filtering False Data Injection in Wireless Sensor Networks , 2005, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.