Using REWARD to Detect Team Black-Hole Attacks in Wireless Sensor Networks

This paper describes REWARD, a novel routing algorithm for wireless sensor networks. The algorithm is adjustable and can wage counter attacks against either single black holes or teams of malicious nodes. The proposed routing technique is suitable for network nodes that can tune their transmit power. REWARD forwards packets using geographic routing. The algorithm utilizes two types of broadcast messages, MISS and SAMBA, to organize a distributed data base for detected black hole attacks. MISS helps to identify malicious nodes working in the ID space. SAMBA is related to the physical space and provides locations of detected black hole attacks. If a malicious node acts on behalf of another node, SAMBA messages will decline its efficiency. Inevitably, security overhead requires additional energy drawn from the batteries. REWARD allows to strike the balance between security capability and lifetime performance. The method has different levels of security which can be set according to the local conditions. Finally, the paper analyzes the energy overhead associated with different REWARD modifications.

[1]  Zdravko Karakehayov Design of Distributed Sensor Networks for Security and Defense , 2005 .

[2]  Xiaoyan Hong,et al.  Scalable routing protocols for mobile ad hoc networks , 2002, IEEE Netw..

[3]  Elizabeth M. Belding-Royer,et al.  A review of current routing protocols for ad hoc mobile wireless networks , 1999, IEEE Wirel. Commun..

[4]  Mark A. Shayman,et al.  Energy Efficient Routing in Wireless Sensor Networks , 2003 .

[5]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[6]  Martin Mauve,et al.  A survey on position-based routing in mobile ad hoc networks , 2001, IEEE Netw..

[7]  John A. Stankovic,et al.  A Taxonomy for Denial-of-Service Attacks in Wireless Sensor Networks , 2004, Handbook of Sensor Networks.

[8]  Yih-Chun Hu,et al.  A survey of secure wireless ad hoc routing , 2004, IEEE Security & Privacy Magazine.

[9]  Robert Tappan Morris,et al.  Span: An Energy-Efficient Coordination Algorithm for Topology Maintenance in Ad Hoc Wireless Networks , 2001, MobiCom '01.

[10]  Martin Haenggi Opportunities and Challenges in Wireless Sensor Networks , 2004, Handbook of Sensor Networks.

[11]  Dharma P. Agrawal,et al.  Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..

[12]  Jan M. Rabaey,et al.  PicoRadio Supports Ad Hoc Ultra-Low Power Wireless Networking , 2000, Computer.

[13]  Aki Happonen,et al.  Low Power Design for Wireless Sensor Networks , 2004 .

[14]  Robert Tappan Morris,et al.  Opportunistic routing in multi-hop wireless networks , 2004, Comput. Commun. Rev..

[15]  Brett Warneke Miniaturizing Sensor Networks with MEMS , 2004, Handbook of Sensor Networks.

[16]  Robert Tappan Morris,et al.  Span: An Energy-Efficient Coordination Algorithm for Topology Maintenance in Ad Hoc Wireless Networks , 2002, Wirel. Networks.

[17]  David R. Karger,et al.  A scalable location service for geographic ad hoc routing , 2000, MobiCom '00.

[18]  Z. Karakehayov Zero-power design for Smart Dust networks , 2002, Proceedings First International IEEE Symposium Intelligent Systems.

[19]  Gabor Karsai,et al.  Smart Dust: communicating with a cubic-millimeter computer , 2001 .

[20]  Leonidas J. Guibas,et al.  A dual-space approach to tracking and sensor management in wireless sensor networks , 2002, WSNA '02.