Enhancing Resiliency Against Routing Layer Attacks in Wireless Sensor Networks: Gradient-based Routing in Focus

This paper focuses on the resiliency of wireless sensor network routing protocols against selective forwarding attacks by compromised nodes. Informally, resiliency should be understood as the capacity of the routing protocol to endure and mitigate the presence of a certain number of compromised nodes seeking to disturb the routing process. To provide for security when nodes may be compromised, cryptographic solutions must be completed by algorithmic solutions considering "beyond cryptography" approaches. In this article, after discussing the shortcomings of existing routing protocols against packet-dropping malicious nodes we describe some protocol behaviors enhancing routing resiliency under several combined routing attacks. These behaviors are mainly based on traffic redundancy and probabilistic selection for the next hop candidates, which permit to exploit and benefit from the inherent structural redundancy of densely deployed sensor networks. We consider the case that compromised nodes, prior to selective forwarding, and seeking to increase its impact, may perform several well known routing attacks such as Sinkhole, Sybil and Wormhole. Several variants of the well known gradient-based routing protocol were tested and simulation results show that using the proposed techniques resiliency can be improved. Nevertheless, as expected, resiliency comes at a cost and our results also shed some light on the resiliency- energy consumption trade-off. We propose in this paper the behaviors enhancing the resiliency of routing protocols under several combined routing attacks.

[1]  Fabrice Valois,et al.  Resiliency of wireless sensor networks: Definitions and analyses , 2010, 2010 17th International Conference on Telecommunications.

[2]  Xueping Li,et al.  A Quantitative Survivability Evaluation Model for Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Networking, Sensing and Control.

[3]  David Levin,et al.  Survivable mobile wireless networks: issues, challenges, and research directions , 2002, WiSE '02.

[4]  Fabrice Valois,et al.  Toward Resilient Routing in Wireless Sensor Networks: Gradient-Based Routing in Focus , 2010, 2010 Fourth International Conference on Sensor Technologies and Applications.

[5]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[6]  Elyes Ben Hamida,et al.  Scalable versus Accurate Physical Layer Modeling in Wireless Network Simulations , 2008, 2008 22nd Workshop on Principles of Advanced and Distributed Simulation.

[7]  Adrian Perrig,et al.  Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[8]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[9]  Deborah Estrin,et al.  Highly-resilient, energy-efficient multipath routing in wireless sensor networks , 2001, MOCO.

[10]  David Evans,et al.  Using Directional Antennas to Prevent Wormhole Attacks , 2004, NDSS.

[11]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[12]  Bo Yu,et al.  CHEMAS: Identify suspect nodes in selective forwarding attacks , 2007, J. Parallel Distributed Comput..

[13]  Tian He,et al.  SIGF: a family of configurable, secure routing protocols for wireless sensor networks , 2006, SASN '06.

[14]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.

[15]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[16]  Vincent W. S. Wong,et al.  An Energy-Efficient Multipath Routing Protocol for Wireless Sensor Networks , 2006, VTC Fall.

[17]  Sang Hyuk Son,et al.  IGF: A State-Free Robust Communication Protocol for Wireless Sensor Networks , 2003 .

[18]  J. Broch,et al.  Dynamic source routing in ad hoc wireless networks , 1998 .

[19]  Lixia Zhang,et al.  Report from the IAB workshop on Unwanted Traffic March 9-10, 2006 , 2007, RFC.

[20]  Nancy R. Mead,et al.  Survivable Network System Analysis: A Case Study , 1999, IEEE Softw..

[21]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[22]  A. Perrig,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[23]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[24]  Brad Karp,et al.  GPSR: greedy perimeter stateless routing for wireless networks , 2000, MobiCom '00.

[25]  Mani Srivastava,et al.  Energy efficient routing in wireless sensor networks , 2001, 2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277).

[26]  David A. Wagner,et al.  Resilient aggregation in sensor networks , 2004, SASN '04.

[27]  David A. Maltz,et al.  Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.