Evaluating energy cost of route diversity for security in wireless sensor networks

Route diversity improves the security of Wireless Sensor Networks (WSNs) against adversaries attempting to obtain sensitive sensor data. By limiting the fraction of data relayed over each link and/or routed through each relay node, route diversity can be achieved, thus, extracting useful information from the network is rendered more challenging for adversaries. Sensor nodes operate with limited energy resources, therefore, energy consumption of security mechanisms is a central concern for WSNs. In this paper we evaluate the energy cost of route diversity for security in WSNs through a novel Linear Programming framework. We characterize energy dissipation and data relaying behaviors of three route diversity techniques to mitigate node capture only, eavesdropping only, and node capture and eavesdropping attacks. Effects of node density, network area, level of resilience, and network topology on energy cost are investigated. An LP framework that is capable of jointly modeling energy dissipation and route diversity in Wireless Sensor Networks is developed.Through the developed framework, a comprehensive analysis by exploring the design space in a systematic fashion is conducted.The energy overhead characteristics of route diversity countermeasures for resilience against node capture only (NCO), eavesdropping only (EAO), and node capture and eavesdropping (NCE) attacks are investigated.LP problems are solvable in polynomial time. Hence, from computational point of view it is preferable to model a problem using LP rather than with a nonpolynomial time formulation which makes a comprehensive analysis infeasible. Thus, the novel LP framework presented in this paper can be used with minor modifications for future analysis on different aspects of route diversity.

[1]  Yuguang Fang,et al.  SPREAD: enhancing data confidentiality in mobile ad hoc networks , 2004, IEEE INFOCOM 2004.

[2]  Vishal Misra,et al.  Distributed algorithms for secure multipath routing , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[3]  Wendi B. Heinzelman,et al.  General Network Lifetime and Cost Models for Evaluating Sensor Network Deployment Strategies , 2008, IEEE Transactions on Mobile Computing.

[4]  Shervin Erfani,et al.  Survey of multipath routing protocols for mobile ad hoc networks , 2009, J. Netw. Comput. Appl..

[5]  Jagannathan Sarangapani Wireless Ad hoc and Sensor Networks: Protocols, Performance, and Control , 2017 .

[6]  Deborah Estrin,et al.  Highly-resilient, energy-efficient multipath routing in wireless sensor networks , 2001, MOCO.

[7]  Xin Ma,et al.  Energy-efficient multipath routing in wireless sensor network considering wireless interference , 2011 .

[8]  Boleslaw K. Szymanski,et al.  Energy Efficient Collision Aware Multipath Routing for Wireless Sensor Networks , 2009, 2009 IEEE International Conference on Communications.

[9]  Bülent Tavli,et al.  Optimal number of routing paths in multi-path routing to minimize energy consumption in wireless sensor networks , 2013, EURASIP Journal on Wireless Communications and Networking.

[10]  Jagannathan Sarangapani Wireless ad hoc and sensor networks : protocols, performance, and control/ Jagannathan Sarangapani , 2007 .

[11]  Andreas Pitsillides,et al.  A survey on secure multipath routing protocols in WSNs , 2010, Comput. Networks.

[12]  Deborah Estrin,et al.  Cyclops: in situ image sensing and interpretation in wireless sensor networks , 2005, SenSys '05.

[13]  Bülent Tavli,et al.  The impact of one-time energy costs on network lifetime in wireless sensor networks , 2009, IEEE Communications Letters.

[14]  Vipul Gupta,et al.  Energy analysis of public-key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.

[15]  Xiaojing Huang,et al.  A Survey of low duty cycle MAC protocols in wireless sensor networks , 2011 .

[16]  Lin Cai,et al.  Joint routing and link rate allocation under bandwidth and energy constraints in sensor networks , 2009, IEEE Transactions on Wireless Communications.

[17]  Jalel Ben-Othman,et al.  REER: Robust and Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[18]  Lin Chen,et al.  On Multipath Routing in Multihop Wireless Networks: Security, Performance, and Their Tradeoff , 2009, EURASIP J. Wirel. Commun. Netw..

[19]  Anantha P. Chandrakasan,et al.  An application-specific protocol architecture for wireless microsensor networks , 2002, IEEE Trans. Wirel. Commun..

[20]  Wenjing Lou,et al.  H-SPREAD: a hybrid multipath scheme for secure and reliable data collection in wireless sensor networks , 2006, IEEE Transactions on Vehicular Technology.

[21]  Bülent Tavli,et al.  Energy and Spatial Reuse Efficient Network-Wide Real-Time Data Broadcasting in Mobile Ad Hoc Networks , 2006, IEEE Transactions on Mobile Computing.

[22]  Huei-Wen Ferng,et al.  Design of Novel Node Distribution Strategies in Corona-Based Wireless Sensor Networks , 2011, IEEE Transactions on Mobile Computing.

[23]  Anantha Chandrakasan,et al.  Upper bounds on the lifetime of sensor networks , 2001, ICC 2001. IEEE International Conference on Communications. Conference Record (Cat. No.01CH37240).

[24]  Guevara Noubir,et al.  Linear programming models for jamming attacks on network traffic flows , 2008, WiOpt 2008.

[25]  Anantha Chandrakasan,et al.  Bounding the lifetime of sensor networks via optimal role assignments , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.

[26]  Adrian Perrig,et al.  Security and Privacy in Sensor Networks , 2003, Computer.

[27]  Peter Langendörfer,et al.  How public key cryptography influences wireless sensor node lifetime , 2006, SASN '06.

[28]  Panayiotis Kotzanikolaou,et al.  SecMR - a secure multipath routing protocol for ad hoc networks , 2007, Ad Hoc Networks.

[29]  Bev Littlewood,et al.  Redundancy and Diversity in Security , 2004, ESORICS.

[30]  Hanoch Levy,et al.  Session Privacy Enhancement by Traffic Dispersion , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[31]  Yuan Xue,et al.  Optimal Wireless Network Restoration under Jamming Attack , 2009, 2009 Proceedings of 18th International Conference on Computer Communications and Networks.

[32]  Bülent Tavli,et al.  Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks , 2009, Comput. Stand. Interfaces.

[33]  Luigi Palopoli,et al.  Scalable Offline Optimization of Industrial Wireless Sensor Networks , 2011, IEEE Transactions on Industrial Informatics.

[34]  Bülent Tavli,et al.  Mitigation of Compromising Privacy by Transmission Range Control in Wireless Sensor Networks , 2010, IEEE Communications Letters.

[35]  Gregory J. Pottie,et al.  Instrumenting the world with wireless sensor networks , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).

[36]  Jalel Ben-Othman,et al.  Enhancing data security in ad hoc networks based on multipath routing , 2010, J. Parallel Distributed Comput..

[37]  Joongseok Park,et al.  Maximum Lifetime Routing In Wireless Sensor Networks ∗ , 2005 .

[38]  Pravin Varaiya,et al.  On multi-hop routing for energy efficiency , 2005, IEEE Communications Letters.