Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs

The multihop routing in wireless sensor networks (WSNs) offers little protection against identity deception through replaying routing information. An adversary can exploit this defect to launch various harmful or even devastating attacks against the routing protocols, including sinkhole attacks, wormhole attacks, and Sybil attacks. The situation is further aggravated by mobile and harsh network conditions. Traditional cryptographic techniques or efforts at developing trust-aware routing protocols do not effectively address this severe problem. To secure the WSNs against adversaries misdirecting the multihop routing, we have designed and implemented TARF, a robust trust-aware routing framework for dynamic WSNs. Without tight time synchronization or known geographic information, TARF provides trustworthy and energy-efficient route. Most importantly, TARF proves effective against those harmful attacks developed out of identity deception; the resilience of TARF is verified through extensive evaluation with both simulation and empirical experiments on large-scale WSNs under various scenarios including mobile and RF-shielding network conditions. Further, we have implemented a low-overhead TARF module in TinyOS; as demonstrated, this implementation can be incorporated into existing routing protocols with the least effort. Based on TARF, we also demonstrated a proof-of-concept mobile target detection application that functions well against an antidetection mechanism.

[1]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[2]  JAMAL N. AL-KARAKI,et al.  Routing techniques in wireless sensor networks: a survey , 2004, IEEE Wireless Communications.

[3]  A. Perrig,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[4]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[5]  N. Pissinou,et al.  Collaborative trust-based secure routing against colluding malicious nodes in multi-hop ad hoc networks , 2004, 29th Annual IEEE International Conference on Local Computer Networks.

[6]  Charles E. Perkins,et al.  Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.

[7]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2004, SASN '04.

[8]  TAODV : A Trusted AODV Routing Protocol for Mobile Ad Hoc Networks , 2004 .

[9]  Mohit Jain,et al.  Notice of Violation of IEEE Publication Principles A Survey on Complex Wormhole Attack in Wireless Ad Hoc Networks , 2009 .

[10]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[11]  Ioannis Papaefstathiou,et al.  DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNS , 2010 .

[12]  Sajal K. Das,et al.  Modeling node compromise spread in wireless sensor networks using epidemic theory , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).

[13]  Wang Sheng,et al.  Mobile agent based moving target methods in wireless sensor networks , 2005, IEEE International Symposium on Communications and Information Technology, 2005. ISCIT 2005..

[14]  Shiuh-Pyng Shieh,et al.  An efficient broadcast authentication scheme in wireless sensor networks , 2006, ASIACCS '06.

[15]  Makoto Takizawa,et al.  A Survey on Clustering Algorithms for Wireless Sensor Networks , 2010, 2010 13th International Conference on Network-Based Information Systems.

[16]  Xiaoyan Hong,et al.  A group mobility model for ad hoc wireless networks , 1999, MSWiM '99.

[17]  Hassan Artail,et al.  A cluster-based trust-aware routing protocol for mobile ad hoc networks , 2010, Wirel. Networks.

[18]  Peng Ning,et al.  2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .

[19]  Zheng Yan,et al.  Trust Evaluation Based Security Solution in Ad Hoc Networks , 2003 .

[20]  David E. Culler,et al.  Taming the underlying challenges of reliable multihop routing in sensor networks , 2003, SenSys '03.

[21]  Wenjing Lou,et al.  On Broadcast Authentication in Wireless Sensor Networks , 2006, IEEE Transactions on Wireless Communications.

[22]  Leonidas J. Guibas,et al.  Wireless sensor networks - an information processing approach , 2004, The Morgan Kaufmann series in networking.

[23]  Qiang Wang,et al.  A mobile-agent-based middleware for wireless sensor networks data fusion , 2009, 2009 IEEE Instrumentation and Measurement Technology Conference.

[24]  Ming Gu,et al.  Trust Based Routing for Misbehavior Detection in Ad Hoc Networks , 2010, J. Networks.

[25]  Weisong Shi,et al.  TARF: A Trust-Aware Routing Framework for Wireless Sensor Networks , 2010, EWSN.

[26]  Philip Levis,et al.  Collection tree protocol , 2009, SenSys '09.

[27]  Tassos Dimitriou,et al.  Launching a Sinkhole Attack in Wireless Sensor Networks; The Intruder Side , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.

[28]  Peter Kruus,et al.  TinyPK: securing sensor networks with public key technology , 2004, SASN '04.

[29]  Zhong Chen,et al.  FBSR: feedback-based secure routing protocol for wireless sensor networks , 2008, Int. J. Pervasive Comput. Commun..

[30]  Mohamed Eltoweissy,et al.  TARP: A Trust-Aware Routing Protocol for Sensor-Actuator Networks , 2007, 2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems.

[31]  Li Bai,et al.  Performance analysis of mobile agent-based wireless sensor network , 2009, 2009 8th International Conference on Reliability, Maintainability and Safety.

[32]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[33]  Panagiotis Karkazis,et al.  DESIGN AND IMPLEMENTATION OF A TRUST -AWARE ROUTING PROTOCOL FOR LARGE WSN S , 2010 .

[34]  Shin Dong-Ryeol,et al.  A Mobile Agent Based LEACH in Wireless Sensor Networks , 2008, 2008 10th International Conference on Advanced Communication Technology.

[35]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[36]  Weisong Shi,et al.  SensorTrust: a resilient trust model for WSNs , 2009, SenSys '09.

[37]  Xiaoyan Hong,et al.  Recent advances in mobility modeling for mobile ad hoc network research , 2004, ACM-SE 42.