Enhancing Trust-Aware Routing by False Alarm Detection and Recovery

Insider packet drop attacks have become a serious threat to wireless sensor networks. To distinguish a packet dropped by inside attackers from network failures, each node will use a trust mechanism to evaluate its neighbor node's trustworthiness so it can send packets only to the trustworthy neighbors. One problem associated with such trust-aware routing algorithms is the false alarm which occurs when a good node's trust value goes down and being eliminated from the routing paths. This wastes network's resource and shortens network lifetime as most trust mechanisms seek to aggressively identify attackers at the cost of increasing false alarm rate. We propose a False Alarm DEtection and Recovery (FADER) technique to solve this problem. Instead of abandoning a node with low trust value from the network, we put it into an intermediate state between trusted and untrusted, known as suspicious node. We find alternate routing path for packet forwarding to guarantee the network's packet delivery rate. Meanwhile, we continue to send packet to the suspicious node and monitoring its trust value in order to determine whether the node is untrusted or a false alarm. We have conducted extensive OPNET simulations and the results demonstrate that the proposed FADER approach can improve the performance of the trust-aware routing protocol in terms of the network lifetime, the packet delivery rate, and many other routing performance measures. FADER is able to recover at least 60% of the false alarms without recovering any of the real attackers, this results in an average increase of about 40% in network's lifetime and can be as high as 83%.

[1]  Falko Dressler,et al.  On the lifetime of wireless sensor networks , 2009, TOSN.

[2]  Ping Li,et al.  Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures , 2012, J. Netw. Comput. Appl..

[3]  Jin-Hee Cho,et al.  Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection , 2012, IEEE Transactions on Network and Service Management.

[4]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2008, TOSN.

[5]  Gang Qu,et al.  Insider Threats against Trust Mechanism with Watchdog and Defending Approaches in Wireless Sensor Networks , 2012, 2012 IEEE Symposium on Security and Privacy Workshops.

[6]  Hung-Min Sun,et al.  An efficient countermeasure to the selective forwarding attack in wireless sensor networks , 2007, TENCON 2007 - 2007 IEEE Region 10 Conference.

[7]  Gang Zhou,et al.  Impact of radio irregularity on wireless sensor networks , 2004, MobiSys '04.

[8]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[9]  Soufiene Djahel,et al.  Mitigating Packet Dropping Problem in Mobile Ad Hoc Networks: Proposals and Challenges , 2011, IEEE Communications Surveys & Tutorials.

[10]  Chris McDonald,et al.  Trusted Greedy Perimeter Stateless Routing , 2007, 2007 15th IEEE International Conference on Networks.

[11]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[12]  Audun Jøsang,et al.  AIS Electronic Library (AISeL) , 2017 .

[13]  Gang Qu,et al.  FADER: False alarm detection and recovery for trust-aware routing in wireless sensor networks , 2013, 2013 International Conference on Connected Vehicles and Expo (ICCVE).

[14]  Bo Yu,et al.  Detecting selective forwarding attacks in wireless sensor networks , 2006, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium.

[15]  Brad Karp,et al.  GPSR: greedy perimeter stateless routing for wireless networks , 2000, MobiCom '00.

[16]  Zhu Han,et al.  Defense of trust management vulnerabilities in distributed networks , 2008, IEEE Communications Magazine.