A Trust Based Routing Protocol for Mitigation of Sinkhole Attacks in Wireless Sensor Networks

520  Abstract—As wireless sensor networks are characterized by severely constrained node resources, low communication range, low memory capacity and dynamic nature of WSNs, implementing security functionality and detection protocols to protect against adversary nodes becomes a challenging task. It is very likely that the encryption keys in the sensor nodes are accessed by attacker entities. The compromised nodes can launch sinkhole or wormhole attack to prevent the arrival of important information to the base station (BS). Establishing trust among distributed network entities has been recognized as a powerful tool to secure distributed networks such as MANETs and sensor networks. In this paper we first estimate the area in the network where a sinkhole attack has occurred there by considering the energy consumption model in the network. Then we present an entropy-based trust model in which more factors that affect trust computation are introduced. We apply a trust-based routing for providing a high level of security by path selection based on packet trust requirement. So it is needed that a routing protocol classifies the traffic packets according to their requested security and then routs the packets related to each class through the path that fulfills the security requirements of them. Our proposed approach that purposes to cover the mentioned problem is a resource efficient security protocol. This means that a trust value is allocated to the area suspected of sinkhole; the area is located by analyzing the energy of networks nodes and the packet is forwarded through low risk paths.

[1]  Rodrigo Roman,et al.  Trust management systems for wireless sensor networks: Best practices , 2010, Comput. Commun..

[2]  Zhu Han,et al.  Information theoretic framework of trust modeling and evaluation for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.

[3]  Gang Qu,et al.  Insider Threats against Trust Mechanism with Watchdog and Defending Approaches in Wireless Sensor Networks , 2012, 2012 IEEE Symposium on Security and Privacy Workshops.

[4]  Huafeng Wu,et al.  Reputation-based Trust in Wireless Sensor Networks , 2007, 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE'07).

[5]  Ruttikorn Varakulsiripunth,et al.  Detecting sinkhole attack and selective forwarding attack in wireless sensor networks , 2009, 2009 7th International Conference on Information, Communications and Signal Processing (ICICS).

[6]  Dong Yang,et al.  TSRF: A Trust-Aware Secure Routing Framework in Wireless Sensor Networks , 2014, Int. J. Distributed Sens. Networks.

[7]  Usman Tariq,et al.  Sinkhole Vulnerabilities in Wireless Sensor Networks , 2014 .

[8]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[9]  Tassos Dimitriou,et al.  Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks , 2007, ALGOSENSORS.

[10]  Michael R. Lyu,et al.  An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks , 2007, Comput. Commun..

[11]  Habib M. Ammari Investigating the Energy Sink-Hole Problem in Connected $k$ -Covered Wireless Sensor Networks , 2014, IEEE Transactions on Computers.

[12]  Min Song,et al.  Intrusion detection of sinkhole attacks in large-scale wireless sensor networks , 2010, 2010 IEEE International Conference on Wireless Communications, Networking and Information Security.

[13]  Ahmad Khonsari,et al.  Detection and mitigation of sinkhole attacks in wireless sensor networks , 2014, J. Comput. Syst. Sci..

[14]  Zhu Han,et al.  Defense of trust management vulnerabilities in distributed networks , 2008, IEEE Communications Magazine.

[15]  Amir Masoud Rahmani,et al.  HOCA: Healthcare Aware Optimized Congestion Avoidance and control protocol for wireless sensor networks , 2014, J. Netw. Comput. Appl..

[16]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[17]  Ronald L. Rivest,et al.  The RC5 Encryption Algorithm , 1994, FSE.

[18]  Narayan C. Debnath,et al.  Countering sinkhole and black hole attacks on sensor networks using Dynamic Trust Management , 2008, 2008 IEEE Symposium on Computers and Communications.

[19]  Cigdem Sengul,et al.  A sinkhole resilient protocol for wireless sensor networks: Performance and security analysis , 2012, Comput. Commun..