Flooding in secure wireless sensor networks: Student contribution

The flooding algorithm remains one of the simplest and most effective ways to quickly disseminate information across all nodes in a Wireless Sensor Network. Though fast, this algorithm remains unsecure as the packets can be intercepted by malice agents to reveal the information. In this paper, simulations of a flooding algorithm in Sensor Networks secured by a Random Key Pre-distribution model are presented. We conducted these simulations on ns-3 over a theoretical Peer-to-peer and a standard based IEEE 802.15.4 network. This is followed by a demonstration of the robustness of the network through a random black hole attack.

[1]  B. Bollobás The evolution of random graphs , 1984 .

[2]  P. Erdos,et al.  On the evolution of random graphs , 1984 .

[3]  Gene Tsudik,et al.  Flooding for Reliable Multicast in Multi-Hop Ad Hoc Networks , 1999, DIALM '99.

[4]  A. Rbnyi ON THE EVOLUTION OF RANDOM GRAPHS , 2001 .

[5]  J. Dall,et al.  Random geometric graphs. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.

[6]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[7]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[8]  Adrian Perrig,et al.  Security in wireless sensor networks - eScholarship , 2004 .

[9]  P. Gburzynski,et al.  Controlled flooding in wireless ad-hoc networks , 2004, International Workshop on Wireless Ad-Hoc Networks, 2004..

[10]  Heiko Rieger,et al.  Random walks on complex networks. , 2004, Physical review letters.

[11]  Edmond Chow,et al.  A Scalable Distributed Parallel Breadth-First Search Algorithm on BlueGene/L , 2005, ACM/IEEE SC 2005 Conference (SC'05).

[12]  Nilesh Mishra Routing in Wireless Sensor Networks , 2006 .

[13]  Stephen Brown Updating Software in Wireless Sensor Networks: A Survey , 2006 .

[14]  Anne-Marie Kermarrec,et al.  GCP: gossip-based code propagation for large-scale mobile wireless sensor networks , 2007, AUTONOMICS 2007.

[15]  Nei Kato,et al.  A survey of routing attacks in mobile ad hoc networks , 2007, IEEE Wireless Communications.

[16]  Ida Pu,et al.  Energy Efficient Expanding Ring Search , 2007, First Asia International Conference on Modelling & Simulation (AMS'07).

[17]  Mukesh Singhal,et al.  Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..

[18]  Roberto Di Pietro,et al.  Redoubtable Sensor Networks , 2008, TSEC.

[19]  Ivan Stojmenovic,et al.  Routing in Wireless Sensor Networks , 2009, Guide to Wireless Sensor Networks.

[20]  Klaus Wehrle,et al.  A Performance Comparison of Recent Network Simulators , 2009, 2009 IEEE International Conference on Communications.

[21]  Avita Katal,et al.  Detection and prevention mechanism for Blackhole attack in Wireless Sensor Network , 2013, 2013 International Conference on Communication and Signal Processing.

[22]  Mohamed Jmaiel,et al.  Greedy Flooding in Redoubtable Sensor Networks , 2014, 2014 IEEE 28th International Conference on Advanced Information Networking and Applications.

[23]  Mohamed Mosbah,et al.  ViSiDiA: A Java Framework for Designing, Simulating, and Visualizing Distributed Algorithms , 2014, 2014 IEEE/ACM 18th International Symposium on Distributed Simulation and Real Time Applications.

[24]  Binod Kumar Mishra,et al.  Security against Black Hole Attack in Wireless Sensor Network - A Review , 2014, 2014 Fourth International Conference on Communication Systems and Network Technologies.

[25]  Julio Muñoz,et al.  A flooding routing algorithm for a wireless sensor network for seismic events , 2015, 2015 International Conference on Computing Systems and Telematics (ICCSAT).