Secure and efficient disjoint multipath construction for fault tolerant routing in wireless sensor networks

In wireless sensor networks, reliability is a design goal of a primary concern. To build a comprehensive reliable system, it is essential to consider node failures and intruder attacks as unavoidable phenomena. In this paper, we present a new intrusion-fault tolerant routing scheme offering a high level of reliability through a secure multipath routing construction. Unlike existing intrusion-fault tolerant solutions, our protocol is based on a distributed and in-network verification scheme, which does not require any referring to the base station. Furthermore, it employs a new multipath selection scheme seeking to enhance the tolerance of the network and conserve the energy of sensors. Extensive analysis and simulations using TinyOS showed that our approach improves many important performance metrics such as: the mean time to failure of the network, detection overhead of some security attacks, energy consumption, and resilience.

[1]  JAMAL N. AL-KARAKI,et al.  Routing techniques in wireless sensor networks: a survey , 2004, IEEE Wireless Communications.

[2]  Robert Szewczyk,et al.  System architecture directions for networked sensors , 2000, ASPLOS IX.

[3]  Yu Haibin,et al.  A novel multipath disjoint routing to support ad hoc wireless sensor networks , 2006, Ninth IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC'06).

[4]  Shivakant Mishra,et al.  INSENS: Intrusion-Tolerant Routing in Wireless Sensor Networks , 2002 .

[5]  Chao Wang,et al.  Fault and intrusion tolerance of wireless sensor networks , 2006, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium.

[6]  Nidal Nasser,et al.  Secure Multipath Routing Protocol for Wireless Sensor Networks , 2007, 27th International Conference on Distributed Computing Systems Workshops (ICDCSW'07).

[7]  Jens Palsberg,et al.  Avrora: scalable sensor network simulation with precise timing , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[8]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[9]  Gregory J. Pottie,et al.  Protocols for self-organization of a wireless sensor network , 2000, IEEE Wirel. Commun..

[10]  Preetida Vinayakray Jani ALGORITHM DRIVEN SYSTEM SELECTION WITH RECONFIGURABLE SOFTWARE DEFINED RADIO IN MOBILE DEVICES , 2010 .

[11]  Lin Chen,et al.  On Multipath Routing in Multihop Wireless Networks: Security, Performance, and Their Tradeoff , 2009, EURASIP J. Wirel. Commun. Netw..

[12]  Alvin S. Lim,et al.  Delay-constrained high throughput protocol for multi-path transmission over wireless multimedia sensor networks , 2008, 2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks.

[13]  Wenjing Lou,et al.  H-SPREAD: a hybrid multipath scheme for secure and reliable data collection in wireless sensor networks , 2006, IEEE Transactions on Vehicular Technology.

[14]  Albert,et al.  Emergence of scaling in random networks , 1999, Science.

[15]  Andreas Pitsillides,et al.  A survey on secure multipath routing protocols in WSNs , 2010, Comput. Networks.

[16]  Sushil Jajodia,et al.  LEAP - efficient security mechanisms for large-scale distributed sensor networks , 2003, SenSys.

[17]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[18]  David E. Culler,et al.  TOSSIM: accurate and scalable simulation of entire TinyOS applications , 2003, SenSys '03.

[19]  Djamel Djenouri,et al.  A survey of security issues in mobile ad hoc and sensor networks , 2005, IEEE Communications Surveys & Tutorials.

[20]  Jing-Yu Yang,et al.  Network coding based reliable disjoint and braided multipath routing for sensor networks , 2010, J. Netw. Comput. Appl..

[21]  Moonseong Kim,et al.  Multipath Energy-Aware Routing Protocol in Wireless Sensor Networks , 2008, 2008 5th International Conference on Networked Sensing Systems.

[22]  Shanping Li,et al.  Node-disjoint parallel multi-path routing in wireless sensor networks , 2005, Second International Conference on Embedded Software and Systems (ICESS'05).

[23]  Michael O. Rabin,et al.  Efficient dispersal of information for security, load balancing, and fault tolerance , 1989, JACM.

[24]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[25]  Xiaojiang Du,et al.  A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..

[26]  Yoon-Hwa Choi,et al.  A secure alternate path routing in sensor networks , 2006, Comput. Commun..

[27]  Song Guo,et al.  A Flexible and Efficient Key Distribution Scheme for Renewable Wireless Sensor Networks , 2009, EURASIP J. Wirel. Commun. Netw..

[28]  Yau-Hwang Kuo,et al.  Fairness and QoS Guarantees of WiMAX OFDMA Scheduling with Fuzzy Controls , 2009, EURASIP J. Wirel. Commun. Netw..

[29]  Deborah Estrin,et al.  Highly-resilient, energy-efficient multipath routing in wireless sensor networks , 2001, MOCO.

[30]  Ronghui Hou,et al.  A localized algorithm for finding disjoint paths in wireless sensor networks , 2006, IEEE Communications Letters.