A Reputation-Based Routing Protocol for Wireless Sensor Networks

In the last decade Wireless Sensor Networks (WSNs) have been gaining recognition due to the fact that they provide inexpensive solutions for a diversity of sensitive applications. However, these networks are at high risk to many routing attacks due to the nature of their deployment as well as their device characteristics. They are usually deployed in a distributed manner, unattended for a long period of time with limited network resources such as memory, bandwidth, energy and computation power. Therefore, security plays an important role. In this paper, we propose a reputation-based routing protocol that is sufficient to thwart the routing attacks in the neighborhood for WSNs. The proposed protocol maintains neighbors reputations based on their locations and packet transmission information to select the well-behaved forwarding node to transmit the data packets through multiple hops toward the destination. Our results illustrate the enhancement of network performance in terms of packet delivery as well as a reduced amount of attack selection in the process of transmitting packet to the destination.

[1]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.

[2]  Victor C. M. Leung,et al.  Secure Routing for Mobile Ad Hoc Networks , 2006 .

[3]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[4]  Yih-Chun Hu,et al.  SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2003, Ad Hoc Networks.

[5]  Jiejun Kong,et al.  Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.

[6]  Theodore B. Zahariadis,et al.  Combining trust with location information for routing in wireless sensor networks , 2012, Wirel. Commun. Mob. Comput..

[7]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[8]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[9]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[10]  Yih-Chun Hu,et al.  SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.

[11]  Tian He,et al.  SIGF: a family of configurable, secure routing protocols for wireless sensor networks , 2006, SASN '06.

[12]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[13]  Rosli Salleh,et al.  Overview of Security Issues in Wireless Sensor Networks , 2011, 2011 Third International Conference on Computational Intelligence, Modelling & Simulation.

[14]  Yih-Chun Hu,et al.  Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.

[15]  Mahamod Ismail,et al.  Impact of blackhole and Sybil attacks on dynamic windows secured implicit geographic forwarding routing protocol , 2014, IET Inf. Secur..

[16]  Pedro M. Ruiz,et al.  SBGR: A Simple Self-Protected Beaconless Geographic Routing for Wireless Sensor Networks , 2011, 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems.

[17]  Xu Qiao-ping,et al.  Secure On-demand Routing Protocol for Ad Hoc Network , 2010 .