Cryptographic protocols to fight sinkhole attacks on tree-based routing in Wireless Sensor Networks

This work introduces two new cryptographic protocols of different complexity and strength in limiting network degradation caused by sinkhole attacks on tree-based routing topologies in Wireless Sensor Networks (WSNs). The main goal of both protocols is to provide continuous operation by improving resilience against, rather than detection of, these attacks. The main benefit of providing resilience is that it allows operating (or graceful degradation) in the presence of attacks. Furthermore, while resilience mechanisms do not dismiss detection mechanisms, detection mechanisms often introduce more complexity and so, more weaknesses to the system, which might not justify their benefits. We provide a simulation study of the two protocols for three different routing protocols, that encompass typical routing strategies used in WSN. The results of our simulation study show that our cryptographic protocols are effective in improving resilience against sinkhole attacks, even in the presence of some collusion.

[1]  Bülent Yener,et al.  Key distribution mechanisms for wireless sensor networks : a survey , 2005 .

[2]  Ricardo Dahab,et al.  TinyTate: Identity-Based Encryption for Sensor Networks , 2007, IACR Cryptol. ePrint Arch..

[3]  Venkata M. Mulpuru,et al.  Detecting selective forwarding attacks in wireless sensor networks , 2008 .

[4]  Deborah Estrin,et al.  Residual Energy Scans for Monitoring Wireless Sensor Networks , 2002 .

[5]  Deborah Estrin,et al.  The impact of data aggregation in wireless sensor networks , 2002, Proceedings 22nd International Conference on Distributed Computing Systems Workshops.

[6]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[7]  Sandip Sen,et al.  Using Learned Data Patterns to Detect Malicious Nodes in Sensor Networks , 2008, ICDCN.

[8]  Shivakant Mishra,et al.  INSENS: Intrusion-Tolerant Routing in Wireless Sensor Networks ; CU-CS-939-02 , 2002 .

[9]  Yoon-Hwa Choi,et al.  A secure alternate path routing in sensor networks , 2006, Comput. Commun..

[10]  A. C. Viana,et al.  Fighting Sinkhole Attacks in Tree-based Routing Topologies , 2009 .

[11]  Wei Hong,et al.  Proceedings of the 5th Symposium on Operating Systems Design and Implementation Tag: a Tiny Aggregation Service for Ad-hoc Sensor Networks , 2022 .

[12]  Ye Sun,et al.  Power-efficient data dissemination in wireless sensor networks , 2003, MobiDe '03.

[13]  Deborah Estrin,et al.  Directed diffusion: a scalable and robust communication paradigm for sensor networks , 2000, MobiCom '00.

[14]  Songwu Lu,et al.  A scalable solution to minimum cost forwarding in large sensor networks , 2001, Proceedings Tenth International Conference on Computer Communications and Networks (Cat. No.01EX495).

[15]  Feng Lu,et al.  Research on Identity-Based Cluster Access Control Model with Dynamic Trust Agent for Mobile Ad Hoc Networks , 2006, 2006 International Conference on Wireless Communications, Networking and Mobile Computing.

[16]  Michael D. Smith,et al.  Implementing public-key infrastructure for sensor networks , 2008, TOSN.

[17]  Ricardo Dahab,et al.  Identity-Based Encryption for Sensor Networks , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07).

[18]  Zhu Han,et al.  A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[19]  K. J. Ray Liu,et al.  Attack-resistant cooperation stimulation in autonomous ad hoc networks , 2005, IEEE Journal on Selected Areas in Communications.

[20]  Edward W. Knightly,et al.  Impact of Denial of Service Attacks on Ad Hoc Networks , 2008, IEEE/ACM Transactions on Networking.

[21]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[22]  Zhaoyu Liu,et al.  A dynamic trust model for mobile ad hoc networks , 2004, Proceedings. 10th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2004. FTDCS 2004..

[23]  Deborah Estrin,et al.  Sympathy for the sensor network debugger , 2005, SenSys '05.