Shortest Path Routing With Risk Control for Compromised Wireless Sensor Networks

In wireless sensor networks, it is common that adversaries capture some nodes to intercept, tamper, or drop valuable packages. We can employ reputation systems to identify the compromised nodes (CNs). In this paper, the areas that cover a set of dense CNs are called compromised regions (CRs) and apparently, they are a greater threat to the networks than single CNs. To defend against the attack of CRs, we design a secure shortest path routing algorithm (SPRA) to deliver packages properly around, rather than through, the CRs. Specifically, a source node first computes the shortest geometric path to the sink node without crossing any CRs and then decides agent nodes along with the path by a set of virtual locations in an indirect way. At last, a sophisticated mechanism is designed based on geographic information to guarantee that the packages can be delivered in a relay manner between the agent nodes until they are transmitted to the sink node successfully. We conduct a series of experiments to compare our scheme with the dynamic greedy perimeter stateless routing and directed diffusion algorithms. The simulation results illustrate that SPRA can always find the short routing paths while guaranteeing the security of the packages.

[1]  Victor C. M. Leung,et al.  An Authenticated Trust and Reputation Calculation , 2017 .

[2]  Ming-Jer Tsai,et al.  A Comment on "HEED: A Hybrid, Energy-Efficient, Distributed Clustering Approach for Ad Hoc Sensor Networks' , 2006, IEEE Transactions on Mobile Computing.

[3]  Jiannong Cao,et al.  Secure localization and location verification in wireless sensor networks: a survey , 2010, The Journal of Supercomputing.

[4]  Ossama Younis,et al.  HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks , 2004, IEEE Transactions on Mobile Computing.

[5]  B. R. Badrinath,et al.  Trajectory based forwarding and its applications , 2003, MobiCom '03.

[6]  Daniel Minoli,et al.  Wireless Sensor Networks: Technology, Protocols, and Applications , 2007 .

[7]  Mianxiong Dong,et al.  ActiveTrust: Secure and Trustable Routing in Wireless Sensor Networks , 2016, IEEE Transactions on Information Forensics and Security.

[8]  Brad Karp,et al.  GPSR : Greedy Perimeter Stateless Routing for Wireless , 2000, MobiCom 2000.

[9]  Vinayak S. Naik,et al.  A line in the sand: a wireless sensor network for target detection, classification, and tracking , 2004, Comput. Networks.

[10]  Suat Özdemir Functional Reputation Based Data Aggregation for Wireless Sensor Networks , 2008, WiMob.

[11]  Di Wu,et al.  Opportunistic Routing Algorithm for Relay Node Selection in Wireless Sensor Networks , 2015, IEEE Transactions on Industrial Informatics.

[12]  Anantha P. Chandrakasan,et al.  An application-specific protocol architecture for wireless microsensor networks , 2002, IEEE Trans. Wirel. Commun..

[13]  Guang Li,et al.  An Energy-Balanced Routing Method Based on Forward-Aware Factor for Wireless Sensor Networks , 2014, IEEE Transactions on Industrial Informatics.

[14]  Na Wang,et al.  All-Direction Random Routing for Source-Location Privacy Protecting against Parasitic Sensor Networks , 2017, Sensors.

[15]  Geyong Min,et al.  Coordinate-Assisted Routing Approach to Bypass Routing Holes in Wireless Sensor Networks , 2017, IEEE Communications Magazine.

[16]  Deborah Estrin,et al.  Directed diffusion: a scalable and robust communication paradigm for sensor networks , 2000, MobiCom '00.

[17]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2004, SASN '04.

[18]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[19]  Prasanta K. Jana,et al.  Energy efficient clustering and routing algorithms for wireless sensor networks: Particle swarm optimization approach , 2014, Eng. Appl. Artif. Intell..

[20]  Audun Jøsang,et al.  AIS Electronic Library (AISeL) , 2017 .

[21]  Yun Liu,et al.  Double Cluster Heads Model for Secure and Accurate Data Fusion in Wireless Sensor Networks , 2015, Sensors.

[22]  Hans-Peter Kriegel,et al.  A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise , 1996, KDD.

[23]  J. Broach,et al.  The dynamic source routing protocol for mobile ad-hoc networks , 1998 .

[24]  Yun Liu,et al.  ICA: An Incremental Clustering Algorithm Based on OPTICS , 2015, Wireless Personal Communications.

[25]  Ronald L. Graham,et al.  An Efficient Algorithm for Determining the Convex Hull of a Finite Planar Set , 1972, Inf. Process. Lett..

[26]  Roberto Uribeetxeberria,et al.  Reputation-based Intrusion Detection System for wireless sensor networks , 2012, 2012 Complexity in Engineering (COMPENG). Proceedings.

[27]  R. Pooja Load-Balanced Opportunistic Routing for Duty-Cycled Wireless Sensor Networks , 2018 .