An Anonymous Path Routing (APR) Protocol for Wireless Sensor Networks

How to secure data communication is an important problem in wireless sensor networks (WSNs). General solutions to the problem are to encrypt the packet payload with symmetric keys. But those solutions only prevent the packet content from being snooped or tampered. Adversaries still can learn of network topology by the traffic analysis attack for starting devastating attacks such as the denial-of-service attack and the like. In this paper, we propose an anonymous path routing (APR) protocol for WSNs. In APR, data are encrypted by pair-wise keys and transmitted with anonyms between neighboring sensor nodes and anonyms between the source and destination nodes of a multi-hop communication path. The encryption prevents adversaries from disclosing the data, and the anonymous communication prevents adversaries from observing the relation of the packets for further attacks. We implement APR on the MICAz platform to evaluate its overheads for demonstrating its applicability in practical WSNs.

[1]  Stefano Basagni,et al.  Secure pebblenets , 2001, MobiHoc '01.

[2]  Jiming Chen,et al.  A Communication Paradigm for Wireless Sensor/Actuator Networks , 2007, 2007 International Conference on Sensor Technologies and Applications (SENSORCOMM 2007).

[3]  Adrian Perrig,et al.  PIKE: peer intermediaries for key establishment in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[4]  Bart Preneel,et al.  Towards Measuring Anonymity , 2002, Privacy Enhancing Technologies.

[5]  Yu-Chee Tseng,et al.  The Broadcast Storm Problem in a Mobile Ad Hoc Network , 1999, Wirel. Networks.

[6]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[7]  Radu Marculescu,et al.  Real-Time Anonymous Routing for Mobile Ad Hoc Networks , 2007, 2007 IEEE Wireless Communications and Networking Conference.

[8]  Mohan S. Kankanhalli,et al.  Anonymous secure routing in mobile ad-hoc networks , 2004, 29th Annual IEEE International Conference on Local Computer Networks.

[9]  Ronggong Song,et al.  AnonDSR: efficient anonymous dynamic source routing for mobile ad-hoc networks , 2005, SASN '05.

[10]  Yang Xiao,et al.  Security in Sensor Networks , 2006 .

[11]  Mihir Bellare,et al.  The Security of Cipher Block Chaining , 1994, CRYPTO.

[12]  Cui Li,et al.  Overview of Wireless Sensor Networks , 2005 .

[13]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[14]  Zinaida Benenson,et al.  Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks , 2006, SPC.

[15]  Azzedine Boukerche,et al.  SDAR: a secure distributed anonymous routing protocol for wireless and mobile ad hoc networks , 2004, 29th Annual IEEE International Conference on Local Computer Networks.

[16]  Xiaoyan Hong,et al.  ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks , 2003, MobiHoc '03.

[17]  Sencun Zhu,et al.  SDAP: a secure hop-by-Hop data aggregation protocol for sensor networks , 2006, MobiHoc '06.

[18]  David Gay,et al.  Software design patterns for TinyOS , 2005, LCTES '05.

[19]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[20]  Donald E. Eastlake,et al.  US Secure Hash Algorithm 1 (SHA1) , 2001, RFC.

[21]  Niki Pissinou,et al.  Mobile and Wireless Network Security and Privacy , 2007 .

[22]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[23]  Genshe Chen,et al.  A decentralized approach to pursuer-evader games with multiple superior evaders , 2006, 2006 IEEE Intelligent Transportation Systems Conference.

[24]  Yunghsiang Sam Han,et al.  A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.

[25]  Mihir Bellare,et al.  The Security of the Cipher Block Chaining Message Authentication Code , 2000, J. Comput. Syst. Sci..

[26]  Ivan Stojmenovic,et al.  Data-Centric Protocols for Wireless Sensor Networks , 2005, Handbook of Sensor Networks.

[27]  Ian F. Akyildiz,et al.  A survey on wireless mesh networks , 2005, IEEE Communications Magazine.

[28]  Yunghsiang Sam Han,et al.  A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.

[29]  Zhen Jiang,et al.  Wireless and Sensor Networks Security (WSNS) A Retrospection , 2007, 2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems.

[30]  Yee Wei Law,et al.  Survey and benchmark of block ciphers for wireless sensor networks , 2006, TOSN.

[31]  Jeff Rose,et al.  Embedded Operating Systems for Wireless Microsensor Nodes , 2005, Handbook of Sensor Networks.

[32]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[33]  Jean-François Raymond,et al.  Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems , 2000, Workshop on Design Issues in Anonymity and Unobservability.

[34]  Ivan Stojmenovic,et al.  Handbook of Sensor Networks: Algorithms and Architectures , 2005, Handbook of Sensor Networks.

[35]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.