Wireless sensor network wormhole avoidance using reputation-based routing

Wireless sensor networks offer a practical and economically viable alternative to manual data gathering in general and military scenarios, providing a means of surveillance of a region of terrain and providing warning of any threats. However, in hostile scenarios, the network is likely to come under attack from malicious entities which seek to compromise routing diversity in these environments. This paper introduces a low overhead wireless sensor network routing technique which seeks to establish a set of trusted stable routes during the early deployment period of a wireless sensor network, and favour them during future network operation when less trusted devices may be introduced. An example case study is presented illustrating continued routing resilience during a malicious hardware insertion attack known as the wormhole attack.

[1]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[2]  Panagiotis Papadimitratos,et al.  A practical secure neighbor verification protocol for wireless sensor networks , 2009, WiSec '09.

[3]  A. Laouiti,et al.  Optimized link state routing protocol for ad hoc networks , 2001, Proceedings. IEEE International Multi Topic Conference, 2001. IEEE INMIC 2001. Technology for the 21st Century..

[4]  Peter C. Mason,et al.  Enhancing frequency-based wormhole attack detection with novel jitter waveforms , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.

[5]  David Evans,et al.  Using Directional Antennas to Prevent Wormhole Attacks , 2004, NDSS.

[6]  James Harbin,et al.  Wireless sensor network wormhole avoidance using disturbance-based routing schemes , 2009, 2009 6th International Symposium on Wireless Communication Systems.

[7]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[8]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[9]  Lijun Qian,et al.  Detection of wormhole attacks in multi-path routed wireless ad hoc networks: A statistical analysis approach , 2007, J. Netw. Comput. Appl..

[10]  Kay Römer,et al.  The design space of wireless sensor networks , 2004, IEEE Wireless Communications.

[11]  Radha Poovendran,et al.  A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks , 2007, Wirel. Networks.

[12]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[13]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[14]  Bharat K. Bhargava,et al.  Visualization of wormholes in sensor networks , 2004, WiSe '04.