SCOTRES: Secure Routing for IoT and CPS

Wireless ad-hoc networks are becoming popular due to the emergence of the Internet of Things and cyber-physical systems (CPSs). Due to the open wireless medium, secure routing functionality becomes important. However, the current solutions focus on a constrain set of network vulnerabilities and do not provide protection against newer attacks. In this paper, we propose SCOTRES—a trust-based system for secure routing in ad-hoc networks which advances the intelligence of network entities by applying five novel metrics. The energy metric considers the resource consumption of each node, imposing similar amount of collaboration, and increasing the lifetime of the network. The topology metric is aware of the nodes’ positions and enhances load-balancing. The channel-health metric provides tolerance in periodic malfunctioning due to bad channel conditions and protects the network against jamming attacks. The reputation metric evaluates the cooperation of each participant for a specific network operation, detecting specialized attacks, while the trust metric estimates the overall compliance, safeguarding against combinatorial attacks. Theoretic analysis validates the security properties of the system. Performance and effectiveness are evaluated in the network simulator 2, integrating SCOTRES with the DSR routing protocol. Similar schemes are implemented using the same platform in order to provide a fair comparison. Moreover, SCOTRES is deployed on two typical embedded system platforms and applied on real CPSs for monitoring environmental parameters of a rural application on olive groves. As is evident from the above evaluations, the system provides the highest level of protection while retaining efficiency for real application deployments.

[1]  Yih-Chun Hu,et al.  Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.

[2]  André Carlos Ponce de Leon Ferreira de Carvalho,et al.  Fine-Tuning of UAV Control Rules for Spraying Pesticides on Crop Fields: An Approach for Dynamic Environments , 2016, Int. J. Artif. Intell. Tools.

[3]  Ioannis Papaefstathiou,et al.  ModConTR: A modular and configurable trust and reputation-based system for secure routing in ad-hoc networks , 2014, 2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA).

[4]  Satria Mandala,et al.  A Review of Current Routing Attacks in Mobile Ad Hoc Networks , 2008 .

[5]  Eui-Nam Huh,et al.  A lightweight intrusion detection framework for wireless sensor networks , 2010, CMC 2010.

[6]  Nazar Abbas Saqib,et al.  Detection of jamming attacks in 802.11b wireless networks , 2013, EURASIP Journal on Wireless Communications and Networking.

[7]  Sugata Sanyal,et al.  A Semi-distributed Reputation Based Intrusion Detection System for Mobile Adhoc Networks , 2010, ArXiv.

[8]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2008, TOSN.

[9]  Manju Khari,et al.  Survey of Trust Schemes on Ad-Hoc Network , 2012 .

[10]  Deepika Kukreja,et al.  Analytical models for trust based routing protocols in wireless ad hoc networks , 2012, SOEN.

[11]  Ioannis Papaefstathiou,et al.  An Open-Source Extendable, Highly-Accurate and Security Aware CPS Simulator , 2017, 2017 13th International Conference on Distributed Computing in Sensor Systems (DCOSS).

[12]  Charalampos Konstantopoulos,et al.  A survey on jamming attacks and countermeasures in WSNs , 2009, IEEE Communications Surveys & Tutorials.

[13]  Houbing Song,et al.  Cyber-physical systems for water sustainability: challenges and opportunities , 2015, IEEE Communications Magazine.

[14]  Anastasios A. Economides,et al.  Visual-Assisted Wormhole Attack Detection for Wireless Sensor Networks , 2014, SecureComm.

[15]  Sajal K. Das,et al.  Maintaining Defender's Reputation in Anomaly Detection Against Insider Attacks , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[16]  Simon Pietro Romano,et al.  A Reputation-Based Metric for Secure Routing in Wireless Mesh Networks , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[17]  Anastasios A. Economides,et al.  Defending jamming attacks in wireless sensor networks using stackelberg monitoring strategies , 2014, 2014 IEEE/CIC International Conference on Communications in China (ICCC).

[18]  Ioannis Papaefstathiou,et al.  Lightweight authenticated encryption for embedded on-chip systems , 2016, Inf. Secur. J. A Glob. Perspect..

[19]  Sayan Kumar Ray,et al.  Secure routing for internet of things: A survey , 2016, J. Netw. Comput. Appl..

[20]  Nei Kato,et al.  A survey of routing attacks in mobile ad hoc networks , 2007, IEEE Wireless Communications.

[21]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.

[22]  Yu Cheng,et al.  Ghost-in-ZigBee: Energy Depletion Attack on ZigBee-Based Wireless Networks , 2016, IEEE Internet of Things Journal.

[23]  Reputation-based Systems: a security analysis , 2007 .

[24]  Stéphane Devismes,et al.  SR3: secure resilient reputation-based routing , 2013, 2013 IEEE International Conference on Distributed Computing in Sensor Systems.

[25]  Xinyu Yang,et al.  On False Data Injection Attacks against Distributed Energy Routing in Smart Grid , 2012, 2012 IEEE/ACM Third International Conference on Cyber-Physical Systems.

[26]  Charalampos Manifavas,et al.  Building Trust in Ad Hoc Distributed Resource-Sharing Networks Using Reputation-Based Systems , 2012, 2012 16th Panhellenic Conference on Informatics.

[27]  Levent Ertaul,et al.  Evaluation of Secure Routing Protocols in Mobile Ad Hoc Networks (MANETs) , 2009, Security and Management.

[28]  Ioannis G. Askoxylakis,et al.  SecRoute: End-to-end secure communications for wireless ad-hoc networks , 2017, 2017 IEEE Symposium on Computers and Communications (ISCC).

[29]  Reza Curtmola,et al.  ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks , 2008, TSEC.

[30]  Antonio Capone,et al.  Cross-Layer Metrics for Reliable Routing in Wireless Mesh Networks , 2013, IEEE/ACM Transactions on Networking.

[31]  Xinwen Fu,et al.  A cloud computing based system for cyber security management , 2015, Int. J. Parallel Emergent Distributed Syst..

[32]  Anastasios A. Economides,et al.  Environmental Monitoring Based on the Wireless Sensor Networking Technology: A Survey of Real-World Applications , 2014, Int. J. Agric. Environ. Inf. Syst..

[33]  Cristina Nita-Rotaru,et al.  A survey of attack and defense techniques for reputation systems , 2009, CSUR.