Defending against data forwarding misbehavior in sensor networks by quasimultipath technique: models and simulation

Malicious nodes dropping data packets is a serious security problem in a multihop sensor network because the misbehavior obstructs the mission of sensor networks for collecting and sending data to sinks. In this paper, we propose the quasimultipath data forwarding scheme. If a data packet is discarded by an adversarial node, the quasimultipath scheme enables a benign node in the network to retransmit the packet to a different neighbor node to bypass the adversarial node. In quasimultipath, we introduce a new mechanism of differential timeout to enable energy efficient retransmission against adversary dropping packets. To evaluate the performance, we model and simulate the defense against attacks. The simulation results show that the proposed scheme circumvents adversaries and achieves several-fold reduction in sensor node energy cost, compared to the state-of-the-art multipath method.

[1]  David E. Culler,et al.  Taming the underlying challenges of reliable multihop routing in sensor networks , 2003, SenSys '03.

[2]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.

[3]  Srdjan Capkun,et al.  BISS: building secure routing out of an incomplete set of security associations , 2003, WiSe '03.

[4]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[5]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[6]  Panagiotis Papadimitratos,et al.  Secure data transmission in mobile ad hoc networks , 2003, WiSe '03.

[7]  Deborah Estrin,et al.  Guest Editors' Introduction: Overview of Sensor Networks , 2004, Computer.

[8]  Deborah Estrin,et al.  Directed diffusion for wireless sensor networking , 2003, TNET.

[9]  Mark G. Terwilliger,et al.  Overview of Sensor Networks , 2004 .

[10]  David E. Culler,et al.  A transmission control scheme for media access in sensor networks , 2001, MobiCom '01.

[11]  Daniel R. Simon,et al.  Securing Routing in Open Networks Using Secure Traceroute , 2004 .

[12]  Ying Zhang,et al.  Combs, needles, haystacks: balancing push and pull for discovery in large-scale sensor networks , 2004, SenSys '04.

[13]  David E. Culler,et al.  The Emergence of Networking Abstractions and Techniques in TinyOS , 2004, NSDI.

[14]  Shivakant Mishra,et al.  A Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks , 2003, IPSN.

[15]  David A. Maltz,et al.  DSR: the dynamic source routing protocol for multihop wireless ad hoc networks , 2001 .

[16]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.