Secure Routing and Broadcast Authentication in Heterogeneous Sensor Networks

Security of sensor network communication architecture relies on its routing scheme. This paper presents a secure routing scheme for heterogeneous sensor networks (HSNs). HSNs have proven to be more secure and scalable as compared to homogeneous sensor networks which are prone to routing attacks due to resource constraints. In our proposed scheme, routing tables are generated with multipath routing. Base station generates inter-cluster routes and cluster head generates intra-cluster routes. This minimizes the computation load on cluster nodes. We also provide light-weight broadcast authentication used for secure routing table generation and data communication; and to reduce communication overhead. Further, proposed scheme introduces security architecture with in routing protocol. The analysis of proposed scheme shows that it is secure against routing attacks and tolerant to compromised nodes.

[1]  Shivakant Mishra,et al.  A Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks , 2003, IPSN.

[2]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[3]  M. Luk,et al.  MiniSec: A Secure Sensor Network Communication Architecture , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.

[4]  Deborah Estrin,et al.  Exploiting heterogeneity for routing in wireless sensor networks , 2006 .

[5]  Brad Karp,et al.  GPSR : Greedy Perimeter Stateless Routing for Wireless , 2000, MobiCom 2000.

[6]  Yaping Li,et al.  ARRIVE: Algorithm for Robust Routing in Volatile Environments , 2003 .

[7]  Nael B. Abu-Ghazaleh,et al.  Towards resilient geographic routing in WSNs , 2005, Q2SWinet '05.

[8]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[9]  Xiaojiang Du,et al.  Maintaining Differentiated Coverage in Heterogeneous Sensor Networks , 2005, EURASIP J. Wirel. Commun. Netw..

[10]  Deborah Estrin,et al.  Geographical and Energy Aware Routing: a recursive data dissemination protocol for wireless sensor networks , 2002 .

[11]  Shivakant Mishra,et al.  INSENS: Intrusion-Tolerant Routing in Wireless Sensor Networks , 2002 .

[12]  Frank Stajano,et al.  The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.

[13]  Catherine Rosenberg,et al.  A minimum cost heterogeneous sensor network with a lifetime constraint , 2005, IEEE Transactions on Mobile Computing.

[14]  Laurence T. Yang,et al.  Scalable and efficient key management for heterogeneous sensor networks , 2008, The Journal of Supercomputing.

[15]  Nael B. Abu-Ghazaleh,et al.  An application-driven perspective on wireless sensor network security , 2006, Q2SWinet '06.

[16]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[17]  Michael Mitzenmacher,et al.  Compressed bloom filters , 2001, PODC '01.