Design and simulation on data-forwarding security in sensor networks

Wireless sensor networks are the emerging information technology for monitoring equipment and ambient conditions of production lines in modern factories. A salient feature of wireless sensor networks is that nodes can relay sensing data to a factory data centre in a multihop fashion. Existing security solutions to sensor networks focus on hop-by-hop encryption and message authentication, as the wireless medium is of an open nature. From an end-to-end perspective, a challenging security problem arises when computer hackers compromise some nodes in a network and these adversarial nodes modify or drop data packets destined to a data centre. In this paper, we propose the Secure Quasimultipath Forwarding (SQF) scheme with the novel idea of dynamic en route retransmission upon encountering adversary nodes. Modelling techniques are employed to study the impact of the data-forwarding security design on packet delivery latency and energy consumption. The simulation results demonstrate that SQF circumvents adversaries with a several-fold reduction in sensor node energy consumption, compared to the existing multipath routing method.

[1]  Suresh Singh,et al.  Exploiting heterogeneity in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[2]  Benjamin Metzler,et al.  Sensor networks in Intel fabrication plants , 2004, SenSys '04.

[3]  Jean-Dominique Decotignie Which Network for Which Application , 2005, The Industrial Information Technology Handbook.

[4]  Panagiotis Papadimitratos,et al.  Secure message transmission in mobile ad hoc networks , 2003, Ad Hoc Networks.

[5]  Shashidhar Gandham,et al.  A Survey on Self-Organizing Wireless Sensor Networks , 2005, The Industrial Information Technology Handbook.

[6]  David E. Culler,et al.  The Emergence of Networking Abstractions and Techniques in TinyOS , 2004, NSDI.

[7]  E. Callaway Secure Low-Power Operation of Wireless Sensor Networks , 2004 .

[8]  J. Haehniche,et al.  Radio communication in automation systems: the R-fieldbus approach , 2000, 2000 IEEE International Workshop on Factory Communication Systems. Proceedings (Cat. No.00TH8531).

[9]  Thomas P. von Hoff,et al.  Security for Industrial Communication Systems , 2005, Proceedings of the IEEE.

[10]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[11]  Shivakant Mishra,et al.  A Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks , 2003, IPSN.

[12]  Srdjan Capkun,et al.  BISS: building secure routing out of an incomplete set of security associations , 2003, WiSe '03.

[13]  Sandeep K. S. Gupta,et al.  Analytical comparison of local and end-to-end error recovery in reactive routing protocols for mobile ad hoc networks , 2000, MSWIM '00.

[14]  Sandeep K. Shukla,et al.  An Introductory Survey of Networked Embedded Systems , 2005, The Industrial Information Technology Handbook.

[15]  Ying Zhang,et al.  Combs, needles, haystacks: balancing push and pull for discovery in large-scale sensor networks , 2004, SenSys '04.

[16]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.

[17]  Yaping Li,et al.  ARRIVE: Algorithm for Robust Routing in Volatile Environments , 2003 .

[18]  David A. Maltz,et al.  DSR: the dynamic source routing protocol for multihop wireless ad hoc networks , 2001 .

[19]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[20]  J. Andreasson,et al.  Wireless industrial sensor monitoring based on Bluetooth/spl trade/ , 2003, IEEE International Conference on Industrial Informatics, 2003. INDIN 2003. Proceedings..

[21]  David E. Culler,et al.  Taming the underlying challenges of reliable multihop routing in sensor networks , 2003, SenSys '03.

[22]  Andreas Willig,et al.  Measurements of a wireless link in an industrial environment using an IEEE 802.11-compliant physical layer , 2002, IEEE Trans. Ind. Electron..

[23]  Frank Golatowski,et al.  Software for Wireless Sensor Networks , 2005, The Industrial Information Technology Handbook.

[24]  A. Munro,et al.  Wireless ad-hoc networks-implications of services on demand , 2000, 2000 26th Annual Conference of the IEEE Industrial Electronics Society. IECON 2000. 2000 IEEE International Conference on Industrial Electronics, Control and Instrumentation. 21st Century Technologies.

[25]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[26]  David E. Culler,et al.  A transmission control scheme for media access in sensor networks , 2001, MobiCom '01.

[27]  Baruch Awerbuch,et al.  An on-demand secure routing protocol resilient to byzantine failures , 2002, WiSE '02.

[28]  Aleksander Malinowski,et al.  WISENET - TinyOS based wireless network of sensors , 2003, IECON'03. 29th Annual Conference of the IEEE Industrial Electronics Society (IEEE Cat. No.03CH37468).

[29]  Mark D. Yarvis,et al.  Design and deployment of industrial sensor networks: experiences from a semiconductor plant and the north sea , 2005, SenSys '05.

[30]  Deborah Estrin,et al.  Directed diffusion for wireless sensor networking , 2003, TNET.