OPSENET: A Security-Enabled Routing Scheme for a System of Optical Sensor Networks

In this paper we introduce OPSENET, a novel and efficient protocol that facilitates secure routing in directional optical sensor networks. We show that even though the uni- directionality of links in an optical sensor network (OSN) complicates the design of efficient routing, link directionality actually helps security in our network setup. In particular, we leverage the naturally-occurring clustering that results from passive (bi-directional) communication of select cluster head nodes with the base station, to improve overall network performance. This paper presents two main contributions: (1) We introduce OPSENET, a novel secure cluster-based routing algorithm for base station circuit discovery in OSNs. In order to support the efficient utilization of a nodes' resources, we employ symmetric cryptography in the design of OPSENET, using efficient oneway hash functions and pre-deployed keying. OPSENET achieves base station broadcast authentication, per-hop authentication, and cluster group secrecy, without requiring any time synchronization. (2) We analyze the relevance of traditional routing attacks on OSNs, and show that OPSENET is robust against uncoordinated (non-smart) insider routing attacks, amongst other compromises. An important performance metric of OPSENET is its low byte overhead, and graceful degradation with the number of compromised nodes in the network. To the best of our knowledge, this is the first paper to consider secure routing in an OSN network scenario.

[1]  Pradeep K. Khosla,et al.  SWATT: softWare-based attestation for embedded devices , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[2]  Elaine Shi,et al.  Designing secure sensor networks , 2004, IEEE Wireless Communications.

[3]  Adrian Perrig,et al.  Security and Privacy in Sensor Networks , 2003, Computer.

[4]  Tomoaki Ohtsuki,et al.  Optical Wireless Sensor Network System Using Corner Cube Retroreflectors , 2005, EURASIP J. Wirel. Commun. Netw..

[5]  Jordi Petit Silvestre,et al.  A Random graph model for optical networks of sensors , 2002 .

[6]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[7]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[8]  Wade Trappe,et al.  An authentication framework for hierarchical ad hoc sensor networks , 2003, WiSe '03.

[9]  Jaime Llorca,et al.  Reconfigurable optical wireless sensor networks , 2004, SPIE Remote Sensing.

[10]  Ross J. Anderson,et al.  Key infection: smart trust for smart dust , 2004, Proceedings of the 12th IEEE International Conference on Network Protocols, 2004. ICNP 2004..

[11]  Sushil Jajodia,et al.  LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.

[12]  José D. P. Rolim,et al.  Efficient and reliable high level communication in randomly deployed wireless sensor networks , 2004, MobiWac '04.

[13]  Levente Buttyán,et al.  Report on a working session on security in wireless ad hoc networks , 2003, MOCO.

[14]  David Evans,et al.  Using Directional Antennas to Prevent Wormhole Attacks , 2004, NDSS.

[15]  Deepa Kundur,et al.  Efficient routing protocols for a free space optical sensor network , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..

[16]  Robert Szewczyk,et al.  System architecture directions for networked sensors , 2000, ASPLOS IX.

[17]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[18]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[19]  Elaine Shi,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[20]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[21]  D. Kundur,et al.  Distributed privacy for visual sensor networks via Markov shares , 2006, Second IEEE Workshop on Dependability and Security in Sensor Networks and Systems.

[22]  A. Perrig,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[23]  Randy H. Katz,et al.  Next century challenges: mobile networking for “Smart Dust” , 1999, MobiCom.

[24]  John D. Gonglewski,et al.  Optics in Atmospheric Propagation and Adaptive Systems X , 2004 .

[25]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[26]  JAMAL N. AL-KARAKI,et al.  Routing techniques in wireless sensor networks: a survey , 2004, IEEE Wireless Communications.

[27]  Wendi Heinzelman,et al.  Energy-efficient communication protocol for wireless microsensor networks , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[28]  Elaine Shi,et al.  Detection of denial-of-message attacks on sensor network broadcasts , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).