Vulnerabilities and Improvements of Du-Xiao-Chen-Wu's Secure Cell Relay Routing Protocol for Sensor Networks

In 2006, Du, Xiao, Chen, and Wu proposed a routing protocol for sensor networks using cell relay. They claimed their protocol was secure since they used pairwise key establishment. However, an adversary can implement attacks without keys or with only one newly deployed compromised node. Therefore, in this paper, we point out the vulnerabilities of this protocol and propose an improved protocol.

[1]  R. W. Lau,et al.  The dielectric properties of biological tissues: II. Measurements in the frequency range 10 Hz to 20 GHz. , 1996, Physics in medicine and biology.

[2]  M. Persson,et al.  Antenna array design for brain monitoring , 2008, 2008 IEEE Antennas and Propagation Society International Symposium.

[3]  Chase Qishi Wu,et al.  Secure cell relay routing protocol for sensor networks , 2005, PCCC 2005. 24th IEEE International Performance, Computing, and Communications Conference, 2005..

[4]  Mukesh Singhal,et al.  Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..

[5]  Andreas Fhager,et al.  Reconstruction Quality and Spectral Content of an Electromagnetic Time-Domain Inversion Algorithm , 2006, IEEE Transactions on Biomedical Engineering.

[6]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, TSEC.

[7]  Stefan Fischer,et al.  A Security Architecture for Mobile Wireless Sensor Networks , 2004, ESAS.

[8]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, ACM Trans. Inf. Syst. Secur..

[9]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[10]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[11]  Mikael Persson,et al.  Classification of microwave scattering data based on a subspace distance with application to detection of bleeding stroke , 2009, 2009 3rd IEEE International Workshop on Computational Advances in Multi-Sensor Adaptive Processing (CAMSAP).

[12]  Adrian Perrig,et al.  Security and Privacy in Sensor Networks , 2003, Computer.