The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.03 - May/June (2011 vol.8)
pp: 450-465
Andrea Gabrielli , University of Rome "La Sapienza", Rome
Luigi V. Mancini , University of Rome "La Sapienza", Rome
Sanjeev Setia , George Mason University, Fairfax
Sushil Jajodia , George Mason University, Fairfax
ABSTRACT
We analyze the security vulnerabilities of PEAS, ASCENT, and CCP, three well-known topology maintenance protocols (TMPs) for sensor networks. These protocols aim to increase the lifetime of the sensor network by only maintaining a subset of nodes in an active or awake state. The design of these protocols assumes that the sensor nodes will be deployed in a trusted, nonadversarial environment, and does not take into account the impact of attacks launched by malicious insider or outsider nodes. We propose a metaprotocol (Meta-TMP) to represent the class of topology maintenance protocols. The Meta-TMP provides us with a better understanding of the characteristics and of how a specific TMP works, and it can be used to study the vulnerabilities of a specific TMP. We describe various types of malicious behavior and actions that can be carried out by an adversary to attack a wireless sensor network by exploiting the TMP being used in the network. We describe three attacks against these protocols that may be used to reduce the lifetime of the sensor network, or to degrade the functionality of the sensor application by reducing the network connectivity and the sensing coverage that can be achieved. Further, we describe countermeasures that can be taken to increase the robustness of the protocols and make them resilient to such attacks.
INDEX TERMS
Mobile applications, pervasive computing, wireless sensor networks, reliability, security and privacy protection.
CITATION
Andrea Gabrielli, Luigi V. Mancini, Sanjeev Setia, Sushil Jajodia, "Securing Topology Maintenance Protocols for Sensor Networks", IEEE Transactions on Dependable and Secure Computing, vol.8, no. 3, pp. 450-465, May/June 2011, doi:10.1109/TDSC.2009.46
REFERENCES
[1] A. Gabrielli, L.V. Mancini, S. Setia, and S. Jajodia, "Securing Topology Maintenance Protocols for Sensor Networks: Attacks and Countermeasures," Proc. First IEEE Int'l Conf. Security and Privacy for Emerging Areas in Comm. Networks (SecureComm '05), Sept. 2005.
[2] B. Chen, K. Jamieson, H. Balakrishnan, and R. Morris, "Span: An Energy-Efficient Coordination Algorithm for Topology Maintenance in Ad Hoc Wireless Networks," ACM Wireless Networks J., vol. 8, no. 5, pp. 481-494, Sept. 2002.
[3] A. Cerpa and D. Estrin, "ASCENT: Adaptive Self-Configuring Sensor Networks Topologies," IEEE Trans. Mobile Computing, vol. 3, no. 3, pp. 272-285, July/Aug. 2004.
[4] F. Ye, G. Zhong, S. Lu, and L. Zhang, "PEAS: A Robust Energy Conserving Protocol for Long-Lived Sensor Networks," Proc. 23rd IEEE Int'l Conf. Distributed Computing System (ICDCS '03), May 2003.
[5] X. Wang, G. Xing, Y. Zhang, C. Lu, R. Pless, and C. Gill, "Integrated Coverage and Connectivity Configuration in Wireless Sensor Networks," ACM Trans. Sensor Network, vol. 1, no. 1, pp. 36-72, Aug. 2005.
[6] C. Karlof and D. Wagner, "Secure Routing in Wireless Sensor Networks: Attacks and Countermeasure," Proc. First IEEE Int'l Workshop Sensor Network Protocols and Applications (SNPA '03), May 2003.
[7] Y. Xu, J. Heidemann, and D. Estrin, "Geography Informed Energy Conservation for Ad Hoc Routing," Proc. MobiCom '01, July 2001.
[8] Y. Xu, J. Heidemann, and D. Estrin, "Energy Conservation by Adaptive Clustering for Ad-Hoc Networks," Proc. MobiHoc '02, June 2002.
[9] Y. Xu, J. Heidemann, and D. Estrin, "Adaptive Energy-Conserving Routing for Multihop Ad Hoc Networks," Research Report 527, USC/Information Sciences Inst., Oct. 2000.
[10] F. Stajano and R. Anderson, The Resurrecting Duckling: Security Issues for Ad-Hoc Wireless Networks. Springer-Verlag, Apr. 1999.
[11] D. Kejun, Z. Xingshe, Z. Xingguo, and L. Zhigang, "HETCP: A Hierachical Energy Efficient Topology Control Protocol for Wireless Sensor Networks," Proc. Second Int'l Conf. Wireless Comm., Networking and Mobile Computing (WiCOM '06), Sept. 2006.
[12] I. Khalil, S. Bagchi, and N.B. Shroff, "SLAM: Sleep-Wake Aware Local Monitoring in Sensor Networks," Proc. 37th IEEE Int'l Conf. Dependable Systems and Networks (DSN '07), June 2007.
[13] E. Bulut and I. Korpeoglu, "DSSP: A Dynamic Sleep Scheduling Protocol for Prolonging the Lifetime of Wireless Sensor Networks," Proc. 21st Int'l IEEE Conf. Advanced Information Networking and Applications Workshops (AINAW '07), 2007.
[14] S. Hong, Y.-J. Choi, and S.-J. Kim, "An Energy Efficient Topology Control Protocol in Wireless Sensor Networks," Proc. Ninth Int'l Conf. Advanced Comm. Technology (ICACT '07), Feb. 2007.
[15] R. Mochaourab and W. Dargie, "A Fair and Energy-Efficient Topology Control Protocol for Wireless Sensor Networks," Proc. Second ACM Int'l Conf. Context-Awareness for Self-Managing Systems, May 2008.
[16] Y. Wang, F. Li, and T.A. Dahlberg, "Energy-Efficient Topology Control for Three-Dimensional Sensor Networks," Int'l J. Sensor Networks, vol. 4, nos. 1/2, pp. 68-78, 2008.
[17] K.A. Arisha, M.A. Youssef, and M.F. Younis, "Energy-Aware TDMA-Based MAC for Sensor Networks," Proc. IEEE Workshop Integrated Management of Power Aware Comm., Computing and Networking, May 2002.
[18] Time Synchronized Mesh Protocol (TSMP), http://www. dustnetworks.com/technologytsmp.shtml , 2010.
[19] T. van Dam and K. Langendoen, "An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Networks," Proc. First Int'l Conf. Embedded Networked Sensor Systems (Sensyn '03), Nov. 2003.
[20] I. Rhee, A. Warrier, M. Aia, and J. Min, "Z-MAC: A Hybrid MAC for Wireless Sensor Networks," Proc. Third Int'l Conf. Embedded Networked Sensor Systems (Sensyn '05), Nov. 2005.
[21] P. Santi, "Topology Control in Wireless Ad Hoc and Sensor Networks," ACM Computing Surveys, vol. 37, no. 2, pp. 164-194, June 2005.
[22] G. Anastasi, M. Conti, M.D. Francesco, and A. Passarella, "How to Prolong the Lifetime of Wireless Sensor Networks," Mobile Ad Hoc and Pervasive Communications, M. Denko and L. Yang, eds., Chapter 6, Am. Scientific Publishers, 2006.
[23] MICA Sensor Node, http:/www.xbow.com, 2010.
[24] Y.W. Law, L. van Hoesel, J. Doumen, P. Hartel, and P. Havinga, "Energy-Efficient Link-Layer Jamming Attacks against Wireless Sensor Network MAC Protocols," Proc. Third ACM Workshop Security of Ad Hoc and Sensor Networks (SASN '05), Nov. 2005.
[25] W. Xu, K. Ma, W. Trappe, and Y. Zhang, "Jamming Sensor Networks: Attack and Defense Strategies," IEEE Networks Special Issue on Sensor Networks, vol. 20, no. 3, pp. 41-47, May/June 2006.
[26] J. Newsome, E. Shi, D. Song, and A. Perrig, "The Sybil Attack in Sensor Networks: Analysis & Defenses," Proc. Third IEEE/ACM Int'l Symp. Information Processing in Sensor Networks (IPSN '04), Apr. 2004.
[27] L. Lazos, R. Poovendran, and S. Capkun, "ROPE: Robust Position Estimation in Wireless Sensor Networks," Proc. Fourth IEEE/ACM Int'l Symp. Information Processing in Sensor Networks (IPSN '05), Apr. 2005.
[28] Y. Zhang, W. Lee, and Y.-A. Huang, "Intrusion Detection Techniques for Mobile Wireless Networks," ACM Wireless Networks, vol. 9, no. 5, pp. 545-556, Sept. 2003.
[29] S. Zhong, J. Chen, J. Yang, and R. Yang, "Sprite: A Simple, Cheat-Proof, Credit-Based System for Mobile Ad-Hoc Networks," Proc. IEEE INFOCOM '03, Apr. 2003.
[30] S. Zhu, S. Setia, S. Jajodia, and P. Ning, "An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks," Proc. IEEE Symp. Security and Privacy (S&P '04), May 2004.
[31] B. Parno, A. Perrig, and V. Gligor, "Distributed Detection of Node Replication Attacks in Sensor Networks," Proc. IEEE Symp. Security and Privacy (S&P '05), May 2005.
[32] A. Perrig, R. Szewczyk, V. Wen, D. Culler, and D. Tygar, "Spins: Security Protocols for Sensor Networks," Proc. MobiCom '01, July 2001.
[33] S. Zhu, S. Setia, and S. Jajodia, "LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks," Proc. 10th ACM Int'l Conf. Computer and Comm. Security (CCS '03), citeseer.ist.psu.eduzhu03leap.html, Oct. 2003.
[34] R. Di Pietro, L.V. Mancini, and A. Mei, "Energy Efficient Node-to-Node Authentication and Communication Confidentiality in Wireless Sensor Networks," ACM Wireless Networks J., vol. 12, no. 6, pp. 709-721, Dec. 2006.
[35] L. Lamport, "Password Authentication with Insecure Communication Communication," Comm. ACM, vol. 24, no. 11, pp. 770-772, Nov. 1981.
[36] C. Karlof, N. Sastry, and D. Wagner, "TinySec: A Link Layer Security Architecture for Wireless Sensor Networks," Proc. Second ACM Conf. Embedded Networked Sensor Systems (SenSys '04), Nov. 2004.
[37] Parsec Language, Parallel Computing Laboratory, Computer Science Department, UCLA, http://pcl.cs.ucla.edu/projects parsec/, 2010.
[38] F. Ye, G. Zhong, S. Lu, and L. Zhang, "A Robust Data Delivery Protocol for Large Scale Sensor Networks," Proc. Second Int'l Workshop Information Processing in Sensor Networks (IPSN '03), Apr. 2003.
47 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool