The Community for Technology Leaders
RSS Icon
Issue No.02 - March/April (2012 vol.9)
pp: 184-197
Weisong Shi , Wayne State University, Detroit
Guoxing Zhan , Wayne State University, Detroit
The multihop routing in wireless sensor networks (WSNs) offers little protection against identity deception through replaying routing information. An adversary can exploit this defect to launch various harmful or even devastating attacks against the routing protocols, including sinkhole attacks, wormhole attacks, and Sybil attacks. The situation is further aggravated by mobile and harsh network conditions. Traditional cryptographic techniques or efforts at developing trust-aware routing protocols do not effectively address this severe problem. To secure the WSNs against adversaries misdirecting the multihop routing, we have designed and implemented TARF, a robust trust-aware routing framework for dynamic WSNs. Without tight time synchronization or known geographic information, TARF provides trustworthy and energy-efficient route. Most importantly, TARF proves effective against those harmful attacks developed out of identity deception; the resilience of TARF is verified through extensive evaluation with both simulation and empirical experiments on large-scale WSNs under various scenarios including mobile and RF-shielding network conditions. Further, we have implemented a low-overhead TARF module in TinyOS; as demonstrated, this implementation can be incorporated into existing routing protocols with the least effort. Based on TARF, we also demonstrated a proof-of-concept mobile target detection application that functions well against an antidetection mechanism.
Wireless sensor networks, routing protocols, security.
Weisong Shi, Guoxing Zhan, "Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs", IEEE Transactions on Dependable and Secure Computing, vol.9, no. 2, pp. 184-197, March/April 2012, doi:10.1109/TDSC.2011.58
[1] G. Zhan, W. Shi, and J. Deng, “Tarf: A Trust-Aware Routing Framework for Wireless Sensor Networks,” Proc. Seventh European Conf. Wireless Sensor Networks (EWSN '10), 2010.
[2] F. Zhao and L. Guibas, Wireless Sensor Networks: An Information Processing Approach. Morgan Kaufmann, 2004.
[3] A. Wood and J. Stankovic, “Denial of Service in Sensor Networks,” Computer, vol. 35, no. 10, pp. 54-62, Oct. 2002.
[4] C. Karlof and D. Wagner, “Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures,” Proc. First IEEE Int'l Workshop Sensor Network Protocols and Applications, 2003.
[5] M. Jain and H. Kandwal, “A Survey on Complex Wormhole Attack in Wireless Ad Hoc Networks,” Proc. Int'l Conf. Advances in Computing, Control, and Telecomm. Technologies (ACT '09), pp. 555-558, 2009.
[6] I. Krontiris, T. Giannetsos, and T. Dimitriou, “Launching a Sinkhole Attack in Wireless Sensor Networks; The Intruder Side,” Proc. IEEE Int'l Conf. Wireless and Mobile Computing, Networking and Comm. (WIMOB '08), pp. 526-531, 2008.
[7] J. Newsome, E. Shi, D. Song, and A. Perrig, “The Sybil Attack in Sensor Networks: Analysis and Defenses,” Proc. Third Int'l Conf. Information Processing in Sensor Networks (IPSN '04), Apr. 2004.
[8] L. Bai, F. Ferrese, K. Ploskina, and S. Biswas, “Performance Analysis of Mobile Agent-Based Wireless Sensor Network,” Proc. Eighth Int'l Conf. Reliability, Maintainability and Safety (ICRMS '09), pp. 16-19, 2009.
[9] L. Zhang, Q. Wang, and X. Shu, “A Mobile-Agent-Based Middleware for Wireless Sensor Networks Data Fusion,” Proc. Instrumentation and Measurement Technology Conf. (I2MTC '09), pp. 378-383, 2009.
[10] W. Xue, J. Aiguo, and W. Sheng, “Mobile Agent Based Moving Target Methods in Wireless Sensor Networks,” Proc. IEEE Int'l Symp. Comm. and Information Technology (ISCIT '05), vol. 1, pp. 22-26, 2005.
[11] J. Hee-Jin, N. Choon-Sung, J. Yi-Seok, and S. Dong-Ryeol, “A Mobile Agent Based Leach in Wireless Sensor Networks,” Proc. 10th Int'l Conf. Advanced Comm. Technology (ICACT '08), vol. 1, pp. 75-78, 2008.
[12] J. Al-Karaki and A. Kamal, “Routing Techniques in Wireless Sensor Networks: A Survey,” Wireless Comm., vol. 11, no. 6, pp. 6-28, Dec. 2004.
[13] C. Karlof, N. Sastry, and D. Wagner, “Tinysec: A Link Layer Security Architecture for Wireless Sensor Networks,” Proc. ACM Int'l Conf. Embedded Networked Sensor Systems (SenSys '04), Nov. 2004.
[14] A. Perrig, R. Szewczyk, W. Wen, D. Culler, and J. Tygar, “SPINS: Security Protocols for Sensor Networks,” Wireless Networks J., vol. 8, no. 5, pp. 521-534, Sept. 2002.
[15] R. Watro, D. Kong, S. Cuti, C. Gardiner, C. Lynn, and P. Kruus, “Tinypk: Securing Sensor Networks with Public Key Technology,” Proc. Second ACM Workshop Security of Ad Hoc and Sensor Networks (SASN '04), pp. 59-64, 2004.
[16] A. Liu and P. Ning, “Tinyecc: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks,” Proc. Seventh Int'l Conf. Information Processing in Sensor Networks (IPSN '08), pp. 245-256, 2008.
[17] I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “A Survey on Sensor Networks,” IEEE Comm. Magazine, vol. 40, no. 8, pp. 102-114, Aug. 2002.
[18] H. Safa, H. Artail, and D. Tabet, “A Cluster-Based Trust-Aware Routing Protocol for Mobile Ad Hoc Networks,” Wireless Networks, vol. 16, no. 4, pp. 969-984, 2010.
[19] W. Gong, Z. You, D. Chen, X. Zhao, M. Gu, and K. Lam, “Trust Based Routing for Misbehavior Detection in Ad Hoc Networks,” J. Networks, vol. 5, no. 5, pp. 551-558, May 2010.
[20] Z. Yan, P. Zhang, and T. Virtanen, “Trust Evaluation Based Security Solution in Ad Hoc Networks,” Proc. Seventh Nordic Workshop Secure IT Systems, 2003.
[21] J.L.X. Li and M.R. Lyu, “Taodv: A Trusted Aodv Routing Protocol for Mobile Ad Hoc Networks,” Proc. Aerospace Conf., 2004.
[22] T. Zahariadis, H. Leligou, P. Karkazis, P. Trakadas, I. Papaefstathiou, C. Vangelatos, and L. Besson, “Design and Implementation of a Trust-Aware Routing Protocol for Large WSNs,” Int'l J. Network Security and Its Applications, vol. 2, no. 3, pp. 52-68, July 2010.
[23] A. Rezgui and M. Eltoweissy, “Tarp: A Trust-Aware Routing Protocol for Sensor-Actuator Networks,” Proc. IEEE Int'l Conf. Mobile Adhoc and Sensor Systems (MASS '07), 2007.
[24] A. Abbasi and M. Younis, “A Survey on Clustering Algorithms for Wireless Sensor Networks,” Computer Comm., vol. 30, pp. 2826-2841, Oct. 2007.
[25] S. Chang, S. Shieh, W. Lin, and C. Hsieh, “An Efficient Broadcast Authentication Scheme in Wireless Sensor Networks,” Proc. ACM Symp. Information, Computer and Comm. Security (ASIACCS '06), pp. 311-320, 2006.
[26] K. Ren, W. Lou, K. Zeng, and P. Moran, “On Broadcast Authentication in Wireless Sensor Networks,” IEEE Trans. Wireless Comm., vol. 6, no. 11, pp. 4136-4144, Nov. 2007.
[27] P. De, Y. Liu, and S.K. Das, “Modeling Node Compromise Spread in Wireless Sensor Networks Using Epidemic Theory,” Proc. Int'l Symp. World of Wireless, Mobile and Multimedia Networks (WoWMoM '06), pp. 237-243, 2006.
[28] A. Woo, T. Tong, and D. Culler, “Taming the Underlying Challenges of Reliable Multihop Routing in Sensor Networks,” Proc. First ACM Int'l Conf. Embedded Networked Sensor Systems (SenSys '03), Nov. 2003.
[29] S. Ganeriwal, L. Balzano, and M. Srivastava, “Reputation-Based Framework for High Integrity Sensor Networks,” ACM Trans. Sensor Networks, vol. 4, pp. 1-37 2008.
[30] G. Zhan, W. Shi, and J. Deng, “Poster Abstract: Sensortrust—A Resilient Trust Model for WSNs,” Proc. Seventh Int'l Conf. Embedded Networked Sensor Systems (SenSys '09), 2009.
[31] C. Perkins and P. Bhagwat, “Highly Dynamic Destination-Sequenced Distance-Vector Routing (dsdv) for Mobile Computers,” ACM SIGCOMM Computer Comm. Rev., vol. 24, no. 4, pp. 234-244, 1994.
[32] O. Gnawali, R. Fonseca, K. Jamieson, D. Moss, and P. Levis, “Collection Tree Protocol,” Proc. Seventh ACM Conf. Embedded Networked Sensor Systems (SenSys '09), pp. 1-14, 2009.
[33] G. Zhan, W. Shi, and J. Deng, “Design, Implementation and Evaluation of Tarf: A Trust-Aware Routing Framework for Dynamic WSNs,” Technical Report MIST-TR-2010-003, Wayne State Univ., , Oct. 2010.
[34] Q. Zheng, X. Hong, and S. Ray, “Recent Advances in Mobility Modeling for Mobile Ad Hoc Network Research,” Proc. 42nd Ann. Southeast Regional Conf. (ACM-SE 42), pp. 70-75, 2004.
[35] X. Hong, M. Gerla, G. Pei, and C. Chiang, “A Group Mobility Model for Ad Hoc Wireless Networks,” Proc. Second ACM Int'l Workshop Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM '99), pp. 53-60, 1999.
[36] “Motelab,” http:/, 2005.
[37] Z. Cao, J. Hu, Z. Chen, M. Xu, and X. Zhou, “FBSR: Feedback-Based Secure Routing Protocol for Wireless Sensor Networks,” Int'l J. Pervasive Computing and Comm., vol. 4, pp. 61-76, 2008.
[38] T. Ghosh, N. Pissinou, and K. Makki, “Collaborative Trust-Based Secure Routing against Colluding Malicious Nodes in Multi-Hop Ad Hoc Networks,” Proc. 29th Ann. IEEE Int'l Conf. Local Computer Networks, pp. 224-231, Nov. 2004.
86 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool