Secure data collection in wireless sensor networks using randomized dispersive routes

Tao Shu, Sisi Liu, Marwan M Krunz

Research output: Chapter in Book/Report/Conference proceedingConference contribution

18 Citations (Scopus)

Abstract

Compromised-node and denial-of-service are two key attacks in wireless sensor networks (WSNs). In this paper, we study routing mechanisms that circumvent (bypass) black holes formed by these attacks. We argue that existing multi-path routing approaches are vulnerable to such attacks, mainly due to their deterministic nature. So once an adversary acquires the routing algorithm, it can compute the same routes known to the source, and hence endanger all information sent over these routes. In this paper, we develop mechanisms that generate randomized multi-path routes. Under our design, the routes taken by the "shares" of different packets change over time. So even if the routing algorithm becomes known to the adversary, the adversary still cannot pinpoint the routes traversed by each packet. Besides randomness, the routes generated by our mechanisms are also highly dispersive and energy-efficient, making them quite capable of bypassing black holes at low energy cost. Extensive simulations are conducted to verify the validity of our mechanisms.

Original languageEnglish (US)
Title of host publicationProceedings - IEEE INFOCOM
Pages2846-2850
Number of pages5
DOIs
StatePublished - 2009
Event28th Conference on Computer Communications, IEEE INFOCOM 2009 - Rio de Janeiro, Brazil
Duration: Apr 19 2009Apr 25 2009

Other

Other28th Conference on Computer Communications, IEEE INFOCOM 2009
CountryBrazil
CityRio de Janeiro
Period4/19/094/25/09

Fingerprint

Routing algorithms
Wireless sensor networks
Costs

ASJC Scopus subject areas

  • Computer Science(all)
  • Electrical and Electronic Engineering

Cite this

Secure data collection in wireless sensor networks using randomized dispersive routes. / Shu, Tao; Liu, Sisi; Krunz, Marwan M.

Proceedings - IEEE INFOCOM. 2009. p. 2846-2850 5062244.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Shu, T, Liu, S & Krunz, MM 2009, Secure data collection in wireless sensor networks using randomized dispersive routes. in Proceedings - IEEE INFOCOM., 5062244, pp. 2846-2850, 28th Conference on Computer Communications, IEEE INFOCOM 2009, Rio de Janeiro, Brazil, 4/19/09. https://doi.org/10.1109/INFCOM.2009.5062244
Shu, Tao ; Liu, Sisi ; Krunz, Marwan M. / Secure data collection in wireless sensor networks using randomized dispersive routes. Proceedings - IEEE INFOCOM. 2009. pp. 2846-2850
@inproceedings{645bece2a2794f95b25c9947d31fe9f0,
title = "Secure data collection in wireless sensor networks using randomized dispersive routes",
abstract = "Compromised-node and denial-of-service are two key attacks in wireless sensor networks (WSNs). In this paper, we study routing mechanisms that circumvent (bypass) black holes formed by these attacks. We argue that existing multi-path routing approaches are vulnerable to such attacks, mainly due to their deterministic nature. So once an adversary acquires the routing algorithm, it can compute the same routes known to the source, and hence endanger all information sent over these routes. In this paper, we develop mechanisms that generate randomized multi-path routes. Under our design, the routes taken by the {"}shares{"} of different packets change over time. So even if the routing algorithm becomes known to the adversary, the adversary still cannot pinpoint the routes traversed by each packet. Besides randomness, the routes generated by our mechanisms are also highly dispersive and energy-efficient, making them quite capable of bypassing black holes at low energy cost. Extensive simulations are conducted to verify the validity of our mechanisms.",
author = "Tao Shu and Sisi Liu and Krunz, {Marwan M}",
year = "2009",
doi = "10.1109/INFCOM.2009.5062244",
language = "English (US)",
isbn = "9781424435135",
pages = "2846--2850",
booktitle = "Proceedings - IEEE INFOCOM",

}

TY - GEN

T1 - Secure data collection in wireless sensor networks using randomized dispersive routes

AU - Shu, Tao

AU - Liu, Sisi

AU - Krunz, Marwan M

PY - 2009

Y1 - 2009

N2 - Compromised-node and denial-of-service are two key attacks in wireless sensor networks (WSNs). In this paper, we study routing mechanisms that circumvent (bypass) black holes formed by these attacks. We argue that existing multi-path routing approaches are vulnerable to such attacks, mainly due to their deterministic nature. So once an adversary acquires the routing algorithm, it can compute the same routes known to the source, and hence endanger all information sent over these routes. In this paper, we develop mechanisms that generate randomized multi-path routes. Under our design, the routes taken by the "shares" of different packets change over time. So even if the routing algorithm becomes known to the adversary, the adversary still cannot pinpoint the routes traversed by each packet. Besides randomness, the routes generated by our mechanisms are also highly dispersive and energy-efficient, making them quite capable of bypassing black holes at low energy cost. Extensive simulations are conducted to verify the validity of our mechanisms.

AB - Compromised-node and denial-of-service are two key attacks in wireless sensor networks (WSNs). In this paper, we study routing mechanisms that circumvent (bypass) black holes formed by these attacks. We argue that existing multi-path routing approaches are vulnerable to such attacks, mainly due to their deterministic nature. So once an adversary acquires the routing algorithm, it can compute the same routes known to the source, and hence endanger all information sent over these routes. In this paper, we develop mechanisms that generate randomized multi-path routes. Under our design, the routes taken by the "shares" of different packets change over time. So even if the routing algorithm becomes known to the adversary, the adversary still cannot pinpoint the routes traversed by each packet. Besides randomness, the routes generated by our mechanisms are also highly dispersive and energy-efficient, making them quite capable of bypassing black holes at low energy cost. Extensive simulations are conducted to verify the validity of our mechanisms.

UR - http://www.scopus.com/inward/record.url?scp=70349687646&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=70349687646&partnerID=8YFLogxK

U2 - 10.1109/INFCOM.2009.5062244

DO - 10.1109/INFCOM.2009.5062244

M3 - Conference contribution

AN - SCOPUS:70349687646

SN - 9781424435135

SP - 2846

EP - 2850

BT - Proceedings - IEEE INFOCOM

ER -