Secure data collection in wireless sensor networks using randomized dispersive routes

Tao Shu, Marwan M Krunz, Sisi Liu

Research output: Contribution to journalArticle

79 Citations (Scopus)

Abstract

Compromised node and denial of service are two key attacks in wireless sensor networks (WSNs). In this paper, we study data delivery mechanisms that can with high probability circumvent black holes formed by these attacks. We argue that classic multipath routing approaches are vulnerable to such attacks, mainly due to their deterministic nature. So once the adversary acquires the routing algorithm, it can compute the same routes known to the source, hence, making all information sent over these routes vulnerable to its attacks. In this paper, we develop mechanisms that generate randomized multipath routes. Under our designs, the routes taken by the shares of different packets change over time. So even if the routing algorithm becomes known to the adversary, the adversary still cannot pinpoint the routes traversed by each packet. Besides randomness, the generated routes are also highly dispersive and energy efficient, making them quite capable of circumventing black holes. We analytically investigate the security and energy performance of the proposed schemes. We also formulate an optimization problem to minimize the end-to-end energy consumption under given security constraints. Extensive simulations are conducted to verify the validity of our mechanisms.

Original languageEnglish (US)
Article number5432179
Pages (from-to)941-954
Number of pages14
JournalIEEE Transactions on Mobile Computing
Volume9
Issue number7
DOIs
StatePublished - Jul 2010

Fingerprint

Routing algorithms
Wireless sensor networks
Energy utilization

Keywords

  • Randomized multipath routing
  • Secure data delivery
  • Wireless sensor network

ASJC Scopus subject areas

  • Electrical and Electronic Engineering
  • Computer Networks and Communications
  • Software

Cite this

Secure data collection in wireless sensor networks using randomized dispersive routes. / Shu, Tao; Krunz, Marwan M; Liu, Sisi.

In: IEEE Transactions on Mobile Computing, Vol. 9, No. 7, 5432179, 07.2010, p. 941-954.

Research output: Contribution to journalArticle

@article{a7b2667804714c6b83045acbebe87d0a,
title = "Secure data collection in wireless sensor networks using randomized dispersive routes",
abstract = "Compromised node and denial of service are two key attacks in wireless sensor networks (WSNs). In this paper, we study data delivery mechanisms that can with high probability circumvent black holes formed by these attacks. We argue that classic multipath routing approaches are vulnerable to such attacks, mainly due to their deterministic nature. So once the adversary acquires the routing algorithm, it can compute the same routes known to the source, hence, making all information sent over these routes vulnerable to its attacks. In this paper, we develop mechanisms that generate randomized multipath routes. Under our designs, the routes taken by the shares of different packets change over time. So even if the routing algorithm becomes known to the adversary, the adversary still cannot pinpoint the routes traversed by each packet. Besides randomness, the generated routes are also highly dispersive and energy efficient, making them quite capable of circumventing black holes. We analytically investigate the security and energy performance of the proposed schemes. We also formulate an optimization problem to minimize the end-to-end energy consumption under given security constraints. Extensive simulations are conducted to verify the validity of our mechanisms.",
keywords = "Randomized multipath routing, Secure data delivery, Wireless sensor network",
author = "Tao Shu and Krunz, {Marwan M} and Sisi Liu",
year = "2010",
month = "7",
doi = "10.1109/TMC.2010.36",
language = "English (US)",
volume = "9",
pages = "941--954",
journal = "IEEE Transactions on Mobile Computing",
issn = "1536-1233",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
number = "7",

}

TY - JOUR

T1 - Secure data collection in wireless sensor networks using randomized dispersive routes

AU - Shu, Tao

AU - Krunz, Marwan M

AU - Liu, Sisi

PY - 2010/7

Y1 - 2010/7

N2 - Compromised node and denial of service are two key attacks in wireless sensor networks (WSNs). In this paper, we study data delivery mechanisms that can with high probability circumvent black holes formed by these attacks. We argue that classic multipath routing approaches are vulnerable to such attacks, mainly due to their deterministic nature. So once the adversary acquires the routing algorithm, it can compute the same routes known to the source, hence, making all information sent over these routes vulnerable to its attacks. In this paper, we develop mechanisms that generate randomized multipath routes. Under our designs, the routes taken by the shares of different packets change over time. So even if the routing algorithm becomes known to the adversary, the adversary still cannot pinpoint the routes traversed by each packet. Besides randomness, the generated routes are also highly dispersive and energy efficient, making them quite capable of circumventing black holes. We analytically investigate the security and energy performance of the proposed schemes. We also formulate an optimization problem to minimize the end-to-end energy consumption under given security constraints. Extensive simulations are conducted to verify the validity of our mechanisms.

AB - Compromised node and denial of service are two key attacks in wireless sensor networks (WSNs). In this paper, we study data delivery mechanisms that can with high probability circumvent black holes formed by these attacks. We argue that classic multipath routing approaches are vulnerable to such attacks, mainly due to their deterministic nature. So once the adversary acquires the routing algorithm, it can compute the same routes known to the source, hence, making all information sent over these routes vulnerable to its attacks. In this paper, we develop mechanisms that generate randomized multipath routes. Under our designs, the routes taken by the shares of different packets change over time. So even if the routing algorithm becomes known to the adversary, the adversary still cannot pinpoint the routes traversed by each packet. Besides randomness, the generated routes are also highly dispersive and energy efficient, making them quite capable of circumventing black holes. We analytically investigate the security and energy performance of the proposed schemes. We also formulate an optimization problem to minimize the end-to-end energy consumption under given security constraints. Extensive simulations are conducted to verify the validity of our mechanisms.

KW - Randomized multipath routing

KW - Secure data delivery

KW - Wireless sensor network

UR - http://www.scopus.com/inward/record.url?scp=77952986444&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=77952986444&partnerID=8YFLogxK

U2 - 10.1109/TMC.2010.36

DO - 10.1109/TMC.2010.36

M3 - Article

VL - 9

SP - 941

EP - 954

JO - IEEE Transactions on Mobile Computing

JF - IEEE Transactions on Mobile Computing

SN - 1536-1233

IS - 7

M1 - 5432179

ER -