SMART: Secure Multi-pAths Routing for wireless sensor neTworks

  • Noureddine Lasla
  • Abdelouahid Derhab
  • Abdelraouf Ouadjaout
  • Miloud Bagaa
  • Yacine Challal
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8487)

Abstract

In this paper, we propose a novel secure routing protocol named Secure Multi-pAths Routing for wireless sensor neTworks (SMART) as well as its underlying key management scheme named Extended Two-hop Keys Establishment (ETKE). The proposed framework keeps consistent routing topology by protecting the hop count information from being forged. It also ensures a fast detection of inconsistent routing information without referring to the sink node. We analyze the security of the proposed scheme as well as its resilience probability against the forged hop count attack. We have demonstrated through simulations that SMART outperforms a comparative solution in literature, i.e., SeRINS, in terms of energy consumption.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Akyildiz, I., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Computer Networks 38(4), 393–422 (2002)CrossRefGoogle Scholar
  2. 2.
    Lee, S., Choi, Y.: A secure alternate path routing in sensor networks. Computer Communications 30(1), 153–165 (2006)CrossRefGoogle Scholar
  3. 3.
    Challal, Y., Ouadjaout, A., Lasla, N., Bagaa, M., Hadjidj, A.: Secure and efficient disjoint multipath construction for fault tolerant routing in wireless sensor networks. Journal of Network and Computer Applications 34(4), 1380–1397 (2011)CrossRefGoogle Scholar
  4. 4.
    Ghosal, A., Halder, S.: Intrusion detection in wireless sensor networks: Issues, challenges and approaches. In: Wireless Networks and Security. Signals and Communication Technology, pp. 329–367 (2013)Google Scholar
  5. 5.
    Dimitriou, T.D.: Securing communication trees in sensor networks. In: Nikoletseas, S.E., Rolim, J.D.P. (eds.) ALGOSENSORS 2006. LNCS, vol. 4240, pp. 47–58. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  6. 6.
    Stavrou, E., Pitsillides, A.: A survey on secure multipath routing protocols in wsns. Computer Networks 54(13), 2215–2238 (2010)CrossRefMATHGoogle Scholar
  7. 7.
    Bagaa, M., Challal, Y., Ouadjaout, A., Lasla, N., Badache, N.: Efficient data aggregation with in-network integrity control for wsn. J. Parallel Distrib. Comput. 72(10), 1157–1170 (2012)CrossRefGoogle Scholar
  8. 8.
    Chen, C.Y., Chao, H.C.: A survey of key distribution in wireless sensor networks. In: Security and Communication Networks (2011)Google Scholar
  9. 9.
    Cheng, Y., Agrawal, D.P.: An improved key distribution mechanism for large-scale hierarchical wireless sensor networks. Ad Hoc Networks 5(1), 35–48 (2007)CrossRefGoogle Scholar
  10. 10.
    Deng, J., Hartung, C., Han, R., Mishra, S.: A practical study of transitory master key establishment for wireless sensor networks. In: Proc First IEEE Int’l Conf Security and Privacy for Emerging Areas in Comm. Networks, SecureComm 2005 (2005)Google Scholar
  11. 11.
    Hai, T.H., Nam Huh, E., Jo, M.: A lightweight intrusion detection framework for wireless sensor networks. Wireless Communications and Mobile Computing 10(4), 559–572 (2010)Google Scholar
  12. 12.
    Titzer, B., Lee, D.K., Palsberg, J.: Avrora: scalable sensor network simulation with precise timing. In: Proceedings of the 4th International Symposium on Information Processing in Sensor Networks (IPSN), pp. 477–482 (2005)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Noureddine Lasla
    • 1
  • Abdelouahid Derhab
    • 2
  • Abdelraouf Ouadjaout
    • 1
  • Miloud Bagaa
    • 1
  • Yacine Challal
    • 3
  1. 1.Department of Theories and Computer EngineeringCERISTAlgiersAlgeria
  2. 2.Center of Excellence in Information Assurance (CoEIA)King Saud UniversityRiyadhSaudi Arabia
  3. 3.Laboratoire de Méthodes de Conception des Systèmes (LMCS)Ecole nationale Supérieure d’InformatiqueAlgiersAlgeria

Personalised recommendations