SMART: Secure Multi-pAths Routing for wireless sensor neTworks
Abstract
In this paper, we propose a novel secure routing protocol named Secure Multi-pAths Routing for wireless sensor neTworks (SMART) as well as its underlying key management scheme named Extended Two-hop Keys Establishment (ETKE). The proposed framework keeps consistent routing topology by protecting the hop count information from being forged. It also ensures a fast detection of inconsistent routing information without referring to the sink node. We analyze the security of the proposed scheme as well as its resilience probability against the forged hop count attack. We have demonstrated through simulations that SMART outperforms a comparative solution in literature, i.e., SeRINS, in terms of energy consumption.
Preview
Unable to display preview. Download preview PDF.
References
- 1.Akyildiz, I., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Computer Networks 38(4), 393–422 (2002)CrossRefGoogle Scholar
- 2.Lee, S., Choi, Y.: A secure alternate path routing in sensor networks. Computer Communications 30(1), 153–165 (2006)CrossRefGoogle Scholar
- 3.Challal, Y., Ouadjaout, A., Lasla, N., Bagaa, M., Hadjidj, A.: Secure and efficient disjoint multipath construction for fault tolerant routing in wireless sensor networks. Journal of Network and Computer Applications 34(4), 1380–1397 (2011)CrossRefGoogle Scholar
- 4.Ghosal, A., Halder, S.: Intrusion detection in wireless sensor networks: Issues, challenges and approaches. In: Wireless Networks and Security. Signals and Communication Technology, pp. 329–367 (2013)Google Scholar
- 5.Dimitriou, T.D.: Securing communication trees in sensor networks. In: Nikoletseas, S.E., Rolim, J.D.P. (eds.) ALGOSENSORS 2006. LNCS, vol. 4240, pp. 47–58. Springer, Heidelberg (2006)CrossRefGoogle Scholar
- 6.Stavrou, E., Pitsillides, A.: A survey on secure multipath routing protocols in wsns. Computer Networks 54(13), 2215–2238 (2010)CrossRefMATHGoogle Scholar
- 7.Bagaa, M., Challal, Y., Ouadjaout, A., Lasla, N., Badache, N.: Efficient data aggregation with in-network integrity control for wsn. J. Parallel Distrib. Comput. 72(10), 1157–1170 (2012)CrossRefGoogle Scholar
- 8.Chen, C.Y., Chao, H.C.: A survey of key distribution in wireless sensor networks. In: Security and Communication Networks (2011)Google Scholar
- 9.Cheng, Y., Agrawal, D.P.: An improved key distribution mechanism for large-scale hierarchical wireless sensor networks. Ad Hoc Networks 5(1), 35–48 (2007)CrossRefGoogle Scholar
- 10.Deng, J., Hartung, C., Han, R., Mishra, S.: A practical study of transitory master key establishment for wireless sensor networks. In: Proc First IEEE Int’l Conf Security and Privacy for Emerging Areas in Comm. Networks, SecureComm 2005 (2005)Google Scholar
- 11.Hai, T.H., Nam Huh, E., Jo, M.: A lightweight intrusion detection framework for wireless sensor networks. Wireless Communications and Mobile Computing 10(4), 559–572 (2010)Google Scholar
- 12.Titzer, B., Lee, D.K., Palsberg, J.: Avrora: scalable sensor network simulation with precise timing. In: Proceedings of the 4th International Symposium on Information Processing in Sensor Networks (IPSN), pp. 477–482 (2005)Google Scholar