Authenticated Directed Diffusion

  • Eric K. Wang
  • Lucas C. K. Hui
  • S. M. Yiu
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5339)

Abstract

Directed Diffusion(DD) is a method of data dissemination especially suitable in distributed sensing scenarios. It has been known well in the application of wireless sensor network routing. Although it is very popular as a data-centric routing protocol for wireless sensor network(WSN), it faces several types of serious attacks. We proposes a new protocol (”Authenticated Directed Diffusion” (ADD)) which extends the directed diffusion protocol. According to the resource constraint of WSN, we adopt a real time one-way key chain and authenticated blacklist diffusion to achieve the authenticity and integrity in the routing process for directed diffusion with relative low overhead. Authenticated Directed Diffusion mainly tackle three problems(DoS attack,sinkhole attack and bogus routing attack) which Directed Diffusion can not handle. The simulation result shows that the performance of Authenticated Directed Diffusion is acceptable.

Keywords

Directed Diffusion Authentication Wireless Sensor Networks 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.D.: SPINS: Security Protocols for Sensor Networks. Mobile Computing and Networking Rome, Italy (2001)Google Scholar
  2. 2.
    Hu, Y.-C., Perrig, A., Johnson, D.B.: Packet leashes: a defense against wormhole attacks in wireless networks. In: IEEE Infocom (2003)Google Scholar
  3. 3.
    Wang, X., Yang, L., Chen, K.: SDD: Secure Directed Diffusion Protocol for Sensor Networks. In: Castelluccia, C., Hartenstein, H., Paar, C., Westhoff, D. (eds.) ESAS 2004. LNCS, vol. 3313, pp. 205–214. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  4. 4.
    Intanagonwiwat, C., Govindan, R., Estrin, D., Heidemann, J., Silva, F.: Directed Diffusion for Wireless Sensor Networking. ACM/IEEE Transactions on Networking 11(1), 2–16 (2002)CrossRefGoogle Scholar
  5. 5.
    Lamport, L.: Constructing digital signatures from one-way function. Technical report SRI-CSL-98, SRI International (October 1979)Google Scholar
  6. 6.
    Deng, J., Han, R., Mishra, S.: The performance evaluation of intrusion-tolerant routing in wireless sensor networks. In: Zhao, F., Guibas, L.J. (eds.) IPSN 2003. LNCS, vol. 2634. Springer, Heidelberg (2003)Google Scholar
  7. 7.
    Karlof, C., Wagner, D.: Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures, Sensor Network Protocols and Applications (SNPA 2003) (May 2003)Google Scholar
  8. 8.
    Wood, A., Stankovic, J.: Denial of service in sensor networks. IEEE Computer 35(10), 54–62 (2002)CrossRefGoogle Scholar
  9. 9.
    Di Pietro, R., Mancini, L.V., Law, Y.W., Etalle, S., Havinga, P.: LKHW: a directed diffusion-based secure multicast scheme for wireless sensor networks. In: Parallel Processing Workshops, 2003. Proceedings 2003 International Conference, October 6-9, 2003, pp. 397–406 (2003)Google Scholar
  10. 10.
    Dousse, O., Tavoularis, C., Thiran, P.: Delay of Intrusion Detection in Wireless Sensor Networks. In: MobiHoc 2006, Florence, Italy, May 22–25 (2006)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Eric K. Wang
    • 1
  • Lucas C. K. Hui
    • 1
  • S. M. Yiu
    • 1
  1. 1.The University of Hong Kong, PokfulamHong Kong

Personalised recommendations