TY - GEN
T1 - Secure and energy aware routing against wormholes and sinkholes in wireless sensor networks invited paper
AU - Nahas, Huzaifa Al
AU - Deogun, Jitender S.
AU - Manley, Eric D.
PY - 2006
Y1 - 2006
N2 - Sensor networks are deployed in a variety of environments for unattended operation. In a hostile terrain, sensor nodes are vulnerable to node capture and cryptographic material compromise. Compromised nodes can be used to launch wormhole and sinkhole attacks in order to prevent sensitive data from reaching intended destinations. Our objective in this paper is to mitigate the impact of undetected compromised nodes on routing. To this end, we develop metrics to quantify risk of paths in a network. We then introduce a novel routing approach: Secure-Path Routing (SPR) that uses expected path risk as a parameter in routing. Quantified path risk values are used in routing to reduce traffic flow over nodes that have high expected vulnerability. Selecting low risk routes may lead to the choice of energy-expensive routes. Thus, we develop algorithms for balancing risk with other path selection parameters, including energy consumption. We conduct simulation experiments to evaluate the effectiveness of our approach and study the tradeoff between security and energy. Simulation shows that SPR can be quite effective at increasing traffic flow over legitimate routes and that the impact of SPR on network lifetime is negligible.
AB - Sensor networks are deployed in a variety of environments for unattended operation. In a hostile terrain, sensor nodes are vulnerable to node capture and cryptographic material compromise. Compromised nodes can be used to launch wormhole and sinkhole attacks in order to prevent sensitive data from reaching intended destinations. Our objective in this paper is to mitigate the impact of undetected compromised nodes on routing. To this end, we develop metrics to quantify risk of paths in a network. We then introduce a novel routing approach: Secure-Path Routing (SPR) that uses expected path risk as a parameter in routing. Quantified path risk values are used in routing to reduce traffic flow over nodes that have high expected vulnerability. Selecting low risk routes may lead to the choice of energy-expensive routes. Thus, we develop algorithms for balancing risk with other path selection parameters, including energy consumption. We conduct simulation experiments to evaluate the effectiveness of our approach and study the tradeoff between security and energy. Simulation shows that SPR can be quite effective at increasing traffic flow over legitimate routes and that the impact of SPR on network lifetime is negligible.
UR - http://www.scopus.com/inward/record.url?scp=36049014460&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=36049014460&partnerID=8YFLogxK
U2 - 10.1109/CHINACOM.2006.344677
DO - 10.1109/CHINACOM.2006.344677
M3 - Conference contribution
AN - SCOPUS:36049014460
SN - 1424404630
SN - 9781424404636
T3 - First International Conference on Communications and Networking in China, ChinaCom '06
BT - First International Conference on Communications and Networking in China, ChinaCom '06
PB - IEEE Computer Society
T2 - 1st International Conference on Communications and Networking in China, ChinaCom '06
Y2 - 25 October 2006 through 27 October 2006
ER -