Open Access Open Access  Restricted Access Subscription or Fee Access

TARF-Prevention from Adverseries of Multihop Routing in WSN

Aathira Jayan, K. Divya, R. Divya, R. Geetha

Abstract


Wireless sensor network plays major role in military surveillance, nuclear power plants, and forest fire detection. Many routing techniques and cryptographic methods were applied to secure the network, which proved inefficient in practice. Data is transmitted from source to destination either by single hop or multihop routing. In this paper the threats that are encountered while using multi hop routing in WSN is discussed. The attacks were mainly due to the identity of nodes a this paper deals majorly with sink hole attack, wormhole and Sybil attacks. To overcome these attacks due to deception, a protocol named TARF, trust aware routing protocol framework is implemented. It is considered to be an energy efficient and trust worthy protocol. The resilience of this protocol is evaluated through empirical experiments and simulations on large WSN under various network conditions. TARF produces less overhead in the network.TARF proves to be more effective in securing network by identifying the malicious nodes and by preventing it to be used while transmission of data


Keywords


Wireless Sensor Network, Multihop Routing, Sink Hole, Wormhole Attacks

Full Text:

PDF

References


Abbasi.M and Younis.M, ―A Survey on Clustering Algorithms for Wireless Sensor Networks,‖ Computer Comm., vol. 30, pp. 2826-2841, Oct. 2007.

Akyildiz.I.F, Su.W, Sankarasubramaniam.Y, and Cayirci.E, ―A Survey on Sensor Networks,‖ IEEE Comm. Magazine, vol. 40, no. 8,pp. 102-114, Aug. 2002.

Al-Karaki .J and Kamal.A, ―Routing Techniques in Wireless Sensor Networks: A Survey,‖ Wireless Comm., vol. 11, no. 6, pp. 6-28, Dec. 2004.

Chang.S, Shieh.S, Lin.W, and Hsieh.C, ―An Efficient Broadcast Authentication Scheme in Wireless Sensor Networks,‖ Proc. ACM Symp. Information, Computer and Comm. Security (ASIACCS ’06),pp. 311-320, 2006.

De.P, Liu.Y, and Das. S.K, ―Modeling Node Compromise Spread in Wireless Sensor Networks Using Epidemic Theory,‖Proc. Int’l Symp. World of Wireless, Mobile and Multimedia Networks(WoWMoM ’06), pp. 237-243, 2006.

Ganeriwal.S, Balzano.L, and Srivastava.M, ―Reputation-Based Framework for High Integrity Sensor Networks,‖ ACM Trans.Sensor Networks, vol. 4, pp. 1-37 2008.

Gnawali.O, Fonseca.R, Jamieson.K, Moss.D, and Levis.P,―Collection Tree Protocol,‖ Proc. Seventh ACM Conf. Embedded Networked Sensor Systems (SenSys ’09), pp. 1-14, 2009.

Gong.W, You.Z, Chen.D, Zhao.X, Gu.M, and Lam.K, ―Trust Based Routing for Misbehavior Detection in Ad Hoc Networks,‖ J.Networks, vol. 5, no. 5, pp. 551-558, May 2010.

Hong.X, Gerla.M, Pei.G, and Chiang.C, ―A Group Mobility Model for Ad Hoc Wireless Networks,‖ Proc. Second ACM Int’l Workshop Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM ’99), pp. 53-60, 1999.

Jain.M and Kandwal.H, ―A Survey on Complex Wormhole Attack in Wireless Ad Hoc Networks,‖ Proc. Int’l Conf. Advances in Computing, Control, and Telecomm. Technologies (ACT ’09), pp. 555-558, 2009.

Karlof.C, Sastry.N, and Wagner.D, ―Tinysec: A Link Layer Security Architecture for Wireless Sensor Networks,‖ Proc. ACM Int’l Conf. Embedded Networked Sensor Systems (SenSys ’04), Nov.2004.

Karlof.C and Wagner.D, ―Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures,‖ Proc. First IEEE Int’lWorkshop Sensor Network Protocols and Applications, 2003.

Krontiris.I, Giannetsos.T, and Dimitriou.T, ―Launching a Sinkhole Attack in Wireless Sensor Networks; The Intruder Side,‖Proc. IEEE Int’l Conf. Wireless and Mobile Computing, Networking andComm. (WIMOB ’08), pp. 526-531, 2008.

Liu.A and Ning.P, ―Tinyecc: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks,‖Proc. Seventh Int’l Conf. Information Processing in Sensor Networks(IPSN ’08), pp. 245-256, 2008.

Newsome.J, Shi.E, Song.D, and Perrig.A, ―The Sybil Attack in Sensor Networks: Analysis and Defenses,‖ Proc. Third Int’l Conf. Information Processing in Sensor Networks (IPSN ’04), Apr.2004.

Perrig.A, Szewczyk.R, Wen.W, Culler.D, and Tygar.J, ―SPINS:Security Protocols for Sensor Networks,‖ Wireless Networks J.,vol. 8, no. 5, pp. 521-534, Sept. 2002.

Perkins.C and Bhagwat.P, ―Highly Dynamic Destination- Sequenced Distance-Vector Routing (dsdv) for Mobile Computers,‖ACM SIGCOMM Computer Comm. Rev., vol. 24, no. 4,pp. 234-244, 1994.

Ren.K, Lou.W, Zeng.K, and Moran.P, ―On Broadcast Authentication in Wireless Sensor Networks,‖ IEEE Trans. WirelessComm., vol. 6, no. 11, pp. 4136-4144, Nov. 2007.

Rezgui.A and Eltoweissy.M, ―Tarp: A Trust-Aware Routing Protocol for Sensor-Actuator Networks,‖ Proc. IEEE Int’l Conf.Mobile Adhoc and Sensor Systems (MASS ’07), 2007.

Safa.H,Artail.H, and Tabet.D, ―A Cluster-Based Trust-Aware Routing Protocol for Mobile Ad Hoc Networks,‖ Wireless Networks,vol. 16, no. 4, pp. 969-984, 2010.

Watro.R, Kong.D, Cuti.S, Gardiner.C,Lynn.C, and Kruus.P, ―Tinypk: Securing Sensor Networks with Public Key Technology,‖Proc. Second ACM Workshop Security of Ad Hoc and Sensor Networks(SASN ’04), pp. 59-64, 2004.

Woo.A, Tong.T, and Culler.D, ―Taming the Underlying Challenges of Reliable Multihop Routing in Sensor Networks,‖Proc. First ACM Int’l Conf. Embedded Networked Sensor Systems(SenSys ’03), Nov. 2003

Wood.A and Stankovic.J, ―Denial of Service in Sensor Networks,‖Computer, vol. 35, no. 10, pp. 54-62, Oct. 2002.

Xue.W, Aiguo.J, and Sheng.W, ―Mobile Agent Based Moving Target Methods in Wireless Sensor Networks,‖ Proc. IEEE Int’lSymp. Comm. and Information Technology (ISCIT ’05), vol. 1, pp. 22-26, 2005.

Yan.Z, Zhang.P, and Virtanen.T, ―Trust Evaluation Based Security Solution in Ad Hoc Networks,‖ Proc. Seventh Nordic Workshop Secure IT Systems, 2003.

Zahariadis.T, Leligou.H, Karkazis.P, Trakadas.P, Papaefstathiou.I,Vangelatos.C, and Besson.L, ―Design and Implementation of a Trust-Aware Routing Protocol for Large WSNs,‖ Int’l J.Network Security and Its Applications, vol. 2no. 3, pp. 52-68, July2010.

Zhan.G, Shi.W, and Deng.J, ―Poster Abstract: Sensortrust—AResilient Trust Model for WSNs,‖ Proc. Seventh Int’l Conf.Embedded Networked Sensor Systems (SenSys ’09), 2009.

Zhan.G, Shi.W, and Deng.J, ―Design, Implementation and Evaluation of Tarf: A Trust-Aware Routing Framework for Dynamic WSNs,‖ Technical Report MIST-TR-2010-003, WayneStateUniv.,http://mine.cs.wayne.edu/~guoxing/tarf.pdf, Oct.2010.

Zhan.G, Shi.W, and Deng.J, ―Tarf: A Trust-Aware Routing Framework for Wireless Sensor Networks,‖ Proc. Seventh European Conf. Wireless Sensor Networks (EWSN ’10), 2010.

Zhao.F and Guibas.L, Wireless Sensor Networks: An Information Processing Approach. Morgan Kaufmann, 2004.

Paul Meeneghan and Declan Delaney, Introduction to NS, Nam and OTclscripting

Ke Liu.Network Simulator 2: Introduction


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.