Attacks Against Virtual Coordinate System Based Routing in Wireless Sensor Networks
نویسندگان
چکیده
Wireless sensornet designs have evolved in recent years, from primarily focusing on data collection to more sophisticated tasks such as data centric storage [7]. Likewise, the requirements on the network support have also changed, from the basic many-to-one and one-to-many communications to more sophisticated point-to-point communications. To address the unique challenges for point-to-point routing in the sensornets, virtual coordinate system (VCS) based routing protocols have been developed. Compared to the traditional routing protocols, VCS-based routing protocols are proactive protocols that have the attractive properties of operating via only local interactions and requiring state information that does not grow with the size of the network. Although there have been many proposed VCS-based routing protocols in the literature [1], [2], [3], [6], there has been little work that investigates the security of such protocols. However, as our experimental results have shown, the VCSbased routing protocols are particularly sensitive to attacks. It is possible for a small number of attacker nodes to jeopardize the routing operations of a significant portion of the network. Thus, it is paramount that we provide security mechanisms in these protocols if the target deployment environment is potentially malicious. In this project, we address the problem of securing VCS-routing protocols. As a first step, we focus on the security threats against such protocols. More specifically, we will present the following contributions: • We abstract a common framework for VCS-based routing based on the characteristics of existing protocols • We identify attacks against VCS-based routing protocols based on the common framework • We evaluate experimentally the impact of the attacks to demonstrate the necessity of security mechanisms
منابع مشابه
A Lightweight Intrusion Detection System Based on Specifications to Improve Security in Wireless Sensor Networks
Due to the prevalence of Wireless Sensor Networks (WSNs) in the many mission-critical applications such as military areas, security has been considered as one of the essential parameters in Quality of Service (QoS), and Intrusion Detection System (IDS) is considered as a fundamental requirement for security in these networks. This paper presents a lightweight Intrusion Detection System to prote...
متن کاملA Secure Routing Algorithm for Underwater Wireless Sensor Networks
Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet d...
متن کاملEvaluation of an Intrusion Detection System for Routing Attacks in Wireless Self-organised Networks
Wireless Sensor Networks (WSNs) arebecoming increasingly popular, and very useful in militaryapplications and environmental monitoring. However,security is a major challenge for WSNs because they areusually setup in unprotected environments. Our goal in thisstudy is to simulate an Intrusion Detection System (IDS)that monitors the WSN and report intrusions accurately andeffectively. We have thus...
متن کاملIntrusion Detection in Wireless Sensor Networks using Genetic Algorithm
Wireless sensor networks, due to the characteristics of sensors such as wireless communication channels, the lack of infrastructure and targeted threats, are very vulnerable to the various attacks. Routing attacks on the networks, where a malicious node from sending data to the base station is perceived. In this article, a method that can be used to transfer the data securely to prevent attacks...
متن کاملRandom Key Pre-Distribution Techniques against Sybil Attacks
Sybil attacks pose a serious threat for Wireless Sensor Networks (WSN) security. They can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. In a Sybil attack, the attacker masquerades as multiple sensor identities that are actually controlled by one or a few existing attacker nodes. Sybil identities are fabricated out of stolen keys, obt...
متن کاملSecuring Virtual Coordinate System Based Routing in Wireless Sensor Networks
Virtual coordinate system (VCS) based routing provides a practical, efficient and scalable means for point-to-point routing in wireless sensor networks. Several VCS-based routing protocols have been proposed in the last few years, all assuming that nodes are cooperative. However, malicious nodes may violate this assumption, making VCS-based routing protocols vulnerable to numerous attacks. Thus...
متن کامل