Resilient networking for wireless sensor networks
نویسندگان
چکیده
This report deals with security in wireless sensor networks (WSNs), especially in network layer. Multiple secure routing protocols have been proposed in the literature. However, they often use the cryptography to secure routing functionalities. The cryptography alone is not enough to defend against multiple attacks due to the node compromise. Therefore, we need more algorithmic solutions. In this report, we focus on the behavior of routing protocols to determine which properties make them more resilient to attacks. Our aim is to find some answers to the following questions. Are there any existing protocols, not designed initially for security, but which already contain some inherently resilient properties against attacks under which some portion of the network nodes is compromised? If yes, which specific behaviors are making these protocols more resilient? We propose in this report an overview of security strategies for WSNs in general, including existing attacks and defensive measures. In this report we focus at the network layer in particular, and an analysis of the behavior of four particular routing protocols is provided to determine their inherent resiliency to insider attacks. The protocols considered are: Dynamic Source Routing (DSR), Gradient-Based Routing (GBR), Greedy Forwarding (GF) and Random Walk Routing (RWR). Key-words: security, wireless sensor networks, survey, resiliency, attacks. in ria -0 04 64 05 9, v er si on 1 26 M ar 2 01 0 Protocoles de communication résilients pour les réseaux de capteurs sans fil Résumé : Dans ce rapport nous traitons la sécurité dans les réseaux de capteurs sans fils (WSNs), plus particulièrement à la couche réseau. Dans la littérature, nombreuses propositions tentent de résoudre ces problèmes de sécurité, en utilisant notamment la cryptographie. Cette dernière permet de résoudre les problèmes classiques d’authenticité, de confidentialité et d’intégrité de données. Ainsi, la cryptographie permet d’obtenir une sécurité de base, mais ne permet pas de se prémunir contre les attaques internes quand une partie des noeuds simples sont corrompus. Par conséquent, nous avons besoin des solutions algorithmiques pour compléter. Notre objectif est de trouver des réponses aux questions suivantes. Existent-ils, les protocoles non conçus initialement pour la sécurité, mais qui contiennent déjà certaines propriétés intrinsèquement résilients contre les attaques internes? Si oui, quels comportements spécifiques les rendent plus résilient? Ce travail donnera lieu à deux contributions : i) tout d’abord un survol des stratégies de sécurité en général dans WSNs et au couche réseau (modèle OSI) en particulier, puis ii) une étude sur le comportement de protocoles de routage dans les réseaux de capteurs soumis à des attaques réseaux. Les protocoles considérés sont: Dynamic Source Routing (DSR), Gradient-Based Routing (GBR), Greedy Forwarding (GF) et Random Walk Routing (RWR). Mots-clés : sécurité, réseaux de capteurs, attaques, survol, résilience. in ria -0 04 64 05 9, v er si on 1 26 M ar 2 01 0 Resilient networking in wireless sensor networks 3
منابع مشابه
An Adaptive Congestion Alleviating Protocol for Healthcare Applications in Wireless Body Sensor Networks: Learning Automata Approach
Wireless Body Sensor Networks (WBSNs) involve a convergence of biosensors, wireless communication and networks technologies. WBSN enables real-time healthcare services to users. Wireless sensors can be used to monitor patients’ physical conditions and transfer real time vital signs to the emergency center or individual doctors. Wireless networks are subject to more packet loss and congestion. T...
متن کاملImproving Energy Consumption by Using Cluster Based Routing Algorithm in Wireless Sensor Networks
Multi-path is favorite alternative for sensor networks, as it provides an easy mechanism to distributetraffic, as well as considerate fault tolerance. In this paper, a new clustering based multi path routingprotocol namely ECRR (Energy efficient Cluster based Routing algorithm for improving Reliability) isproposed, which is a new routing algorithm and guarantees the achievement to required QoS ...
متن کاملA Secure Routing Algorithm for Underwater Wireless Sensor Networks
Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet d...
متن کاملRepresenting a Model for Improving Connectivity and Power Dissipation in Wireless Networks Using Mobile Sensors
Wireless sensor networks are often located in areas where access to them is difficult or dangerous. Today, in wireless sensor networks, cluster-based routing protocols by dividing sensor nodes into distinct clusters and selecting local head-clusters to combine and send information of each cluster to the base station and balanced energy consumption by network nodes, get the best performance ...
متن کاملDesign and evaluation of two distributed methods for sensors placement in Wireless Sensor Networks
Adequate coverage is one of the main problems for distributed wireless sensor networks and The effectiveness of that highly depends on the sensor deployment scheme. Given a finite number of sensors, optimizing the sensor deployment will provide sufficient sensor coverage and save power of sensors for movement to target location to adequate coverage. In this paper, we apply fuzzy logic system to...
متن کامل3D Path Planning Algorithm for Mobile Anchor-Assisted Positioning in Wireless Sensor Networks
Positioning service is one of Wireless Sensor Networks’ (WSNs) fundamental services. The accurate position of the sensor nodes plays a vital role in many applications of WSNs. In this paper, a 3D positioning algorithm is being proposed, using mobile anchor node to assist sensor nodes in order to estimate their positions in a 3D geospatial environment. However, mobile anchor node’s 3D path optim...
متن کامل