A SCALABLE SECURITY SERVICE FOR GEOGRAPHIC AD-HOC ROUTING

Authors

  • Zdravko Karakehayov
  • Ivan Radev

DOI:

https://doi.org/10.47839/ijc.4.2.344

Keywords:

Distributed sensor networks, geographic routing, secure routing, black hole attack

Abstract

This paper describes a scalable security service for geographic ad-hoc routing. The routing protocol, REWARD, detects black hole attacks and organizes a distributed data base for suspicious nodes and areas. The algorithm utilizes two types of broadcast messages, MISS and SAMBA, to recruit nodes to act as security servers. Security servers keep records for detected black hole attacks and provide security services when forward packets. MISS-recruited security servers keep records for suspicious nodes and protect the network in the ID space. SAMBArecruited security servers keep records for suspicious areas and decline the network vulnerability in the physical space. REWARD has different levels of security which can be set according to the local conditions. In order to determine the effectiveness of REWARD we used ANTS, a simulation environment which models the traffic of wireless sensor networks.

References

R. Szewczyk, E. Osterweil, J. Polastre, M. Hamilton, A. Mainwaring and D. Estrin. Habitat monitoring with sensor networks. Communications of the ACM, Special Issue on Sensor Networks, June 2004, Vol. 47, pp. 34-40.

D. Malan, T. Fulford-Jones, M. Welsh and S. Moulton. CodeBlue: An Ad Hoc Sensor Network Infrastructure for Emergency Medical Care. International Workshop on Wearable and Implantable Body Sensor Networks. Imperial College, London, England. April 2004.

D. Puccinelli and M. Haenggi. Wireless sensor networks: applications and challenges of ubiquitous sensing. IEEE Circuits and Systems Magazine, third quarter 2005, pp. 19-29.

G. Simon, M. Maroti, A. Ledeczi, G. Balogh, B. Kusy, A. Nadas, G. Pap, J. Sallai and K. Frampton. Sensor network-based countersniper system. Proc. of the 2nd Int. Conference on Embedded Networked Sensor Systems, Baltimor, USA, 2004, pp. 1-12.

J. Hill and D. Culler. Mica: A wireless Platform for deeply embedded networks. IEEE Micro, Vol. 22, No 6, 2002, pp. 12-24.

Z. Karakehayov. Zero-power design for Smart Dust networks, Proceedings 1st IEEE International Conference on Intelligent Systems, Varna, 2002, pp. 302-305.

Z. Karakehayov, Low-power design for microcontroller-based embedded systems, Proceedings 7th IEEE Workshop on Design & Diagnostics of Electronic Circuits & Systems, Tatranska Lomnica, Slovakia, April, 2004, pp. 29-34.

Z. Karakehayov. Low-power design for Smart Dust networks, in Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems, edited by Mohammad Ilyas and Imad Mahgoub, CRC Press LLC, 2005.

M. Haenggi. Opportunities and challenges in wireless sensor networks, in Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems, edited by Mohammad Ilyas and Imad Mahgoub, CRC Press LLC, 2005.

M. Bhardwaj and A. P. Chandrakasan, Bounding the lifetime of sensor networks via optimal role assignments, IEEE INFOCOM, 2002, pp. 1587-1596.

C. Y. Hu and A. Perrig. A survey of secure wireless ad hoc routing, IEEE Security & Privacy, May/June, 2004, 28-39.

Z. Karakehayov, Design of distributed sensor networks for security and defense, In Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense: Research Issues, (Gdansk, Poland, September 6-9, 2004), edited by J. S. Kowalik, J. Gorski and A. Sachenko, Springer, NATO Science Series II: Mathematics, Physics and Chemistry, Vol. 196, 2005, pp. 177-192.

C. Karlof and D. Wagner. Secure routing in wireless sensor networks: Attacks and countermeasures. Proceedings of The First IEEE International Workshop on Sensor Networks, Protocols and Applications, May 2003, pp. 113-127.

J. Newsome, E. Shi, D. Song and A. Perrig. The Sybil attack in sensor networks: analysis & defenses. Proceedings of the third International Symposium on Information Processing in Sensor Networks. ACM Press, 2004, pp. 259-268.

N. Sastry, U. Shankar and D. Wagner. Secure verification of location claims. Proceedings of the 2003 ACM Workshop on Wireless Security, San Diego, September 2003.

E. M. Royer and C. Toh, A review of current routing protocols for ad hoc mobile wireless networks, IEEE Personal Communications, April, 1999, pp. 46-55.

J. L. Gao, Energy Efficient Routing for Wireless Sensor Networks, Ph. D. theses, University of California, Los Angeles, 2000.

M. Mauve and J. Widmer, A survey on position-based routing in mobile ad hoc networks, IEEE Network, November/December, 2001, pp. 30-39.

X. Hong, K. Xu and M. Gerla, Scalable routing protocols for mobile ad hoc networks, IEEE Network, July/August, 2002, pp. 11-21.

J. H. Schiller, Mobile Communications, Addison-Wesley, 2003.

USCG Navigation Center GPS page http://www.navcen.uscg.gov/gps/default.htm

J. Li, J. Jannotti, D. S. J. De Couto, D. R. Karger and R. Morris, A scalable location service for geographic ad hoc routing, Proc. ACM/IEEE MobiCom, August 2000.

B. Karp and H. T. Kung. GPSR: greedy perimeter stateless routing for wireless networks. Proceedings of the 6th annual international conference on Mobile computing and networking. Boston, August 2000, pp. 243-254.

S. Biswas and R. Morris. Opportunistic routing in multi-hop wireless networks, ACM SIGCOMM Computer Communication Review, Vol. 34, Issue 1, January, 2004, 69-74.

M. Witt and V. Turau, BGR: Blind geographic routing for sensor networks, In Proceedings of the Third International Workshop on Intelligent Solutions in Embedded Systems, Hamburg, Germany, May, 2005.

S. Marti, T.J. Giuli, K. Lai and M. Baker, Mitigating routing misbehavior in mobile ad hoc networks, In Proceedings 6th Int. Conference Mobile Computing Networking (MOBICOM-00), New York, August, 2000, ACM Press, 255-265.

Z. Karakehayov, Using REWARD to detect team black-hole attacks in wireless sensor networks, Workshop on Real-World Wireless Sensor Networks, REALWSN'5, June, Stockholm, 2005.

Z. Karakehayov and I. Radev, REWARD: A routing method for ad-hoc networks with adjustable security capability, NATO Advanced Research Workshop "Security and Embedded Systems", Patras, August, 2005.

Z. Karakehayov, Low-power communication for wireless ad hoc networks, Proceedings ELECTRONICS'2003 International Conference, Sozopol, 2003, pp. 77-82.

Downloads

Published

2014-08-01

How to Cite

Karakehayov, Z., & Radev, I. (2014). A SCALABLE SECURITY SERVICE FOR GEOGRAPHIC AD-HOC ROUTING. International Journal of Computing, 4(2), 124-132. https://doi.org/10.47839/ijc.4.2.344

Issue

Section

Articles