A SCALABLE SECURITY SERVICE FOR GEOGRAPHIC AD-HOC ROUTING
DOI:
https://doi.org/10.47839/ijc.4.2.344Keywords:
Distributed sensor networks, geographic routing, secure routing, black hole attackAbstract
This paper describes a scalable security service for geographic ad-hoc routing. The routing protocol, REWARD, detects black hole attacks and organizes a distributed data base for suspicious nodes and areas. The algorithm utilizes two types of broadcast messages, MISS and SAMBA, to recruit nodes to act as security servers. Security servers keep records for detected black hole attacks and provide security services when forward packets. MISS-recruited security servers keep records for suspicious nodes and protect the network in the ID space. SAMBArecruited security servers keep records for suspicious areas and decline the network vulnerability in the physical space. REWARD has different levels of security which can be set according to the local conditions. In order to determine the effectiveness of REWARD we used ANTS, a simulation environment which models the traffic of wireless sensor networks.References
R. Szewczyk, E. Osterweil, J. Polastre, M. Hamilton, A. Mainwaring and D. Estrin. Habitat monitoring with sensor networks. Communications of the ACM, Special Issue on Sensor Networks, June 2004, Vol. 47, pp. 34-40.
D. Malan, T. Fulford-Jones, M. Welsh and S. Moulton. CodeBlue: An Ad Hoc Sensor Network Infrastructure for Emergency Medical Care. International Workshop on Wearable and Implantable Body Sensor Networks. Imperial College, London, England. April 2004.
D. Puccinelli and M. Haenggi. Wireless sensor networks: applications and challenges of ubiquitous sensing. IEEE Circuits and Systems Magazine, third quarter 2005, pp. 19-29.
G. Simon, M. Maroti, A. Ledeczi, G. Balogh, B. Kusy, A. Nadas, G. Pap, J. Sallai and K. Frampton. Sensor network-based countersniper system. Proc. of the 2nd Int. Conference on Embedded Networked Sensor Systems, Baltimor, USA, 2004, pp. 1-12.
J. Hill and D. Culler. Mica: A wireless Platform for deeply embedded networks. IEEE Micro, Vol. 22, No 6, 2002, pp. 12-24.
Z. Karakehayov. Zero-power design for Smart Dust networks, Proceedings 1st IEEE International Conference on Intelligent Systems, Varna, 2002, pp. 302-305.
Z. Karakehayov, Low-power design for microcontroller-based embedded systems, Proceedings 7th IEEE Workshop on Design & Diagnostics of Electronic Circuits & Systems, Tatranska Lomnica, Slovakia, April, 2004, pp. 29-34.
Z. Karakehayov. Low-power design for Smart Dust networks, in Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems, edited by Mohammad Ilyas and Imad Mahgoub, CRC Press LLC, 2005.
M. Haenggi. Opportunities and challenges in wireless sensor networks, in Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems, edited by Mohammad Ilyas and Imad Mahgoub, CRC Press LLC, 2005.
M. Bhardwaj and A. P. Chandrakasan, Bounding the lifetime of sensor networks via optimal role assignments, IEEE INFOCOM, 2002, pp. 1587-1596.
C. Y. Hu and A. Perrig. A survey of secure wireless ad hoc routing, IEEE Security & Privacy, May/June, 2004, 28-39.
Z. Karakehayov, Design of distributed sensor networks for security and defense, In Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense: Research Issues, (Gdansk, Poland, September 6-9, 2004), edited by J. S. Kowalik, J. Gorski and A. Sachenko, Springer, NATO Science Series II: Mathematics, Physics and Chemistry, Vol. 196, 2005, pp. 177-192.
C. Karlof and D. Wagner. Secure routing in wireless sensor networks: Attacks and countermeasures. Proceedings of The First IEEE International Workshop on Sensor Networks, Protocols and Applications, May 2003, pp. 113-127.
J. Newsome, E. Shi, D. Song and A. Perrig. The Sybil attack in sensor networks: analysis & defenses. Proceedings of the third International Symposium on Information Processing in Sensor Networks. ACM Press, 2004, pp. 259-268.
N. Sastry, U. Shankar and D. Wagner. Secure verification of location claims. Proceedings of the 2003 ACM Workshop on Wireless Security, San Diego, September 2003.
E. M. Royer and C. Toh, A review of current routing protocols for ad hoc mobile wireless networks, IEEE Personal Communications, April, 1999, pp. 46-55.
J. L. Gao, Energy Efficient Routing for Wireless Sensor Networks, Ph. D. theses, University of California, Los Angeles, 2000.
M. Mauve and J. Widmer, A survey on position-based routing in mobile ad hoc networks, IEEE Network, November/December, 2001, pp. 30-39.
X. Hong, K. Xu and M. Gerla, Scalable routing protocols for mobile ad hoc networks, IEEE Network, July/August, 2002, pp. 11-21.
J. H. Schiller, Mobile Communications, Addison-Wesley, 2003.
USCG Navigation Center GPS page http://www.navcen.uscg.gov/gps/default.htm
J. Li, J. Jannotti, D. S. J. De Couto, D. R. Karger and R. Morris, A scalable location service for geographic ad hoc routing, Proc. ACM/IEEE MobiCom, August 2000.
B. Karp and H. T. Kung. GPSR: greedy perimeter stateless routing for wireless networks. Proceedings of the 6th annual international conference on Mobile computing and networking. Boston, August 2000, pp. 243-254.
S. Biswas and R. Morris. Opportunistic routing in multi-hop wireless networks, ACM SIGCOMM Computer Communication Review, Vol. 34, Issue 1, January, 2004, 69-74.
M. Witt and V. Turau, BGR: Blind geographic routing for sensor networks, In Proceedings of the Third International Workshop on Intelligent Solutions in Embedded Systems, Hamburg, Germany, May, 2005.
S. Marti, T.J. Giuli, K. Lai and M. Baker, Mitigating routing misbehavior in mobile ad hoc networks, In Proceedings 6th Int. Conference Mobile Computing Networking (MOBICOM-00), New York, August, 2000, ACM Press, 255-265.
Z. Karakehayov, Using REWARD to detect team black-hole attacks in wireless sensor networks, Workshop on Real-World Wireless Sensor Networks, REALWSN'5, June, Stockholm, 2005.
Z. Karakehayov and I. Radev, REWARD: A routing method for ad-hoc networks with adjustable security capability, NATO Advanced Research Workshop "Security and Embedded Systems", Patras, August, 2005.
Z. Karakehayov, Low-power communication for wireless ad hoc networks, Proceedings ELECTRONICS'2003 International Conference, Sozopol, 2003, pp. 77-82.
Downloads
Published
How to Cite
Issue
Section
License
International Journal of Computing is an open access journal. Authors who publish with this journal agree to the following terms:• Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
• Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
• Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.