Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 30172
Dynamic Window Secured Implicit Geographic Forwarding Routing for Wireless Sensor Network

Authors: Z.M. Hanapi, M. Ismail, K. Jumari, M. Mahdavi

Abstract:

Routing security is a major concerned in Wireless Sensor Network since a large scale of unattended nodes is deployed in ad hoc fashion with no possibility of a global addressing due to a limitation of node-s memory and the node have to be self organizing when the systems require a connection with the other nodes. It becomes more challenging when the nodes have to act as the router and tightly constrained on energy and computational capabilities where any existing security mechanisms are not allowed to be fitted directly. These reasons thus increasing vulnerabilities to the network layer particularly and to the whole network, generally. In this paper, a Dynamic Window Secured Implicit Geographic Forwarding (DWSIGF) routing is presented where a dynamic time is used for collection window to collect Clear to Send (CTS) control packet in order to find an appropriate hoping node. The DWIGF is expected to minimize a chance to select an attacker as the hoping node that caused by a blackhole attack that happen because of the CTS rushing attack, which promise a good network performance with high packet delivery ratios.

Keywords: sensor, security, routing, attack, random.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1332656

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1058

References:


[1] Karlof, C. and Wagner, D., "Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures", Elsevier-s AdHoc Networks Journal, Special Issue on Sensor Network Applications and Protocols, 2003, 1(2003), 293-315.
[2] Yick, J, Mukherjee, and Ghosal, D., "Wireless Sensor Network Survey", Journal of Elsevier: Computer Network, 2008 52(12):2292-2330.
[3] Hanapi Z.M., Ismail M., Jumari K., and Mirvaziri H., "Analysis of Routing Attacks in Wireless Sensor Network", In Proceedings of International Cryptology Workshop and Conference (Cryptology2008), 2008, ISBN 978-983-4069, pp. 202-214.
[4] Kuo, C., Luk, M., Negi, R., and Perrig, A., "Message-In-A-Bottle: User Friendly and Secure Key Deployment for Sensor Nodes", In Proceedings of International Conference of Sensor System (SenSys2007), 2007, ACM-159593-763-6/07/0011.
[5] Heinzelman, W.R., Chandrakasan, A., and Balakrishnan, "Energyefficient Communication Protocol For Wireless Sensor Networks", 2000. pp. 3005-3014.
[6] Wood, A.D. and Stankovic, J., "Denial of Service in Sensor Networks", IEEE Computer, 0018-9162/02, pp.54-62.
[7] Blum, B., He, T., Son, S, and Stankovic, J., "IGF: A State-Free Robust Communication Protocol For Wireless Sensor Network", Technical Report CS-2003-11, University of Virginia, 2003.
[8] Newsome, J., Shi, E., Song, D., and Perrig, A., "The Sybil Attacks In Sensor Networks: Analysis and Defense", In Proceedings of Third International Symposium on Information Processing in Sensor Networks, ACM 1-58113-846-6/04/0004, 2004.
[9] Wood, A.D., Lei, F., Stankovic, J., and Tian, H., "SIGF: A Family of Configurable, Secure Routing protocols for Wireless Sensor Networks", SASN2006, ACM 1-59593-554-1/060010, 2006, pp. 35-48.
[10] Wood, A.D. and Stankovic, J., "Denial of Service in Sensor Networks", IEEE Computer, 0018-9162/02, pp.54-62.
[11] Abu G.N., Kang K., and Liu K., "Towards Resilient Geographic Routing in WSNs", In Proceedings of Q2SWinet05, ACM 1-59593-241-0, 2005, pp. 71-78.
[12] Hanapi Z.M., Ismail M., Jumari K., and Mirvaziri H., "A Taxanomy of Routing Attacks in Geographic Routing in Wireless Sensor Network", In Proceedings of 1st Engineering Postgraduate Conference (EPC2008): Innovation through Engineering, 2008.