首页 | 本学科首页   官方微博 | 高级检索  
     


SeRWA: A secure routing protocol against wormhole attacks in sensor networks
Authors:Sanjay Madria  Jian Yin
Affiliation:1. Department of Information & Communication Engineering, Hohai University and Changzhou Key Lab. of Photovoltaic System Integration and Production Equipment Technology, Changzhou, China;2. Guangdong Provincial Key Lab. of Petrochemical Equipment Fault Diagnosis, Guangdong University of Petrochemical Technology, China;1. Department of Computer Science, City University of Hong Kong, Hong Kong;2. Institute of Information Science, Academia Sinica, Taiwan;3. Department of Computer Science, Hong Kong Baptist University, Hong Kong;1. Federal University of Rio Grande do Sul, Institute of Informatics, Av. Bento Gonçalves, 9500 - Campus do Vale - 91501-970 - Porto Alegre, Brazil;2. University PUC-Minas, Computer Science Department, Avenida Dom José Gaspar, 500 - 30535-610 - Belo Horizonte, Brazil;3. University of Grenoble, CEA-DRT - LIG Laboratory, ZIRST 51 Avenue Jean Kuntzmann - 38330 - Montbonnot, France;1. Anagos, 55 rue des petites écuries, F75010 Paris, France;2. Centre Hospitalier Charles Nicolle, 1 rue Germont, 76000 Rouen, France;3. Équipe de Statistique Appliquée, ESPCI ParisTech, 10 rue Vauquelin, 75005 Paris, France;4. Centre Hospitalier Lariboisière, Université Paris 7, 2 rue Ambroise Paré, 75010 Paris, France;5. Clinical Investigation Center 503, Centre Hospitalier National des Quinze-Vingts, INSERM & Université Pierre et Marie Curie-Paris 6, Paris, France
Abstract:A wormhole attack is particularly harmful against routing in sensor networks where an attacker receives packets at one location in the network, tunnels and then replays them at another remote location in the network. A wormhole attack can be easily launched by an attacker without compromising any sensor nodes. Since most of the routing protocols do not have mechanisms to defend the network against wormhole attacks, the route request can be tunneled to the target area by the attacker through wormholes. Thus, the sensor nodes in the target area build the route through the attacker. Later, the attacker can tamper the data, messages, or selectively forward data messages to disrupt the functions of the sensor network. Researchers have used some special hardware such as the directional antenna and the precise synchronized clock to defend the sensor network against wormhole attacks during the neighbor discovery process. In this paper, we propose a Secure Routing protocol against wormhole attacks in sensor networks (SeRWA). SeRWA protocol avoids using any special hardware such as the directional antenna and the precise synchronized clock to detect a wormhole. Moreover, it provides a real secure route against the wormhole attack. Simulation results show that SeRWA protocol only has very small false positives for wormhole detection during the neighbor discovery process (less than 10%). The average energy usage at each node for SeRWA protocol during the neighbor discovery and route discovery is below 25 mJ, which is much lower than the available energy (15 kJ) at each node. The cost analysis shows that SeRWA protocol only needs small memory usage at each node (below 14 kB if each node has 20 neighbors), which is suitable for the sensor network.
Keywords:
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号