Professional Documents
Culture Documents
Nadeem Kafi1
Jawwad Shamsi1
Waleej Haider
I.
INTRODUCTION:
Asad M Abbsi
Department of Computer Science,
Iqra University, Karachi
m.asadabbasi@yahoo.com
IV.
RELATED WORK
Detection of malicious nodes is important as malicious node
activities can cause degradation in system throughput, denial
of service, misrouting, delays and unreliable data
transmission. In this section, we present the state-of-the-art
secure routing protocols for multi-hop WSNs as under:
In ATSR (Ambient Trust Sensor Routing) [5], a fully
distributed Trust management system is used to evaluate the
reliability of nodes. In this approach, nodes in WSN
directly monitor the behaviors of their neighbors and finds
trust value of its neighbor with respect to different trust
matrices. In Trusted AODV [18] routing is performed by
taking different trust metrics into account. In Trusted GPSR
[19], the Greedy Perimeter Stateless Routing protocol is
modified to use trust values of node into account. In this
approach, when a node sends a packet to its neighbor, it
waits until its neighbor overhears about its forwarding.
Based on this forwarding information, a node maintains trust
matrices for its neighbors and it for routing decisions. In
TRANS Based on the trust information of nodes, secure
routes are selected in this protocol. For destined locations,
BS only sends a message to its trusted neighbors. Those
corresponding neighbors then forward the message to their
trusted neighbors that have the nearest location to
destination. Thus the packet reaches the destination along a
path of trusted sensors.
Directed Diffusion [4] is a data-centric and
application-aware paradigm, in which all data generated by
sensor nodes is named by attribute-value pairs. The main
idea of this approach is to combine data coming from
different sources, eliminate redundancy and minimize the
number of data transmission to save the network energy and
prolong its lifetime. In SPINS [16] when node wants to
establish a shared secret session key with another node, they
use BS. As a single secret key shared with the BS and one
unique link key for each one of its neighbors in this
distribution approach, small memory is required. The Key
establishment and distribution is efficient against
compromised nodes, as the captured node divulges no secrets
about the whole network. If the compromised node is to be
revoked, the BS broadcast the encrypted revocation message
to the network. Node replication activities are easily
controlled at the BS, as the entire key establishment takes
place at the BS.
Xiaojiang Du, Sghaier Guizani et al. [11] proposed a
Two-Tier Secure Routing protocol (TTSR) for heterogeneous
sensor networks (HSN). It offers security attributes such as
authentication, confidentiality, and integrity. Hierarchical
network architecture is formed by the Base Stations (BS),
H-sensors and L-sensors in an HSN. H-sensors have more
energy, high data rate and long transmission range and more
advantages for designing better secure routing protocols.
H-sensors serve as the cluster heads and form the backbone
network. L-sensors send data to their respective H-sensors.
H-sensors also remove redundant data, aggregate data from
multiple L-sensors and through the H-sensor backbone
network, compressed packets are sent to the BS.
INSENS [14] is INtrusion-tolerant routing protocol for
wireless SEnsor NetworkS. INSENS exploits redundancy to
44
46
Figure 3: The protocol TEESR floods neighbors information
in less numbers of messages.
!!
&'()
"
#$%
#
&
#' +
+,+-.
/'/
!
#01
/'/
!
/'/
!
*
47
4
4
'
"
#$%
&
2#
'
"
#$%
&
2#
3
3
3
"
#$%
'
&
2#
4
4
Figure 7: This Figure shows that many of the TEESR nodes still alive in a WSN environment even if the energy level per
node drops to 1%. Performance of TEESR has been compared with other routing algorithms, such as LEACH, Directed
Diffusion and PEGASIS
[9]
Chen Jing, Zhang Huanguo, HU Junhui. An efficiency security
VII. CONCLUSION AND FUTURE DIRECTIONS
Wireless Sensor Networks deal with sensitive data and are
vulnerable to different types of attacks. Only few resources
are sufficient to inject fabricated messages, manipulate
routing messages, attack the routing protocols and subvert
the normal operation of the network. Even more, arbitrary
behavior may be induced by corrupting the intermediate
nodes. Considering all these realities, the deployment of an
energy efficient secure routing protocol becomes a primary
task. Due to the resource constraints in WSNs, the design of
such secure and energy efficient routing protocols is not an
easy task. The purpose of this paper is to highlight
requirements, challenges, routing based security threats,
provide a detailed assessment of existing solutions, and offer
an efficient solution known as TEESR to Secure Routing in
multi-hop WSN. As compared with other routing protocols,
the protocol select limited number of forwarding nodes,
floods the neighbors information in few numbers of
messages, this results low end-to-end delay and hence save
significant amount of energy. Moreover, the protocol is
stable against malicious nodes and their relevant attacks.
At different values of power transmission and trust, security
concerns of TEESR in sub-clusters are left for future work.
Handover of nodes between sub-clusters is also left for
future research.
VIII. REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
[19]
[20]
[21]
[22]
[23]
[24]
[25]
[26]
48