Академический Документы
Профессиональный Документы
Культура Документы
Networks
Zhen Cao, Jianbin Hu, Zhong Chen, Maoxing Xu, Xia Zhou
School of Electronics Engineering and Computer Science, Peking University
Network and Information Security Laboratory
Beijing, China
{ caozhen, hjbin, chen, xumx, zhouxia }@infosec.pku.edu.cn
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA’06)
1550-445X/06 $20.00 © 2006 IEEE
2= Secure routing. Because the sensor nodes have lim- the base station. Karlof et al. [8] gives the first analysis
ited computation and storage capacity for cryptography al- of secure routing in sensor networks, and introduce two
gorithms, the best tradeoff can be made by providing secu- classes of novel attacks against sensor networks, sinkhole
rity on the network layer with the routing protocol. On the and HELLO flood. In FBSR, base station is responsible for
assumption that the base station have enough energy supply the detection of sinkhole and wormhole attacks, and nor-
and high enough radio power, we can utilize the feedback mal nodes can avoid these adversaries in routing with base
from the base station to identify the malicious nodes. The station feedback.
base station can recognize malicious nodes from the trace
of each route, and periodically broadcast feedback message 2. FBSR: Feedback based secure routing
containing the intruder IDs, so that normal nodes can ef-
fectively avoid the spoofed, altered and replaying routing
In this section, we describe the details of FBSR. Once
information from these nodes.
transmitting a packet, the sender prioritizes its neighbors
3= Energy efficient. FSBR uses energy aware and geo-
with an evaluation function and places this neighbor list in
graphically informed neighbor evaluation heuristics to feed- the packet header. Neighbors, on receiving the packet, will
back the current status of neighbors. The neighbor evalua-
includes its feedback in the ack frame and acknowledges the
tion function is a combination of energy and distance met-
sender, and in the meantime makes independent decision of
rics. But we argue that energy aware neighbor selection is whether to forward the packet. Feedback from base sta-
necessary only when the consumed energy exceeds a cer-
tion contains the malicious nodes detected by the BS, with
tain level. So a threshold evaluation function is utilized to
which sensor nodes can avoid the adversaries in routing.
evaluate the energy level. When the consumed energy is
below a threshold, the energy level stays static, otherwise it
2.1. Neighbor evaluation and prioritizing
linearly slips down.
In order to bring the packet closer to the destination in an
1.2. Related Work energy efficient way, the sender will prioritize its neighbors
according to their last time feedback and put this prioritized
Some routing protocols [1] [2] [3] utilize the idea of neighbor list in the routing packet header (During the first
feedback to help make routing decisions. FBR [1] is a round when feedback is not available, neighbors are priori-
feedback based routing protocol, in which a router moni- tized by their distance to the destination). Then the sender
tors packet traffics on its routes and use this as feedback transmits the packet, deferring the decision of which node to
to determine the usability of the routes, so as to be resis- forward until the process of MAC layer contention, which
tant to attacks and byzantine failures. But FBR is proposed will be discussed in the next subsection.
for the Internet, hence not applicable for sensor networks. Feedback computing is distributed at the receiver side
ALARM [2] is an adaptive routing protocol for Mobile Ad- with an evaluation function. The evaluation function is a
hoc Networks, which uses link duration as the mobility combination of the node’s current energy status and its dis-
feedback metrics to determine the appropriate forwarding tance to the destination. Energy level is used as the metric
method. Since nodes are relatively static in wireless sensor to evaluate the energy status of the sensor nodes. When
networks compared with MANET, this method does not fit the consumed energy is less than the threshold, the energy
for our objectives. SPEED [3] uses local feedback control to level stays at 1.0, and when it exceeds the threshold, the en-
guarantee per-hop delay, so as to meet the real-time require- ergy level linearly slips down until zero. Figure 1 shows
ment of sensor networks. However, FBSR aims to be adapt- the curve of the energy level evaluation function, where
able to the dynamic variance of sensor networks. Feedback, both consumed energy and threshold is denoted by the per-
included in the MAC layer ack frame, is the representative centage by the initial energy on the nodes. FBSR uses
of both the node capacity and the quality of wireless link, this threshold mechanism different from Different from
and also incurs non extra beacon exchanges. GEAR [9] because we believe that when the energy prob-
Some secure routing protocols [4] [5] based on symmet- lem is not severe, excessive consideration of the energy will
ric key cryptography have been proposed for ad-hoc net- definitely lead to the choice of a longer route and thus con-
works. Because they are too expensive in terms of node sume more energy of the whole network. And our feed-
state and packet overhead, they are not suitable for sensor back evaluation function is: i (hqhuj| ohyho> glvwdqfh) =
networks. Many protocols [6] [7] exploit the potential ca- hqhuj| ohyho × (G G0 ), where G and G0 are the dis-
pacity of base station to achieve security goals. SPINS [6] tance from source and from this node to the destination
introduces two low-level secure building blocks, SNEP and respectively. The bigger the evaluation value, the higher
W HVOD. INSENS [7] employs the one-way authenti- priority the neighbor node represents. Only when the con-
cation mechanism to authenticate any information sent by sumed energy exceeds the threshold does the evaluation
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA’06)
1550-445X/06 $20.00 © 2006 IEEE
Energy Level
B
S A X D
1.0
C
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA’06)
1550-445X/06 $20.00 © 2006 IEEE
fics, hence resulting in the high occurrence of the link be- D
tween the two nodes in the route trace.
ing the colluding adversaries carrying out the wormhole at- That is Si ruzdug A Si0 ruzdug , which proves that FBSR
tack. On the assumption that base station have enough en- guarantees a higher probability of successfully transmission
ergy supply and is deployed a high power radio, base station than protocols that only choose one neighbor as forwarding
can broadcast the malicious nodes ID network wide(lines 5– candidate.
8). We can employ the authenticate broadcast scheme called
W HVOD proposed in [6]. Because the base station feed- 3.2. Simulation results
back can reach every node in one hop, the feedback message
with On Way Sequence number in can successfully survive We have already implemented FBSR on NS2 version
the rushing attack [11]. 2.28 [12], a network simulator. Since FBSR integrates rout-
ing and MAC layer, some modifications of 802.11 are need-
ful to make MAC layer decision and feedback possible.
3. Performance evaluation For our basic simulation network topology, we used a
regular q × q grid s with q2 sensor nodes. The communica-
tion radius is set to 2, allowing the nearest eight neighbors
3.1. Approximate Analysis
to be reached. The base station is placed at the right top, and
the sensing area is the four nodes at the left bottom. Figure 3
First we give an approximate analysis of the probability is an example of 5 × 5 grid, where S, A, and B are sensing
of successful transmission, and prove that with our mecha- nodes, D is the base station. Simulation is done with net-
nism higher rank neighbors have higher possibility of being work sized 3 × 3, 10 × 10, 15 × 15, 20 × 20 and 25 × 25.
the next hop. The result also shows that FBSR can tolerate We use the network partition time to evaluate the en-
node failures and guarantees a high probability of success- ergy effectiveness of FBSR and its threshold mechanism.
ful transmission. As in Figure 3, both S, A and B are transmitting sensed
For simplicity, we assume that the loss rates of both data data towards the base station. When node A, B and C are
packet and acknowledgement of all the node pairs are iden- all draining out of energy, the network is partitioned. This
tical. Suppose n denotes the size of neighbor list, sg denotes network partition time is used as the energy metric. In sim-
the data packet loss rate, sd denotes the acknowledgement ulation, transmitting and receiving per packet consume 10
frame loss rate. S (Il ) denotes the probability of neighbor and 8 units energy respectively(this ratio is the observation
ranked the ith forwarding the packet. From some statistical of [13]).
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA’06)
1550-445X/06 $20.00 © 2006 IEEE
1.2 1.3
MFlood threshold=0.5
FBSR threshold=0.1
1.25 threshold=0.0
1
network partition time (normalized)
1.15
0.8
1.1
0.6 1.05
1
0.4
0.95
0.9
0.2
0.85
0 0.8
0 100 200 300 400 500 600 700 0 100 200 300 400 500 600 700
number of nodes number of nodes
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA’06)
1550-445X/06 $20.00 © 2006 IEEE