z-logo
open-access-imgOpen Access
Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes
Author(s) -
T. Shu,
S. Liu,
M. Krunz
Publication year - 2009
Publication title -
ieee infocom 2009
Language(s) - English
Resource type - Conference proceedings
pISSN - 0743-166X
DOI - 10.1109/infcom.2009.5062244
Subject(s) - communication, networking and broadcast technologies , computing and processing
Compromised-node and denial-of-service are two key attacks in wireless sensor networks (WSNs). In this paper, we study routing mechanisms that circumvent (bypass) black holes formed by these attacks. We argue that existing multi-path routing approaches are vulnerable to such attacks, mainly due to their deterministic nature. So once an adversary acquires the routing algorithm, it can compute the same routes known to the source, and hence endanger all information sent over these routes. In this paper, we develop mechanisms that generate randomized multi-path routes. Under our design, the routes taken by the "shares" of different packets change over time. So even if the routing algorithm becomes known to the adversary, the adversary still cannot pinpoint the routes traversed by each packet. Besides randomness, the routes generated by our mechanisms are also highly dispersive and energy-efficient, making them quite capable of bypassing black holes at low energy cost. Extensive simulations are conducted to verify the validity of our mechanisms.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom