Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1180345.1180351acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

SIGF: a family of configurable, secure routing protocols for wireless sensor networks

Published: 30 October 2006 Publication History
  • Get Citation Alerts
  • Abstract

    As sensor networks are deployed in adversarial environments and used for critical applications such as battlefield surveillance and medical monitoring, security weaknesses become a big concern. The severe resource constraints of WSNs give rise to the need for resource bound security solutions.In this paper we present SIGF (Secure Implicit Geographic Forwarding), a configurable secure routing protocol family for wireless sensor networks that provides "good enough" security and high performance. By avoiding or limiting shared state, the protocols prevent many common attacks against routing, and contain others to the local neighborhood.SIGF makes explicit the tradeoff between security provided and state which must be stored and maintained. It comprises three protocols, each forming a basis for the next: SIGF-0 keeps no state, but provides probabilistic defenses; SIGF-1 uses local history and reputation to protect against certain attacks; and SIGF-2 uses neighborhood-shared state to provide stronger security guarantees.Our performance evaluation shows that SIGF achieves high packet delivery ratios with low overhead and end-to-end delay. We evaluate the security of SIGF protocols under various security attacks and show that it effectively contains the damage from compromised nodes and defends against black hole, selective forwarding, Sybil, and some denial of service attacks.

    References

    [1]
    B. Blum, T. He, S. Son, and J. Stankovic. IGF: A state-free robust communication protocol for wireless sensor networks. Technical Report CS-2003-11, Univ. of Virginia, Charlottesville, VA, 2003.
    [2]
    H. Chan, A. Perrig, and D. Song. Random key predistribution schemes for sensor networks. In IEEE Symposium on Research in Security and Privacy, pages 197--213, May 2003.
    [3]
    J. Deng, R. Han, and S. Mishra. A performance evaluation of intrusion-tolerant routing in wireless sensor networks. In Proc. IEEE 2nd International Workshop on Information Processing in Sensor Networks (IPSN '03), Apr. 2003.
    [4]
    L. Eschenauer and V. D. Gligor. A key-management scheme for distributed sensor networks. In 9th ACM Conference on Computer and Communications Security, pages 41--47, Nov. 2002.
    [5]
    G. G. Finn. Routing and addressing problems in large metropolitan-scale internetworks. Technical Report ISI/RR-87-180, ISI, Mar. 1987.
    [6]
    Z. J. Haas, M. R. Pearlm, and P. Samar. The Zone Routing Protocol (ZRP) for ad hoc networks. IETF MANET Internet Draft, July 2002.
    [7]
    Y.-C. Hu, D. B. Johnson, and A. Perrig. Secure efficient distance vector routing in mobile wireless ad hoc networks. In Proceedings of the 4th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA), pages 3--13, June 2002.
    [8]
    Y.-C. Hu, A. Perrig, and D. B. Johnson. Ariadne: a secure on-demand routing protocol for ad hoc networks. In Proceedings of the Eighth Annual International Conference on Mobile computing and Networking, pages 12--23, Sept. 2002.
    [9]
    Y.-C. Hu, A. Perrig, and D. B. Johnson. Rushing attacks and defense in wireless ad hoc network routing protocols. In ACM Workshop on Wireless Security (WiSe), pages 30--40, Sept. 2003.
    [10]
    IEEE Computer Society LAN MAN Standards Committee. IEEE Std 802.11: Wireless LAN Medium Access Control and Physical Layer Specifications, Aug. 1999.
    [11]
    D. B. Johnson and D. A. Maltz. Dynamic source routing in ad hoc wireless networks. In Imielinski and Korth, editors, Mobile Computing, volume 353 of The Kluwer International Series in Engineering and Computer Science. Kluwer Academic Publishers, Mar. 1996.
    [12]
    C. Karlof, N. Sastry, and D. Wagner. TinySec: a link layer security architecture for wireless sensor networks. In Proc. of the 2nd International Conference on Embedded Networked Sensor Systems (SenSys'04), pages 162--175, 2004.
    [13]
    C. Karlof and D. Wagner. Secure routing in wireless sensor networks: Attacks and countermeasures. In First IEEE International Workshop on Sensor Network Protocols and Applications, pages 1--15, May 2003.
    [14]
    B. Karp and H. T. Kung. GPSR: Greedy perimeter stateless routing for wireless networks. In Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MOBICOM-00), pages 243--254, Aug. 2000.
    [15]
    Y.-J. Kim, R. Govindan, B. Karp, and S. Shenker. Geographic routing made practical. In Proc. of the USENIX Symposium on Networked Systems Design and Implementation, May 2005.
    [16]
    Y.-B. Ko and N. H. Vaidya. Location-aided routing (LAR) in mobile ad hoc networks. Wireless Networks, 6(4):307--321, 2000.
    [17]
    J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang. Providing robust and ubiquitous security support for mobile ad-hoc networks. In 9th International Conference on Network Protocols (ICNP'01), 2001.
    [18]
    D. Malan, M. Welsh, and M. Smith. A public-key infrastructure for key distribution in Tinyos based on elliptic curve cryptography. In 1st IEEE International Conference on Sensor and Ad Hoc Communications and Networks, pages 71--80, Oct. 2004.
    [19]
    S. Marti, T. Giuli, K. Lai, and M. Baker. Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MOBICOM-00), pages 255--265, Aug. 2000.
    [20]
    J. Newsome, E. Shi, D. Song, and A. Perrig. The sybil attack in sensor networks: analysis & defenses. In Proc. of 3rd IEEE/ACM Information Processing in Sensor Networks (IPSN'04), pages 259--268, Apr. 2004.
    [21]
    P. Papadimitratos and Z. Haas. Secure routing for mobile ad hoc networks. In SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), Jan. 2002.
    [22]
    A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar. SPINS: Security protocols for sensor networks. In Proceedings of Seventh Annual International Conference on Mobile Computing and Networks MOBICOM 2001, pages 189--199, July 2001.
    [23]
    K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding-Royer. A secure routing protocol for ad hoc networks. In Proceedings of the IEEE International Conference on Network Protocols (ICNP), Nov. 2002.
    [24]
    A. D. Wood and J. A. Stankovic. Denial of service in sensor networks. IEEE Computer, 35(10):54--62, Oct. 2002.
    [25]
    M. G. Zapata and N. Asokan. Securing ad hoc routing protocols. In Proc. ACM Workshop on Wireless Security (WiSe), pages 1--10. ACM Press, 2002.
    [26]
    L. Zhou and Z. J. Haas. Securing ad hoc networks. IEEE Network, 13(6):24--30, 1999.
    [27]
    S. Zhu, S. Setia, and S. Jajodia. LEAP: efficient security mechanisms for large-scale distributed sensor networks. In Proceedings of the 10th ACM Conference on Computer and Communication Security, pages 62--72, 2003.

    Cited By

    View all
    • (2023)Improved Security-Based Model for Heterogeneous Wireless Sensor Networks Using the Dispense Incline Drop AlgorithmIETE Journal of Research10.1080/03772063.2023.2284952(1-13)Online publication date: 3-Dec-2023
    • (2022)Advancements in Data Security and Privacy Techniques Used in IoT-Based Hospital ApplicationsResearch Anthology on Securing Medical Systems and Records10.4018/978-1-6684-6311-6.ch030(662-684)Online publication date: 3-Jun-2022
    • (2021)Internet of things: Architecture and enabling technologiesMaterials Today: Proceedings10.1016/j.matpr.2020.04.67834(719-735)Online publication date: 2021
    • Show More Cited By

    Index Terms

    1. SIGF: a family of configurable, secure routing protocols for wireless sensor networks

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      SASN '06: Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
      October 2006
      186 pages
      ISBN:1595935541
      DOI:10.1145/1180345
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 30 October 2006

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. secure routing
      2. wireless sensor network

      Qualifiers

      • Article

      Conference

      CCS06
      Sponsor:

      Upcoming Conference

      CCS '24
      ACM SIGSAC Conference on Computer and Communications Security
      October 14 - 18, 2024
      Salt Lake City , UT , USA

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)2
      • Downloads (Last 6 weeks)0
      Reflects downloads up to

      Other Metrics

      Citations

      Cited By

      View all
      • (2023)Improved Security-Based Model for Heterogeneous Wireless Sensor Networks Using the Dispense Incline Drop AlgorithmIETE Journal of Research10.1080/03772063.2023.2284952(1-13)Online publication date: 3-Dec-2023
      • (2022)Advancements in Data Security and Privacy Techniques Used in IoT-Based Hospital ApplicationsResearch Anthology on Securing Medical Systems and Records10.4018/978-1-6684-6311-6.ch030(662-684)Online publication date: 3-Jun-2022
      • (2021)Internet of things: Architecture and enabling technologiesMaterials Today: Proceedings10.1016/j.matpr.2020.04.67834(719-735)Online publication date: 2021
      • (2020)ONGOING CHALLENGES AND RESEARCH OPPORTUNITIES IN INTERNET OF THINGS (IOT)International Journal of Engineering Technologies and Management Research10.29121/ijetmr.v5.i2.2018.6475:2(216-222)Online publication date: 2-May-2020
      • (2020)An Enhanced Trust Based Fuzzy Implicit Cross-Layer Protocol for Wireless Sensor NetworksInventive Communication and Computational Technologies10.1007/978-981-15-0146-3_98(1015-1028)Online publication date: 30-Jan-2020
      • (2019)Advancements in Data Security and Privacy Techniques Used in IoT-Based Hospital ApplicationsMedical Data Security for Bioengineers10.4018/978-1-5225-7952-6.ch010(185-207)Online publication date: 2019
      • (2019)Internet of things architectures: do organizational strategies matters?Business Process Management Journal10.1108/BPMJ-03-2018-0092Online publication date: 17-Jun-2019
      • (2019)Towards overhead mitigation in state-free geographic forwarding protocols for wireless sensor networksWireless Networks10.1007/s11276-017-1651-625:3(1017-1030)Online publication date: 1-Apr-2019
      • (2019)Security Issues of Internet of Things in Health-Care Sector: An Analytical ApproachAdvancement of Machine Intelligence in Interactive Medical Image Analysis10.1007/978-981-15-1100-4_15(307-329)Online publication date: 12-Dec-2019
      • (2018)Cyber Security Challenges of Deploying IoT in Smart Cities for Healthcare Applications2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)10.1109/W-FiCloud.2018.00028(140-145)Online publication date: Aug-2018
      • Show More Cited By

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media