SOS: Secure Overlay Sensornets (original) (raw)
Related papers
Optimized AODV Routing for Effective Attack Security in Wireless Sensor Networks
Wireless Sensor Networking is one of the most hopeful technologies that have wide range of applications ranging from home surveillance, military to Internet of Things (IoT). Although Wireless Sensor Networks (WSNs) have attractive features like: less deployment cost and least attended network operation, the security of such networks is a big concern especially when such networks are deployed for critical applications. Therefore, in order to securely operate the WSNs, any kind of intrusions should be determined before attackers can affect the network. In a type of WSNs, multiple nodes would send sensor readings to a base station (Sink) for further processing. Such a many-to-one communication is highly vulnerable to a sinkhole attack. In this attack an attacker replies with false routing information, to the nodes that want to communicate (send information to sink). This attack is a serious threat to WSNs, because the nodes are generally deployed in open areas and have weak computation and battery power. In this paper a survey of the state-of-the-art in ‘attacks and counter measures’ (Intrusion Detection Systems) that are proposed for WSNs are presented. Finally, this work suggests the Optimized AODV Routing with “Alert based” technique to enhance the security of WSNs from sinkhole like attacks. The same is achieved by implementing four processes: Setup process, Identifying attacker, Eliminating it, and Optimizing the route. It is promising that, this technique is improving the QoS parameters like Delay and Packet Delivery Fraction in WSNs, while detecting and eliminating the malicious node efficiently. The work quantitatively analyze some of the desirable properties of WSNs routing protocols to craft a more secure and reliable WSNs. For simulation purpose, famous Network Simulator version (ns – 2.33) is used.
A Secure Routing Protocol for Wireless Sensor Networks
Proceedings of the International Conference on Computational Sciences and its Applications (ICCSA), Fukuaka, Japan, Springer LNCS Vol 6018, pp. 277-290, March 2010, 2010
Wireless sensor networking has been a subject of extensive research efforts in the recent years, and has been well recognized as a ubiquitous and general approach for some emerging applications such as a real-time traffic monitoring, ecosystem and battlefield surveillance. Since these networks deal with sensitive data, it is imperative that they are made secure against various types of attacks such as node capture, physical tampering, eavesdropping, denial of service etc. This paper presents a secure routing mechanism for wireless sensor networks. The protocol is resilient in the presence of malicious nodes that may launch selective packet dropping attack on the routing path. The scheme employs single-path routing, and therefore, it is energy-efficient. While the packets are forwarded towards the base station, if any node fails to forward a packet, it is isolated immediately. Packets are then routed around the node. Simulation conducted on the scheme clearly demonstrates that it is more efficient than some of the existing similar schemes.
Secure Routing to Prevent Sybil Attack in Sensor Networks
2013
Evaluation of Wireless Sensor Networks (WSN) for performance evaluation is a popular research area and a wealth of literature exists in this area. Denial-of-Service (DoS) attacks are recognized as one of the most serious threats due to the resources constrained property in WSN. The Zigbee model provided in OPNET 16 is suitable for modelling WSNs. This paper presents an evaluation of the impact of DoS attacks on the performances of Wireless Sensor Networks by using the OPNET modeller. Numerical results, discussions and comparisons are provided for various simulation scenarios. The results can be of great help for optimisation studies in WSN environments under DoS attacks as well as understanding the severity and critical nodes within the WSN. The effects of DoS attacks on the performance of WSNs are considered to critically analyse these issues.
SECURE AND EFFICIENT ROUTING SCHEMES AND THEIR DESIGN CHALLENGES IN WIRELESS SENSOR NETWORKS
IAEME PUBLICATION, 2021
WSNs are vulnerable to a wide range of security threats, and security is crucial in facilitating secure communication. The rapid growth of wireless communication and related fields has re-energized academia-industry collaboration to develop more secure and efficient routing strategies. Because WSN nodes have limited energy, they frequently die, resulting in pre-mature link outages, data loss, retransmission delays, and low battery. The existence of a malicious node in the network has a negative impact on network performance. Secure routing protocols, which can transfer packets using secure paths, are required to protect WSNs from security attacks and malware. Since security important in WSN, Various secure routing protocols are developed to improve packet transmission efficiency. Different schemes for providing security are Cryptography, Intrusion detection, and Secure routing. This paper aims to study various routing mechanisms that offer secure and robust packet transmission from source to destination. Finally, the paper contributes to discussing the difficulties in developing a routing protocol for WSNs that considers the interdependency of various network parameters.
New Trends in Secure Routing Protocols for Wireless Sensor Networks
International Journal of Distributed Sensor Networks, 2013
Recently, Wireless Sensor Networks (WSNs) have been deployed into a variety of applications including homeland security, military systems, and health care. Sensor nodes deployed in such networks are subject to several attacks such as sinkhole and select forwarding, wormhole, Hello flood, and replication attacks. Therefore, developing secure and energy-efficient routing protocols to protect WSNs against these attacks while efficiently utilizing the energy of the deployed nodes has become imperative. Several routing protocols have been proposed in the literature for WSNs. Most of these protocols assume static nodes and sinks to collect data from network fields. However, they may be highly movable, and recent advances show that mobile sensors in WSNs have a promising performance. Therefore, this paper surveys the state of the art on routing protocols related to WSNs and presents the security issues or problems associated with the current protocols as well as discusses the future trends...