📝 Original Info
- Title: Resilient networking in wireless sensor networks
- ArXiv ID: 1003.5104
- Date: 2010-03-29
- Authors: Researchers from original ArXiv paper
📝 Abstract
This report deals with security in wireless sensor networks (WSNs), especially in network layer. Multiple secure routing protocols have been proposed in the literature. However, they often use the cryptography to secure routing functionalities. The cryptography alone is not enough to defend against multiple attacks due to the node compromise. Therefore, we need more algorithmic solutions. In this report, we focus on the behavior of routing protocols to determine which properties make them more resilient to attacks. Our aim is to find some answers to the following questions. Are there any existing protocols, not designed initially for security, but which already contain some inherently resilient properties against attacks under which some portion of the network nodes is compromised? If yes, which specific behaviors are making these protocols more resilient? We propose in this report an overview of security strategies for WSNs in general, including existing attacks and defensive measures. In this report we focus at the network layer in particular, and an analysis of the behavior of four particular routing protocols is provided to determine their inherent resiliency to insider attacks. The protocols considered are: Dynamic Source Routing (DSR), Gradient-Based Routing (GBR), Greedy Forwarding (GF) and Random Walk Routing (RWR).
💡 Deep Analysis
Deep Dive into Resilient networking in wireless sensor networks.
This report deals with security in wireless sensor networks (WSNs), especially in network layer. Multiple secure routing protocols have been proposed in the literature. However, they often use the cryptography to secure routing functionalities. The cryptography alone is not enough to defend against multiple attacks due to the node compromise. Therefore, we need more algorithmic solutions. In this report, we focus on the behavior of routing protocols to determine which properties make them more resilient to attacks. Our aim is to find some answers to the following questions. Are there any existing protocols, not designed initially for security, but which already contain some inherently resilient properties against attacks under which some portion of the network nodes is compromised? If yes, which specific behaviors are making these protocols more resilient? We propose in this report an overview of security strategies for WSNs in general, including existing attacks and defensive measures
📄 Full Content
arXiv:1003.5104v1 [cs.NI] 26 Mar 2010
ISSN 0249-6399
ISRN INRIA/RR--7230--FR+ENG
Thème COM
INSTITUT NATIONAL DE RECHERCHE EN INFORMATIQUE ET EN AUTOMATIQUE
Resilient networking for wireless sensor networks
Ochirkhand Erdene-Ochir, Marine Minier, Fabrice Valois and Apostolos Kountouris
N° 7230
December 2009
Unité de recherche INRIA Rhône-Alpes
655, avenue de l’Europe, 38334 Montbonnot Saint Ismier (France)
Téléphone : +33 4 76 61 52 00 — Télécopie +33 4 76 61 52 52
Resilient networking for wireless sensor networks
Ochirkhand Erdene-Ochir, Marine Minier, Fabrice Valois and Apostolos Kountouris
Thème COM — Systèmes communicants
Projet SWING
Rapport de recherche n° 7230 — December 2009 — 34 pages
Abstract:
This report deals with security in wireless sensor networks (WSNs), especially in network layer. Multiple
secure routing protocols have been proposed in the literature. However, they often use the cryptography to
secure routing functionalities. The cryptography alone is not enough to defend against multiple attacks due to
the node compromise. Therefore, we need more algorithmic solutions.
In this report, we focus on the behavior of routing protocols to determine which properties make them more
resilient to attacks. Our aim is to find some answers to the following questions. Are there any existing protocols,
not designed initially for security, but which already contain some inherently resilient properties against attacks
under which some portion of the network nodes is compromised? If yes, which specific behaviors are making
these protocols more resilient?
We propose in this report an overview of security strategies for WSNs in general, including existing attacks
and defensive measures. In this report we focus at the network layer in particular, and an analysis of the behavior
of four particular routing protocols is provided to determine their inherent resiliency to insider attacks. The
protocols considered are: Dynamic Source Routing (DSR), Gradient-Based Routing (GBR), Greedy Forwarding
(GF) and Random Walk Routing (RWR).
Key-words:
security, wireless sensor networks, survey, resiliency, attacks.
Protocoles de communication résilients pour les réseaux de capteurs
sans fil
Résumé :
Dans ce rapport nous traitons la sécurité dans les réseaux de capteurs sans fils (WSNs), plus particulièrement
à la couche réseau. Dans la littérature, nombreuses propositions tentent de résoudre ces problèmes de sécurité, en
utilisant notamment la cryptographie. Cette dernière permet de résoudre les problèmes classiques d’authenticité,
de confidentialité et d’intégrité de données. Ainsi, la cryptographie permet d’obtenir une sécurité de base, mais
ne permet pas de se prémunir contre les attaques internes quand une partie des noeuds simples sont corrompus.
Par conséquent, nous avons besoin des solutions algorithmiques pour compléter.
Notre objectif est de trouver des réponses aux questions suivantes. Existent-ils, les protocoles non conçus
initialement pour la sécurité, mais qui contiennent déjà certaines propriétés intrinsèquement résilients contre les
attaques internes? Si oui, quels comportements spécifiques les rendent plus résilient?
Ce travail donnera lieu à deux contributions : i) tout d’abord un survol des stratégies de sécurité en général
dans WSNs et au couche réseau (modèle OSI) en particulier, puis ii) une étude sur le comportement de protocoles
de routage dans les réseaux de capteurs soumis à des attaques réseaux. Les protocoles considérés sont: Dynamic
Source Routing (DSR), Gradient-Based Routing (GBR), Greedy Forwarding (GF) et Random Walk Routing
(RWR).
Mots-clés :
sécurité, réseaux de capteurs, attaques, survol, résilience.
Resilient networking in wireless sensor networks
3
Contents
1
Introduction
4
1.1
Report outline
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
6
2
Related work
6
2.1
Attacks and defensive measures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
6
2.1.1
Ontology
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
6
2.1.2
Hardware attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
6
2.1.3
Physical layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
7
2.1.4
Link layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
8
2.1.5
Routing layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
9
2.1.6
Application layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
13
2.2
Network layer security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
14
2.2.1
Security associations (Key management) . . . . . . . . . . . . . . . . . . . . . . . . . . . .
14
2.2.2
Naming and addressing
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
15
2.2.3
Neighborhood discovery
…(Full text truncated)…
📸 Image Gallery
Reference
This content is AI-processed based on ArXiv data.