Resilient networking in wireless sensor networks

Reading time: 7 minute
...

📝 Original Info

  • Title: Resilient networking in wireless sensor networks
  • ArXiv ID: 1003.5104
  • Date: 2010-03-29
  • Authors: Researchers from original ArXiv paper

📝 Abstract

This report deals with security in wireless sensor networks (WSNs), especially in network layer. Multiple secure routing protocols have been proposed in the literature. However, they often use the cryptography to secure routing functionalities. The cryptography alone is not enough to defend against multiple attacks due to the node compromise. Therefore, we need more algorithmic solutions. In this report, we focus on the behavior of routing protocols to determine which properties make them more resilient to attacks. Our aim is to find some answers to the following questions. Are there any existing protocols, not designed initially for security, but which already contain some inherently resilient properties against attacks under which some portion of the network nodes is compromised? If yes, which specific behaviors are making these protocols more resilient? We propose in this report an overview of security strategies for WSNs in general, including existing attacks and defensive measures. In this report we focus at the network layer in particular, and an analysis of the behavior of four particular routing protocols is provided to determine their inherent resiliency to insider attacks. The protocols considered are: Dynamic Source Routing (DSR), Gradient-Based Routing (GBR), Greedy Forwarding (GF) and Random Walk Routing (RWR).

💡 Deep Analysis

Deep Dive into Resilient networking in wireless sensor networks.

This report deals with security in wireless sensor networks (WSNs), especially in network layer. Multiple secure routing protocols have been proposed in the literature. However, they often use the cryptography to secure routing functionalities. The cryptography alone is not enough to defend against multiple attacks due to the node compromise. Therefore, we need more algorithmic solutions. In this report, we focus on the behavior of routing protocols to determine which properties make them more resilient to attacks. Our aim is to find some answers to the following questions. Are there any existing protocols, not designed initially for security, but which already contain some inherently resilient properties against attacks under which some portion of the network nodes is compromised? If yes, which specific behaviors are making these protocols more resilient? We propose in this report an overview of security strategies for WSNs in general, including existing attacks and defensive measures

📄 Full Content

arXiv:1003.5104v1 [cs.NI] 26 Mar 2010 ISSN 0249-6399 ISRN INRIA/RR--7230--FR+ENG Thème COM INSTITUT NATIONAL DE RECHERCHE EN INFORMATIQUE ET EN AUTOMATIQUE Resilient networking for wireless sensor networks Ochirkhand Erdene-Ochir, Marine Minier, Fabrice Valois and Apostolos Kountouris N° 7230 December 2009 Unité de recherche INRIA Rhône-Alpes 655, avenue de l’Europe, 38334 Montbonnot Saint Ismier (France) Téléphone : +33 4 76 61 52 00 — Télécopie +33 4 76 61 52 52 Resilient networking for wireless sensor networks Ochirkhand Erdene-Ochir, Marine Minier, Fabrice Valois and Apostolos Kountouris Thème COM — Systèmes communicants Projet SWING Rapport de recherche n° 7230 — December 2009 — 34 pages Abstract: This report deals with security in wireless sensor networks (WSNs), especially in network layer. Multiple secure routing protocols have been proposed in the literature. However, they often use the cryptography to secure routing functionalities. The cryptography alone is not enough to defend against multiple attacks due to the node compromise. Therefore, we need more algorithmic solutions. In this report, we focus on the behavior of routing protocols to determine which properties make them more resilient to attacks. Our aim is to find some answers to the following questions. Are there any existing protocols, not designed initially for security, but which already contain some inherently resilient properties against attacks under which some portion of the network nodes is compromised? If yes, which specific behaviors are making these protocols more resilient? We propose in this report an overview of security strategies for WSNs in general, including existing attacks and defensive measures. In this report we focus at the network layer in particular, and an analysis of the behavior of four particular routing protocols is provided to determine their inherent resiliency to insider attacks. The protocols considered are: Dynamic Source Routing (DSR), Gradient-Based Routing (GBR), Greedy Forwarding (GF) and Random Walk Routing (RWR). Key-words: security, wireless sensor networks, survey, resiliency, attacks. Protocoles de communication résilients pour les réseaux de capteurs sans fil Résumé : Dans ce rapport nous traitons la sécurité dans les réseaux de capteurs sans fils (WSNs), plus particulièrement à la couche réseau. Dans la littérature, nombreuses propositions tentent de résoudre ces problèmes de sécurité, en utilisant notamment la cryptographie. Cette dernière permet de résoudre les problèmes classiques d’authenticité, de confidentialité et d’intégrité de données. Ainsi, la cryptographie permet d’obtenir une sécurité de base, mais ne permet pas de se prémunir contre les attaques internes quand une partie des noeuds simples sont corrompus. Par conséquent, nous avons besoin des solutions algorithmiques pour compléter. Notre objectif est de trouver des réponses aux questions suivantes. Existent-ils, les protocoles non conçus initialement pour la sécurité, mais qui contiennent déjà certaines propriétés intrinsèquement résilients contre les attaques internes? Si oui, quels comportements spécifiques les rendent plus résilient? Ce travail donnera lieu à deux contributions : i) tout d’abord un survol des stratégies de sécurité en général dans WSNs et au couche réseau (modèle OSI) en particulier, puis ii) une étude sur le comportement de protocoles de routage dans les réseaux de capteurs soumis à des attaques réseaux. Les protocoles considérés sont: Dynamic Source Routing (DSR), Gradient-Based Routing (GBR), Greedy Forwarding (GF) et Random Walk Routing (RWR). Mots-clés : sécurité, réseaux de capteurs, attaques, survol, résilience. Resilient networking in wireless sensor networks 3 Contents 1 Introduction 4 1.1 Report outline . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 2 Related work 6 2.1 Attacks and defensive measures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 2.1.1 Ontology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 2.1.2 Hardware attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 2.1.3 Physical layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 2.1.4 Link layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 2.1.5 Routing layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 2.1.6 Application layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 2.2 Network layer security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 2.2.1 Security associations (Key management) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 2.2.2 Naming and addressing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 2.2.3 Neighborhood discovery

…(Full text truncated)…

📸 Image Gallery

cover.png page_2.webp page_3.webp

Reference

This content is AI-processed based on ArXiv data.

Start searching

Enter keywords to search articles

↑↓
ESC
⌘K Shortcut