INSENS: Intrusion-tolerant routing for wireless sensor networks
- UNCG Author/Contributor (non-UNCG co-authors, if there are any, appear on document)
- Jing Deng, Assistant Professor (Creator)
- Institution
- The University of North Carolina at Greensboro (UNCG )
- Web Site: http://library.uncg.edu/
Abstract: This paper describes an INtrusion-tolerant routing protocol for wireless SEnsor NetworkS (INSENS). INSENS securely and efficiently constructs tree-structured routing for wireless sensor networks (WSNs). The key objective of an INSENS network is to tolerate damage caused by an intruder who has compromised deployed sensor nodes and is intent on injecting, modifying, or blocking packets. To limit or localize the damage caused by such an intruder, INSENS incorporates distributed lightweight security mechanisms, including efficient one-way hash chains and nested keyed message authentication codes that defend against wormhole attacks, as well as multipath routing. Adapting to WSN characteristics, the design of INSENS also pushes complexity away from resource-poor sensor nodes towards resource-rich base stations. An enhanced single-phase version of INSENS scales to large networks, integrates bidirectional verification to defend against rushing attacks, accommodates multipath routing to multiple base stations, enables secure joining/leaving, and incorporates a novel pairwise key setup scheme based on transitory global keys that is more resilient than LEAP. Simulation results are presented to demonstrate and assess the tolerance of INSENS to various attacks launched by an adversary. A prototype implementation of INSENS over a network of MICA2 motes is presented to evaluate the cost incurred.
INSENS: Intrusion-tolerant routing for wireless sensor networks
PDF (Portable Document Format)
476 KB
Created on 2/21/2011
Views: 4800
Additional Information
- Publication
- Computer Communications, vol. 29(2), pp. 216-230.
- Language: English
- Date: 2006
- Keywords
- Sensor network, Security, Intrusion tolerance, Fault tolerance, Secure routing