1st International ICST Conference on Communications and Networking in China

Research Article

Secure and Energy Aware Routing Against Wormholes and Sinkholes in Wireless Sensor Networks

  • @INPROCEEDINGS{10.1109/CHINACOM.2006.344677,
        author={H.  Al Nahas, and  J.S.  Deogun and E.D.   Manley },
        title={Secure and Energy Aware Routing Against Wormholes and Sinkholes in Wireless Sensor Networks},
        proceedings={1st International ICST Conference on Communications and Networking in China},
        publisher={IEEE},
        proceedings_a={CHINACOM},
        year={2007},
        month={4},
        keywords={},
        doi={10.1109/CHINACOM.2006.344677}
    }
    
  • H. Al Nahas,
    J.S. Deogun
    E.D. Manley
    Year: 2007
    Secure and Energy Aware Routing Against Wormholes and Sinkholes in Wireless Sensor Networks
    CHINACOM
    IEEE
    DOI: 10.1109/CHINACOM.2006.344677
H. Al Nahas,1, J.S. Deogun1, E.D. Manley 1
  • 1: Dept. of Comput. Sci. & Eng., Nebraska-Lincoln Univ., Lincoln, NE

Abstract

Sensor networks are deployed in a variety of environments for unattended operation. In a hostile terrain, sensor nodes are vulnerable to node capture and cryptographic material compromise. Compromised nodes can be used to launch wormhole and sinkhole attacks in order to prevent sensitive data from reaching intended destinations. Our objective in this paper is to mitigate the impact of undetected compromised nodes on routing. To this end, we develop metrics to quantify risk of paths in a network. We then introduce a novel routing approach: secure-path routing (SPR) that uses expected path risk as a parameter in routing. Quantified path risk values are used in routing to reduce traffic flow over nodes that have high expected vulnerability. Selecting low risk routes may lead to the choice of energy-expensive routes. Thus, we develop algorithms for balancing risk with other path selection parameters, including energy consumption. We conduct simulation experiments to evaluate the effectiveness of our approach and study the tradeoff between security and energy. Simulation shows that SPR can be quite effective at increasing traffic flow over legitimate routes and that the impact of SPR on network lifetime is negligible.