全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...
Sensors  2010 

Secure Adaptive Topology Control for Wireless Ad-Hoc Sensor Networks

DOI: 10.3390/s100201251

Keywords: secure communication protocols, adaptive topology control, sensor networks, quarantine region

Full-Text   Cite this paper   Add to My Lib

Abstract:

This paper presents a secure decentralized clustering algorithm for wireless ad-hoc sensor networks. The algorithm operates without a centralized controller, operates asynchronously, and does not require that the location of the sensors be known a priori. Based on the cluster-based topology, secure hierarchical communication protocols and dynamic quarantine strategies are introduced to defend against spam attacks, since this type of attacks can exhaust the energy of sensor nodes and will shorten the lifetime of a sensor network drastically. By adjusting the threshold of infected percentage of the cluster coverage, our scheme can dynamically coordinate the proportion of the quarantine region and adaptively achieve the cluster control and the neighborhood control of attacks. Simulation results show that the proposed approach is feasible and cost effective for wireless sensor networks.

References

[1]  Al-Karaki, J.N.; Kamal, A.E. Routing techniques in wireless sensor networks: A survey. IEEE Wirel. Commun?2004, 11, 6–28.
[2]  Djenouri, D.; Khelladi, L. A survey of security issues in mobile ad hoc and sensor networks. IEEE Commun. Surv. Tutor?2005, 7, 2–28.
[3]  Karlof, C.; Wagner, D. Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Netw?2003, 1, 293–315, doi:10.1016/S1570-8705(03)00008-8.
[4]  Karlof, C.; Sastry, N.; Wagner, D. TinySec: A link layer security architecture for wireless sensor networks. Proceedings of the 2nd international conference on Embedded networked sensor systems, Baltimore, MD, USA, November 3–5, 2004; ACM: New York, NY, USA, 2004; pp. 162–175.
[5]  Yi, S.; Naldurg, P.; Kravets, R. A security-aware routing protocol for wireless ad hoc networks. Proceedings Of ACM Symposium On Mobile Ad Hoc Networking & Computing (MOBIHOC), Lausanne, Switzerland, June 9–11, 2002; pp. 286–292.
[6]  Zhu, S.; Setia, S.; Jajodia, S. LEAP: efficient security mechanisms for large-scale distributed sensor networks. Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS’ 03), Washington, DC, USA, October 27–30, 2003; pp. 62–72.
[7]  Dimitriou, T.; Krontiris, I. A localized, distributed protocol for secure information exchange in sensor networks. Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium, Denver, Colorado, April 3–8, 2005; p. 240a.
[8]  Li, H.; Singhal, M. A secure routing protocol for wireless ad hoc networks. Proceedings of the 39th Hawaii International Conference on System Sciences, Kauai, HI, USA, January 4–7, 2006; 9, p. 225a.
[9]  Wood, A.; Stankovic, J. Denial of service in sensor networks. Computer?2002, 35, 54–62.
[10]  Wood, A.; Stankovic, J.; Son, S. JAM: A jammed-area mapping service for sensor networks. Proceedings of the 24th IEEE International Real-Time Systems Symposium (RTSS’03), Cancun, Mexico, December 3–5, 2003; pp. 286–297.
[11]  Newsome, J.; Shi, E.; Song, D.; Perrig, A. The sybil attack in sensor networks: Analysis & defenses. Proceedings of the third international symposium on Information processing in sensor networks, Berkeley, CA, USA, April 26–27, 2004; pp. 259–268.
[12]  Hu, Y.C.; Perrig, A.; Johnson, D.B. Wormhole detection in wireless ad hoc networks. Rice University Department of Computer Science Technical Report TR01-384, Rice University, Houston, TX, USA; 2002.
[13]  Anderson, R.; Kuhn, M. Tamper resistance - a cautionary note. Proceedings of the Second Usenix Workshop on Electronic Commerce, Oakland, California, November 18–21, 1996; pp. 1–11.
[14]  Roosta, T.; Shieh, S.; Sastry, S. Taxonomy of security attacks in sensor networks and countermeasures. Proceedings of The First IEEE International Conference on System Integration and Reliability Improvements, Hanoi, Vietnam, December, 2006; pp. 13–15.
[15]  Shaikh, R.A.; Jameel, H.; d’Auriol, B.J.; Lee, H.; Lee, S.; Song, Y.-J. Group-based trust management scheme for clustered wireless sensor networks. IEEE Trans. Parall. Distrib. Sys?2009, 20, 1698–1712, doi:10.1109/TPDS.2008.258.
[16]  Chu, K.-T.; Wen, C.-Y.; Ouyang, Y.-C.; Sethares, W. A. Adaptive distributed topology control for wireless ad-hoc sensor networks. Proceedings of 2007 International Conference on Sensor Technologies and Applications (SENSORCOMM 2007), Valencia, Spain, October 14–20, 2007; pp. 378–386.
[17]  Sancak, S.; Cayirci, E.; Coskun, V.; Levi, A. Sensor wars: detecting and defending against spam attacks in wireless sensor networks. Proceedings of IEEE International Conference on Communications, Paris, France, June 20–24, 2004; pp. 3668–3672.
[18]  Coskun, V.; Cayirci, E.; Levi, A.; Sancak, S. Quarantine region scheme to mitigate spam attacks in wireless sensor networks. IEEE Trans. Mobil. Comput?2006, 5, 1074–1086, doi:10.1109/TMC.2006.121.
[19]  Wen, C.-Y.; Sethares, W. A. Automatic decentralized clustering for wireless sensor networks. EURASIP J. Wirel. Commun. Netw?2005, 5, 686–697.
[20]  Perrig, A.; Szewczyk, R.; Tygar, J.D.; Wen, V.; Culler, D. E. SPINS: Security protocols for sensor networks. Wirel. Netw?2002, 8, 521–534, doi:10.1023/A:1016598314198.
[21]  Santi, P. Topology Control in Wireless Ad Hoc and Sensor Networks; John-Wiley & Sons: Chichester, UK, 2005.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133