Cryptographic Protocols to Fight Sinkhole Attacks on Tree-based Routing in Wireless Sensor Networks
Autor: | Aline Carneiro Viana, Anthonis Papadimitriou, Cigdem Sengul, Fabrice Le Fessant |
---|---|
Přispěvatelé: | As Scalable As Possible: foundations of large scale dynamic distributed systems (ASAP), Université de Rennes 1 (UR1), Université de Rennes (UNIV-RENNES)-Université de Rennes (UNIV-RENNES)-Inria Saclay - Ile de France, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National des Sciences Appliquées (INSA)-Centre National de la Recherche Scientifique (CNRS), Technische Universität Berlin (TU), Université de Rennes (UR)-Inria Saclay - Ile de France, Technical University of Berlin / Technische Universität Berlin (TU) |
Jazyk: | angličtina |
Rok vydání: | 2009 |
Předmět: |
Routing protocol
Engineering 0211 other engineering and technologies 02 engineering and technology Computer security computer.software_genre Network topology [INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI] 0202 electrical engineering electronic engineering information engineering Resilience (network) resilience 021110 strategic defence & security studies business.industry tree-based routing protocols ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS 020206 networking & telecommunications Fault tolerance Cryptographic protocol Link-state routing protocol selective-forwarding and sinkhole attacks Routing (electronic design automation) business Wireless sensor network computer Computer network |
Zdroj: | 5th Workshop on Secure Network Protocols (NPSec) 5th Workshop on Secure Network Protocols (NPSec), Oct 2009, Princeton, United States |
Popis: | International audience; This work introduces two new cryptographic protocols of different complexity and strength in limiting network degradation caused by sinkhole attacks on tree-based routing topologies in Wireless Sensor Networks (WSNs). The main goal of both protocols is to provide continuous operation by improving resilience against, rather than detection of, these attacks. The main benefit of providing resilience is that it allows operating (or graceful degradation) in the presence of attacks. Furthermore, while resilience mechanisms do not dismiss detection mechanisms, detection mechanisms often introduce more complexity and so, more weaknesses to the system, which might not justify their benefits. We provide a simulation study of the two protocols for three different routing protocols, that encompass typical routing strategies used in WSN. The results of our simulation study show that our cryptographic protocols are effective in improving resilience against sinkhole attacks, even in the presence of some collusion. |
Databáze: | OpenAIRE |
Externí odkaz: |