Elsevier

Computer Communications

Volume 59, 15 March 2015, Pages 37-51
Computer Communications

SGOR: Secure and scalable geographic opportunistic routing with received signal strength in WSNs

https://doi.org/10.1016/j.comcom.2015.01.003Get rights and content

Abstract

Wireless sensor networks (WSNs) are inherently susceptible to attacks as malicious nodes can disrupt the communication from any other node to the sink. To address a wide range of attacks, we propose a novel and comprehensive approach called Secure and Scalable Geographic Opportunistic Routing with received signal strength (SGOR), satisfying the requirements of both security and scalability in WSNs. Unlike most of previous secure protocols relying on infrastructure like anchor nodes, a distributed location verification algorithm is presented to utilize the received signal strength to address the location spoofing attack. As one of opportunistic geographic routings, SGOR provides the property of robustness by taking full advantage of the broadcast nature of wireless channels, and scalability for being inherited from geographic routing. Moreover, an ambient-sensitive trust model is proposed to defend against more kinds of attackers in SGOR. The theoretical results are given to demonstrate the effectiveness and robustness of SGOR to survive more severe attacks. In extensive simulations, we compare SGOR with four other representative protocols. The results show that SGOR achieves about two times higher packet delivery rate with acceptable overhead, particularly in large and highly hostile networks.

Introduction

Wireless sensor networks (WSNs) have been extensively researched because of the significant advantage brought by infrastructure-less and multi-hop transmissions. Many security issues [1], [2], [3] arise from the nature of such networks, but traditional security mechanisms cannot be applied directly to protect WSNs for their resource constraints. In the case of WSNs, the proposed protocol is expected to be scalable with a large number of nodes and has security protection with minimal resource consumption.

Network routing is an essential service for communication in wireless ad hoc networks and sensor networks. There are many topology based routing protocols such as DSDV [4], AODV [5] and ZRP [6]. However, all of them are potentially the targets of different attacks in the open network environment, and quite vulnerable in the process of route discovery. An adversary may employ various methods to undermine a well-established path so that the data packets would never reach the destination or sink node. Geographic routing (GR), such as GPSR [7], is an attractive approach for sensor networks as no end-to-end route is determined before data transmission. Moreover, each node in the GR only keeps the local one-hop connectivity leading to high efficiency and scalability.

In the case of GR, Karlof et al. [8] discussed the possible routing disruption attacks and countermeasures. They pointed out that location spoofing attack can seriously disrupt a GR protocol as no supervision mechanism was designed to securely verify the node at the location that it claimed. An attacker may exploit this vulnerability to attract sensor nodes to route through it, and then degrade or even deny communication by self-organizing operations. Unfortunately, we cannot use traditional cryptographic methods to prevent this type of attack. Prior works [9], [10] suggest using a number of trusted anchor nodes that cover all the sensor nodes to verify the node’s position. However, relying on such a framework may not be feasible for all types of applications. Our SGOR is distributed and makes use of the Received Signal Strength (RSS) in the physical layer to detect attacks correlated to location information. With the assistance of other sensor nodes, the proposed location verification algorithm prevents a range of location-related attacks on routing by offering nodes the location with possibility.

Furthermore, there are other types of attacks such as dropping attacks. Secure routing protocol should guarantee acceptable packet delivery rate against all the possible adversaries. A lot of studies show that multicast routing provides the redundancy to enhance the robustness in ad hoc networks [11]. Due to the broadcast nature of wireless channel, data packet transmission can be overheard by multiple receivers. If multiple forwarding nodes (or candidates) are selected for the packet, transmission of the packet is not interrupted as long as one candidate successfully relays it. This routing mechanism called opportunistic routing has been proposed in [12], [13], and is deployed in our protocol. In highly volatile networks, the robustness of SGOR can be significantly improved as more candidates are used as backups. Moreover, an ambient-sensitive trust model is integrated in our effective routing metric to copy with the malicious behaviors initiated by the adversaries. Therefore, as per-hop packet transmission in the wireless channel can be instantly controlled by the sender, SGOR defends against a wide range of attacks. Our extensive comparative evolution shows that SGOR outperforms four other protocols (GPSR, ZRP, SEAD [14] and SIGF [15]) with significant advantages. SGOR achieves up to more than 60% packet delivery rate (PDR) when all nodes become gray holes which maliciously drop packets with the possibility of 0.6, about twice the other protocols.

In this paper, we propose a novel routing strategy SGOR, which is an opportunistic routing with the RSS measurements to demonstrate the robustness against various attacks. The main contributions of this paper are summarized as follows:

  • We propose a secure and scalable geographic opportunistic routing protocol, which can be deployed without costly Public Key Infrastructure and can resist a wide range of attacks.

  • Location spoofing attack is detected by cooperated sensor nodes by means of RSS measurements in physical layer. Either the majority voting scheme or prediction scheme is integrated into to address location spoofing attack. We analyze the effectiveness of both schemes in face of different attack intensity.

  • We develop an ambient-sensitive trust model to response to attacks in the routing, combining the indirect trust model and direct trust model. The novelty of the indirect trust model mainly lies in sensor nodes’ cooperative location verification.

  • We use the conception of more candidates for routing to provide redundancy and randomness to significantly enhance the resilience in the hostile environments. We analyze the effect of packets dropping attack on packet delivery rate, and then explain the results brought by the opportunistic routing.

  • Finally, we evaluate the performance of SGOR through security analysis and extensive simulations. It demonstrates that SGOR achieves excellent performance with acceptable overhead under various attacks.

In the rest of this paper, we first describe the related work in Section 2. Section 3 defines the network and security model. We present our protocol in Section 4. The effectiveness, robustness and security analysis of SGOR are performed in Section 5. In Section 6, the performance of the proposed scheme is evaluated. Finally, we conclude our paper in Section 7.

Section snippets

Related work

Specific to the location-related attacks, the characteristics of wireless transmission in the physical layer are recently introduced to verify the location information of nodes. Since the received signal strength is readily available in the wireless device, many researchers have used it for localization [16], [17], [18], tracking [19], [20], [21] and secret key generation [22], [23], [24]. It is also widely used to detect replay attack, location spoofing attack [9] or Sybil attack [25].Several

Network model

We consider a typical wireless sensor network composed of the sinks and a large number of sensor nodes Nn={N0,N1,} randomly deployed in a region with area S. Sinks are trustable and powerful services for collecting data from sensor nodes. Each node is stationary in its location or moves only infrequently and slowly once deployed, and sometimes turns off the transceiver for reducing energy consumption. We assume that the identifier of the sensor ties with the location information. The wireless

The protocol

We give the notations frequently used for the description of SGOR in Table 1.

Analysis

We first conduct the theoretical analysis of the effectiveness of RSS for location spoofing attack, and discuss the robustness of opportunistic routing scheme. Then, we will show that SGOR is resilient to general attacks relevant to any routing protocol.

Performance evaluation

To evaluate the performance of SGOR, we simulate the protocol in a variety of network topologies in OPNET simulator. Apart from SGOR, we have implemented other routing protocols: GPSR, ZRP (mixed with DSDV and AODV protocol), SEAD and SIGF (the version of SIGF-1).

Nodes are placed uniformly at random in the network during the initial stage (100 s in our simulation), and then stationary in the simulated network. We set the number of sinks to be 10, and the common parameters utilized in the

Conclusion

In this paper, we propose a novel Secure and Scalable Geographic Opportunistic Routing (SGOR) protocol to prevent a wide of routing attacks in WSNs. In face of location-related attacks in the geographic routing, both the majority voting scheme and prediction scheme are presented to take advantage of RSS values at physical layer. Moreover, as one of opportunistic routings, SGOR builds an ambient-sensitive trust model and mitigates the malicious behaviors of packets dropping like black hole

Acknowledgment

We would like to thank Professor Prasant Mohapatra, Juanru Li, Zhiqiang Liu and the anonymous reviewers for their helpful comments. This paper was supported by National Natural Science Foundation of China (No. 61472250), National Key Technology R&D Program (No. 2012BAH46B02), Doctoral Fund of Ministry of Education of China (No. 20120073110094), Innovation Programs by Shanghai Municipal Science and Technology Commission (No. 13511504000, No. 14511100300), China Scholarship Council (No.

References (49)

  • C.E. Perkins et al.

    Highly dynamic destination-sequenced distance-vector routing (dsdv) for mobile computers

    SIGCOMM Comput. Commun. Rev.

    (1994)
  • C. Perkins, E. Belding-Royer, S. Das, Ad hoc on-demand distance vector (aodv) routing, Tech. rep.,...
  • Z. Haas, A new routing protocol for the reconfigurable wireless networks, in: Proceedings of the IEEE ICUPC’97, IEEE,...
  • B. Karp et al.

    Gpsr: Greedy perimeter stateless routing for wireless networks

  • M. García-Otero, T. Zahariadis, F. Álvarez, H.C. Leligou, A. Población-Hernández, P. Karkazis, F.J. Casajús-Quirós,...
  • S. Biswas et al.

    Exor: opportunistic multi-hop routing for wireless networks

    SIGCOMM Comput. Commun. Rev.

    (2005)
  • S. Chachulski et al.

    Trading structure for randomness in wireless opportunistic routing

    SIGCOMM Comput. Commun. Rev.

    (2007)
  • A. Wood, L. Fang, J. Stankovic, T. He, Sigf: a family of configurable, secure routing protocols for wireless sensor...
  • N. Patwari et al.

    Locating the nodes: cooperative localization in wireless sensor networks

    IEEE Signal Process. Magaz.

    (2005)
  • R.M. Vaghefi et al.

    Cooperative received signal strength-based sensor localization with unknown transmit powers

    IEEE Trans. Signal Process.

    (2013)
  • H.C. So et al.

    Linear least squares approach for accurate received signal strength based source localization

    IEEE Trans. Signal Process.

    (2011)
  • X. Chen, A. Edelstein, Y. Li, M. Coates, M. Rabbat, A. Men, Sequential monte carlo for simultaneous passive device-free...
  • T. Sathyan et al.

    Fast and accurate cooperative tracking in wireless networks

    IEEE Trans. Mob. Comput.

    (2013)
  • G. Blumrosen et al.

    Enhancing RSSI-based tracking accuracy in wireless sensor networks

    ACM Trans. Sensor Netw. (TOSN)

    (2013)
  • Cited by (29)

    • Opportunistic routing metrics: A timely one-stop tutorial survey

      2020, Journal of Network and Computer Applications
    • A survey and taxonomy on energy management schemes in wireless sensor networks

      2020, Journal of Systems Architecture
      Citation Excerpt :

      So GSSC utilizes the node energy very efficiently and it has been achieved significant increment in network lifetime than the previous policies like PEGASIS and LEACH. C. Lyu et al. [70] in 2015 proposed a unique and comprehensive scheme known as Secure and Scalable-Geographic Opportunistic Routing (SGOR) that develops an algorithm for verification for distributed location with opportunistic geographic routings to address the spoofing or black hole attack by utilizing Received Signal Strength Indicator (RSSI). The SGOR attains about double PDR with acceptable overhead and also avoids cooperation with malicious nodes and sustains a high throughput.

    • EasyGo: Low-cost and robust geographic opportunistic sensing routing in a strip topology wireless sensor network

      2018, Computer Networks
      Citation Excerpt :

      The unstability of the wireless link will lead to the packet loss when relying on the single forwarding node, and the transmission of the whole path will fail. As the combination of the opportunistic and geographic information, the next-hops of the geographic opportunistic routing (GOR) is a set of candidates [6,19]. That means the transmission does not depend on a single forwarding node.

    • On location-privacy in opportunistic mobile networks, a survey

      2018, Journal of Network and Computer Applications
      Citation Excerpt :

      Scalability is an important dimension that shows how the protocol is able to maintain a specified level of service as the network grows (e.g. as the number of nodes increase) or the system load increases (e.g. as the number of obfuscation requests increase). As some solutions in opportunistic networks utilize a distributed approach, they are more scalable compared to traditional networks (Lyu et al., 2015; Valerio et al., 2015). For example, opportunistic networks have been shown to offer a scalable model for the future content-centric Internet (Valerio et al., 2015).

    • Detecting sybil attacks in clustered wireless sensor networks based on energy trust system (ETS)

      2017, Computer Communications
      Citation Excerpt :

      WSNs are used in many applications, including health-care applications, battlefield surveillance, and environmental and habitat monitoring [3]. Typically, sensor nodes are deployed in remote and hostile environments [4], and they are generally not equipped with tamper-resistant hardware [5]. WSNs are vulnerable to various attacks because of their wireless and distributed nature [6,7].

    • Cache-based transport protocols in wireless sensor networks: A survey and future directions

      2017, Journal of Network and Computer Applications
      Citation Excerpt :

      In other words, the routing protocol should be able to define how a loop can be avoided during routing since a TTL field may not exist due to the fact that the IP header does not exist. The optimization of energy efficiency can only be achieved when combining all the three metrics (link quality, hop distance, and cache utilization) in the route evaluation procedure, allowing the system to adapt to a larger diversity of scenarios (Grilo and Heidrich, 2013; Lyu et al., 2015). In this way, when the alternative paths differ significantly in terms of the quality of the links, the link quality metric becomes more relevant for route selection.

    View all citing articles on Scopus
    View full text