SGOR: Secure and scalable geographic opportunistic routing with received signal strength in WSNs
Introduction
Wireless sensor networks (WSNs) have been extensively researched because of the significant advantage brought by infrastructure-less and multi-hop transmissions. Many security issues [1], [2], [3] arise from the nature of such networks, but traditional security mechanisms cannot be applied directly to protect WSNs for their resource constraints. In the case of WSNs, the proposed protocol is expected to be scalable with a large number of nodes and has security protection with minimal resource consumption.
Network routing is an essential service for communication in wireless ad hoc networks and sensor networks. There are many topology based routing protocols such as DSDV [4], AODV [5] and ZRP [6]. However, all of them are potentially the targets of different attacks in the open network environment, and quite vulnerable in the process of route discovery. An adversary may employ various methods to undermine a well-established path so that the data packets would never reach the destination or sink node. Geographic routing (GR), such as GPSR [7], is an attractive approach for sensor networks as no end-to-end route is determined before data transmission. Moreover, each node in the GR only keeps the local one-hop connectivity leading to high efficiency and scalability.
In the case of GR, Karlof et al. [8] discussed the possible routing disruption attacks and countermeasures. They pointed out that location spoofing attack can seriously disrupt a GR protocol as no supervision mechanism was designed to securely verify the node at the location that it claimed. An attacker may exploit this vulnerability to attract sensor nodes to route through it, and then degrade or even deny communication by self-organizing operations. Unfortunately, we cannot use traditional cryptographic methods to prevent this type of attack. Prior works [9], [10] suggest using a number of trusted anchor nodes that cover all the sensor nodes to verify the node’s position. However, relying on such a framework may not be feasible for all types of applications. Our SGOR is distributed and makes use of the Received Signal Strength (RSS) in the physical layer to detect attacks correlated to location information. With the assistance of other sensor nodes, the proposed location verification algorithm prevents a range of location-related attacks on routing by offering nodes the location with possibility.
Furthermore, there are other types of attacks such as dropping attacks. Secure routing protocol should guarantee acceptable packet delivery rate against all the possible adversaries. A lot of studies show that multicast routing provides the redundancy to enhance the robustness in ad hoc networks [11]. Due to the broadcast nature of wireless channel, data packet transmission can be overheard by multiple receivers. If multiple forwarding nodes (or candidates) are selected for the packet, transmission of the packet is not interrupted as long as one candidate successfully relays it. This routing mechanism called opportunistic routing has been proposed in [12], [13], and is deployed in our protocol. In highly volatile networks, the robustness of SGOR can be significantly improved as more candidates are used as backups. Moreover, an ambient-sensitive trust model is integrated in our effective routing metric to copy with the malicious behaviors initiated by the adversaries. Therefore, as per-hop packet transmission in the wireless channel can be instantly controlled by the sender, SGOR defends against a wide range of attacks. Our extensive comparative evolution shows that SGOR outperforms four other protocols (GPSR, ZRP, SEAD [14] and SIGF [15]) with significant advantages. SGOR achieves up to more than 60% packet delivery rate (PDR) when all nodes become gray holes which maliciously drop packets with the possibility of 0.6, about twice the other protocols.
In this paper, we propose a novel routing strategy SGOR, which is an opportunistic routing with the RSS measurements to demonstrate the robustness against various attacks. The main contributions of this paper are summarized as follows:
- •
We propose a secure and scalable geographic opportunistic routing protocol, which can be deployed without costly Public Key Infrastructure and can resist a wide range of attacks.
- •
Location spoofing attack is detected by cooperated sensor nodes by means of RSS measurements in physical layer. Either the majority voting scheme or prediction scheme is integrated into to address location spoofing attack. We analyze the effectiveness of both schemes in face of different attack intensity.
- •
We develop an ambient-sensitive trust model to response to attacks in the routing, combining the indirect trust model and direct trust model. The novelty of the indirect trust model mainly lies in sensor nodes’ cooperative location verification.
- •
We use the conception of more candidates for routing to provide redundancy and randomness to significantly enhance the resilience in the hostile environments. We analyze the effect of packets dropping attack on packet delivery rate, and then explain the results brought by the opportunistic routing.
- •
Finally, we evaluate the performance of SGOR through security analysis and extensive simulations. It demonstrates that SGOR achieves excellent performance with acceptable overhead under various attacks.
In the rest of this paper, we first describe the related work in Section 2. Section 3 defines the network and security model. We present our protocol in Section 4. The effectiveness, robustness and security analysis of SGOR are performed in Section 5. In Section 6, the performance of the proposed scheme is evaluated. Finally, we conclude our paper in Section 7.
Section snippets
Related work
Specific to the location-related attacks, the characteristics of wireless transmission in the physical layer are recently introduced to verify the location information of nodes. Since the received signal strength is readily available in the wireless device, many researchers have used it for localization [16], [17], [18], tracking [19], [20], [21] and secret key generation [22], [23], [24]. It is also widely used to detect replay attack, location spoofing attack [9] or Sybil attack [25].Several
Network model
We consider a typical wireless sensor network composed of the sinks and a large number of sensor nodes randomly deployed in a region with area S. Sinks are trustable and powerful services for collecting data from sensor nodes. Each node is stationary in its location or moves only infrequently and slowly once deployed, and sometimes turns off the transceiver for reducing energy consumption. We assume that the identifier of the sensor ties with the location information. The wireless
The protocol
We give the notations frequently used for the description of SGOR in Table 1.
Analysis
We first conduct the theoretical analysis of the effectiveness of RSS for location spoofing attack, and discuss the robustness of opportunistic routing scheme. Then, we will show that SGOR is resilient to general attacks relevant to any routing protocol.
Performance evaluation
To evaluate the performance of SGOR, we simulate the protocol in a variety of network topologies in OPNET simulator. Apart from SGOR, we have implemented other routing protocols: GPSR, ZRP (mixed with DSDV and AODV protocol), SEAD and SIGF (the version of SIGF-1).
Nodes are placed uniformly at random in the network during the initial stage (100 s in our simulation), and then stationary in the simulated network. We set the number of sinks to be 10, and the common parameters utilized in the
Conclusion
In this paper, we propose a novel Secure and Scalable Geographic Opportunistic Routing (SGOR) protocol to prevent a wide of routing attacks in WSNs. In face of location-related attacks in the geographic routing, both the majority voting scheme and prediction scheme are presented to take advantage of RSS values at physical layer. Moreover, as one of opportunistic routings, SGOR builds an ambient-sensitive trust model and mitigates the malicious behaviors of packets dropping like black hole
Acknowledgment
We would like to thank Professor Prasant Mohapatra, Juanru Li, Zhiqiang Liu and the anonymous reviewers for their helpful comments. This paper was supported by National Natural Science Foundation of China (No. 61472250), National Key Technology R&D Program (No. 2012BAH46B02), Doctoral Fund of Ministry of Education of China (No. 20120073110094), Innovation Programs by Shanghai Municipal Science and Technology Commission (No. 13511504000, No. 14511100300), China Scholarship Council (No.
References (49)
- et al.
Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures
J. Netw. Comput. Appl.
(2012) - et al.
Secure routing in wireless sensor networks: attacks and countermeasures
Ad Hoc Netw.
(2003) - et al.
Location verification and trust management for resilient geographic routing
J. Parallel Distrib. Comput.
(2007) - et al.
Review: survey of multipath routing protocols for mobile ad hoc networks
J. Netw. Comput. Appl.
(2009) - et al.
Sead: secure efficient distance vector routing for mobile wireless ad hoc networks
Ad Hoc Netw.
(2003) - et al.
Secure position-based routing protocol for mobile ad hoc networks
Ad Hoc Netw.
(2007) - et al.
Opportunistic routing in wireless sensor networks powered by ambient energy harvesting
Comp. Netw.
(2010) - et al.
Testbed results of an opportunistic routing for multi-robot wireless networks
Comp. Commun.
(2011) - et al.
Security in wireless sensor networks
Commun. ACM
(2004) - et al.
Security in wireless sensor networks
Wireless Commun., IEEE
(2008)
Highly dynamic destination-sequenced distance-vector routing (dsdv) for mobile computers
SIGCOMM Comput. Commun. Rev.
Gpsr: Greedy perimeter stateless routing for wireless networks
Exor: opportunistic multi-hop routing for wireless networks
SIGCOMM Comput. Commun. Rev.
Trading structure for randomness in wireless opportunistic routing
SIGCOMM Comput. Commun. Rev.
Locating the nodes: cooperative localization in wireless sensor networks
IEEE Signal Process. Magaz.
Cooperative received signal strength-based sensor localization with unknown transmit powers
IEEE Trans. Signal Process.
Linear least squares approach for accurate received signal strength based source localization
IEEE Trans. Signal Process.
Fast and accurate cooperative tracking in wireless networks
IEEE Trans. Mob. Comput.
Enhancing RSSI-based tracking accuracy in wireless sensor networks
ACM Trans. Sensor Netw. (TOSN)
Cited by (29)
Opportunistic routing metrics: A timely one-stop tutorial survey
2020, Journal of Network and Computer ApplicationsA survey and taxonomy on energy management schemes in wireless sensor networks
2020, Journal of Systems ArchitectureCitation Excerpt :So GSSC utilizes the node energy very efficiently and it has been achieved significant increment in network lifetime than the previous policies like PEGASIS and LEACH. C. Lyu et al. [70] in 2015 proposed a unique and comprehensive scheme known as Secure and Scalable-Geographic Opportunistic Routing (SGOR) that develops an algorithm for verification for distributed location with opportunistic geographic routings to address the spoofing or black hole attack by utilizing Received Signal Strength Indicator (RSSI). The SGOR attains about double PDR with acceptable overhead and also avoids cooperation with malicious nodes and sustains a high throughput.
EasyGo: Low-cost and robust geographic opportunistic sensing routing in a strip topology wireless sensor network
2018, Computer NetworksCitation Excerpt :The unstability of the wireless link will lead to the packet loss when relying on the single forwarding node, and the transmission of the whole path will fail. As the combination of the opportunistic and geographic information, the next-hops of the geographic opportunistic routing (GOR) is a set of candidates [6,19]. That means the transmission does not depend on a single forwarding node.
On location-privacy in opportunistic mobile networks, a survey
2018, Journal of Network and Computer ApplicationsCitation Excerpt :Scalability is an important dimension that shows how the protocol is able to maintain a specified level of service as the network grows (e.g. as the number of nodes increase) or the system load increases (e.g. as the number of obfuscation requests increase). As some solutions in opportunistic networks utilize a distributed approach, they are more scalable compared to traditional networks (Lyu et al., 2015; Valerio et al., 2015). For example, opportunistic networks have been shown to offer a scalable model for the future content-centric Internet (Valerio et al., 2015).
Detecting sybil attacks in clustered wireless sensor networks based on energy trust system (ETS)
2017, Computer CommunicationsCitation Excerpt :WSNs are used in many applications, including health-care applications, battlefield surveillance, and environmental and habitat monitoring [3]. Typically, sensor nodes are deployed in remote and hostile environments [4], and they are generally not equipped with tamper-resistant hardware [5]. WSNs are vulnerable to various attacks because of their wireless and distributed nature [6,7].
Cache-based transport protocols in wireless sensor networks: A survey and future directions
2017, Journal of Network and Computer ApplicationsCitation Excerpt :In other words, the routing protocol should be able to define how a loop can be avoided during routing since a TTL field may not exist due to the fact that the IP header does not exist. The optimization of energy efficiency can only be achieved when combining all the three metrics (link quality, hop distance, and cache utilization) in the route evaluation procedure, allowing the system to adapt to a larger diversity of scenarios (Grilo and Heidrich, 2013; Lyu et al., 2015). In this way, when the alternative paths differ significantly in terms of the quality of the links, the link quality metric becomes more relevant for route selection.