A sinkhole resilient protocol for wireless sensor networks: Performance and security analysis Articles uri icon

authors

  • LE FESSANT, FABRICE
  • PAPADIMITRIOU, ANTONIS
  • CARNEIRO VIANA, ALINE
  • SENGUL, CIGDEM
  • PALOMAR GONZALEZ, ESTHER

publication date

  • January 2012

start page

  • 234

end page

  • 248

issue

  • 2

volume

  • 35

International Standard Serial Number (ISSN)

  • 0140-3664

Electronic International Standard Serial Number (EISSN)

  • 1873-703X

abstract

  • This work focuses on: (1) understanding the impact of selective forwarding attacks on tree-based routing topologies in wireless sensor networks (WSNs), and (2) investigating cryptography-based strategies to limit network degradation caused by sinkhole attacks. The main motivation of our research stems from the following observations. First, WSN protocols that construct a fixed routing topology may be significantly affected by malicious attacks. Second, considering networks deployed in a difficult to access geographical region, building up resilience against such attacks rather than detection is expected to be more beneficial. We thus first provide a simulation study on the impact of malicious attacks based on a diverse set of parameters, such as the network scale and the position and number of malicious nodes. Based on this study, we propose a single but very representative metric for describing this impact. Second, we present the novel design and evaluation of two simple and resilient topology-based reconfiguration protocols that broadcast cryptographic values. The results of our simulation study together with a detailed analysis of the cryptographic overhead (communication, memory, and computational costs) show that our reconfiguration protocols are practical and effective in improving resilience against sinkhole attacks, even in the presence of collusion.

keywords

  • wireless sensor network; selective-forwarding and sinkhole attacks; resilience; tree-based routing protocols