Skip to main content

Exploiting Routing Tree Construction in CTP

  • Conference paper
Information Security Applications (WISA 2011)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7115))

Included in the following conference series:

Abstract

Sensor nodes in a Wireless Sensor Network (WSN) are scattered in an environment to collect data. These nodes are limited in resources and cannot process the collected data or store it for long periods of time. Thus, the sensor nodes rely on routing protocols to relay the collected data wirelessly to a central controller for analysis and storage. However, the routing protocols are not immune against malicious nodes because they sacrifice the security aspect to meet the limited resources of the sensor nodes. In this paper, we demonstrate how a malicious node can exploit the computation of link qualities in the Collection Tree routing Protocol (CTP) to disrupt the construction of routing trees. We propose a lightweight detection system to detect this malicious node. The proposed detection system is implemented and evaluated using the network simulator ns-2. The simulation results show that the detection system provides a robust detection.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless Sensor Networks: A Survey. Computer Networks 38(4), 393–422 (2002)

    Article  Google Scholar 

  2. Al-Karaki, J.N., Kamal, A.E.: Routing Techniques in Wireless Sensor Networks: A Survey. IEEE Wireless Communications 11(6), 6–28 (2004)

    Article  Google Scholar 

  3. Couto, D.S.J.D., Aguayo, D., Bicket, J., Morris, R.: A High-Throughput Path Metric for MultiHop Wireless Routing. In: Proceedings of the 9th Annual International Conference on Mobile Computing and Networking (MobiCom), pp. 134–146. ACM, New York (2003)

    Google Scholar 

  4. de Graaf, R., Hegazy, I., Horton, J., Safavi-Naini, R.: Distributed Detection of Wormhole Attacks in Wireless Sensor Networks. In: Zheng, J., Mao, S., Midkiff, S.F., Zhu, H. (eds.) ADHOCNETS 2009. LNICST, vol. 28, pp. 208–223. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  5. Fonseca, R., Gnawali, O., Jamieson, K., Kim, S., Levis, P., Woo, A.: TinyOS Enhancement Proposal (TEP) 123: The Collection Tree Protocol (CTP) (August 2006)

    Google Scholar 

  6. Fonseca, R., Gnawali, O., Jamieson, K., Levis, P.: TinyOS Enhancement Proposal (TEP) 119: Collection (February 2006)

    Google Scholar 

  7. Gnawali, O., Fonseca, R., Jamieson, K., Moss, D., Levis, P.: Collection Tree Protocol. In: Proceedings of the 7th ACM Conference on Embedded Networked Sensor Systems (SenSys), pp. 1–14. ACM Press, New York (2009)

    Chapter  Google Scholar 

  8. Hegazy, I., Safavi-Naini, R., Williamson, C.: Towards Securing MintRoute in Wireless Sensor Networks. In: Proceedings of the 2010 IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (WoWMoM), pp. 1–6. IEEE (2010)

    Google Scholar 

  9. Krontiris, I., Benenson, Z., Giannetsos, T., Freiling, F.C., Dimitriou, T.: Cooperative Intrusion Detection in Wireless Sensor Networks. In: Roedig, U., Sreenan, C.J. (eds.) EWSN 2009. LNCS, vol. 5432, pp. 263–278. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  10. Krontiris, I., Dimitriou, T., Giannetsos, T., Mpasoukos, M.: Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks. In: Kutyłowski, M., Cichoń, J., Kubiak, P. (eds.) ALGOSENSORS 2007. LNCS, vol. 4837, pp. 150–161. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  11. Krontiris, I., Giannetsos, T., Dimitriou, T.: LIDeA: A Distributed Lightweight Intrusion Detection Architecture for Sensor Networks. In: Proceedings of the 4th International Conference on Security and Privacy in Communication Networks (SecureComm), pp. 1–10. ACM, New York (2008)

    Chapter  Google Scholar 

  12. Network Simulator, ns-2, http://www.isi.edu/nsnam/ns/

  13. TinyOS, http://www.tinyos.net/

  14. Tseng, C.H., Wang, S.-H., Ko, C., Levitt, K.N.: DEMEM: Distributed Evidence-Driven Message Exchange Intrusion Detection Model for MANET. In: Zamboni, D., Krügel, C. (eds.) RAID 2006. LNCS, vol. 4219, pp. 249–271. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  15. Woo, A., Tong, T., Culler, D.: Taming the Underlying Challenges of Reliable Multihop Routing in Sensor Networks. In: Proceedings of the 1st International Conference on Embedded Networked Sensor Systems (SenSys), pp. 14–27. ACM, New York (2003)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hegazy, I., Safavi-Naini, R., Williamson, C. (2012). Exploiting Routing Tree Construction in CTP. In: Jung, S., Yung, M. (eds) Information Security Applications. WISA 2011. Lecture Notes in Computer Science, vol 7115. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27890-7_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-27890-7_21

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-27889-1

  • Online ISBN: 978-3-642-27890-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics