Abstract
Sensor nodes in a Wireless Sensor Network (WSN) are scattered in an environment to collect data. These nodes are limited in resources and cannot process the collected data or store it for long periods of time. Thus, the sensor nodes rely on routing protocols to relay the collected data wirelessly to a central controller for analysis and storage. However, the routing protocols are not immune against malicious nodes because they sacrifice the security aspect to meet the limited resources of the sensor nodes. In this paper, we demonstrate how a malicious node can exploit the computation of link qualities in the Collection Tree routing Protocol (CTP) to disrupt the construction of routing trees. We propose a lightweight detection system to detect this malicious node. The proposed detection system is implemented and evaluated using the network simulator ns-2. The simulation results show that the detection system provides a robust detection.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless Sensor Networks: A Survey. Computer Networks 38(4), 393–422 (2002)
Al-Karaki, J.N., Kamal, A.E.: Routing Techniques in Wireless Sensor Networks: A Survey. IEEE Wireless Communications 11(6), 6–28 (2004)
Couto, D.S.J.D., Aguayo, D., Bicket, J., Morris, R.: A High-Throughput Path Metric for MultiHop Wireless Routing. In: Proceedings of the 9th Annual International Conference on Mobile Computing and Networking (MobiCom), pp. 134–146. ACM, New York (2003)
de Graaf, R., Hegazy, I., Horton, J., Safavi-Naini, R.: Distributed Detection of Wormhole Attacks in Wireless Sensor Networks. In: Zheng, J., Mao, S., Midkiff, S.F., Zhu, H. (eds.) ADHOCNETS 2009. LNICST, vol. 28, pp. 208–223. Springer, Heidelberg (2010)
Fonseca, R., Gnawali, O., Jamieson, K., Kim, S., Levis, P., Woo, A.: TinyOS Enhancement Proposal (TEP) 123: The Collection Tree Protocol (CTP) (August 2006)
Fonseca, R., Gnawali, O., Jamieson, K., Levis, P.: TinyOS Enhancement Proposal (TEP) 119: Collection (February 2006)
Gnawali, O., Fonseca, R., Jamieson, K., Moss, D., Levis, P.: Collection Tree Protocol. In: Proceedings of the 7th ACM Conference on Embedded Networked Sensor Systems (SenSys), pp. 1–14. ACM Press, New York (2009)
Hegazy, I., Safavi-Naini, R., Williamson, C.: Towards Securing MintRoute in Wireless Sensor Networks. In: Proceedings of the 2010 IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (WoWMoM), pp. 1–6. IEEE (2010)
Krontiris, I., Benenson, Z., Giannetsos, T., Freiling, F.C., Dimitriou, T.: Cooperative Intrusion Detection in Wireless Sensor Networks. In: Roedig, U., Sreenan, C.J. (eds.) EWSN 2009. LNCS, vol. 5432, pp. 263–278. Springer, Heidelberg (2009)
Krontiris, I., Dimitriou, T., Giannetsos, T., Mpasoukos, M.: Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks. In: Kutyłowski, M., Cichoń, J., Kubiak, P. (eds.) ALGOSENSORS 2007. LNCS, vol. 4837, pp. 150–161. Springer, Heidelberg (2008)
Krontiris, I., Giannetsos, T., Dimitriou, T.: LIDeA: A Distributed Lightweight Intrusion Detection Architecture for Sensor Networks. In: Proceedings of the 4th International Conference on Security and Privacy in Communication Networks (SecureComm), pp. 1–10. ACM, New York (2008)
Network Simulator, ns-2, http://www.isi.edu/nsnam/ns/
TinyOS, http://www.tinyos.net/
Tseng, C.H., Wang, S.-H., Ko, C., Levitt, K.N.: DEMEM: Distributed Evidence-Driven Message Exchange Intrusion Detection Model for MANET. In: Zamboni, D., Krügel, C. (eds.) RAID 2006. LNCS, vol. 4219, pp. 249–271. Springer, Heidelberg (2006)
Woo, A., Tong, T., Culler, D.: Taming the Underlying Challenges of Reliable Multihop Routing in Sensor Networks. In: Proceedings of the 1st International Conference on Embedded Networked Sensor Systems (SenSys), pp. 14–27. ACM, New York (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hegazy, I., Safavi-Naini, R., Williamson, C. (2012). Exploiting Routing Tree Construction in CTP. In: Jung, S., Yung, M. (eds) Information Security Applications. WISA 2011. Lecture Notes in Computer Science, vol 7115. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27890-7_21
Download citation
DOI: https://doi.org/10.1007/978-3-642-27890-7_21
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-27889-1
Online ISBN: 978-3-642-27890-7
eBook Packages: Computer ScienceComputer Science (R0)