Routing security is a major concerned in Wireless
Sensor Network since a large scale of unattended nodes is deployed
in ad hoc fashion with no possibility of a global addressing due to a
limitation of node-s memory and the node have to be self organizing
when the systems require a connection with the other nodes. It
becomes more challenging when the nodes have to act as the router
and tightly constrained on energy and computational capabilities
where any existing security mechanisms are not allowed to be fitted
directly. These reasons thus increasing vulnerabilities to the network
layer particularly and to the whole network, generally. In this paper,
a Dynamic Window Secured Implicit Geographic Forwarding
(DWSIGF) routing is presented where a dynamic time is used for
collection window to collect Clear to Send (CTS) control packet in
order to find an appropriate hoping node. The DWIGF is expected to
minimize a chance to select an attacker as the hoping node that
caused by a blackhole attack that happen because of the CTS rushing
attack, which promise a good network performance with high packet
delivery ratios.
[1] Karlof, C. and Wagner, D., "Secure Routing in Wireless Sensor
Networks: Attacks and Countermeasures", Elsevier-s AdHoc Networks
Journal, Special Issue on Sensor Network Applications and Protocols,
2003, 1(2003), 293-315.
[2] Yick, J, Mukherjee, and Ghosal, D., "Wireless Sensor Network Survey",
Journal of Elsevier: Computer Network, 2008 52(12):2292-2330.
[3] Hanapi Z.M., Ismail M., Jumari K., and Mirvaziri H., "Analysis of
Routing Attacks in Wireless Sensor Network", In Proceedings of
International Cryptology Workshop and Conference (Cryptology2008),
2008, ISBN 978-983-4069, pp. 202-214.
[4] Kuo, C., Luk, M., Negi, R., and Perrig, A., "Message-In-A-Bottle: User
Friendly and Secure Key Deployment for Sensor Nodes", In
Proceedings of International Conference of Sensor System
(SenSys2007), 2007, ACM-159593-763-6/07/0011.
[5] Heinzelman, W.R., Chandrakasan, A., and Balakrishnan, "Energyefficient
Communication Protocol For Wireless Sensor Networks",
2000. pp. 3005-3014.
[6] Wood, A.D. and Stankovic, J., "Denial of Service in Sensor Networks",
IEEE Computer, 0018-9162/02, pp.54-62.
[7] Blum, B., He, T., Son, S, and Stankovic, J., "IGF: A State-Free Robust
Communication Protocol For Wireless Sensor Network", Technical
Report CS-2003-11, University of Virginia, 2003.
[8] Newsome, J., Shi, E., Song, D., and Perrig, A., "The Sybil Attacks In
Sensor Networks: Analysis and Defense", In Proceedings of Third
International Symposium on Information Processing in Sensor
Networks, ACM 1-58113-846-6/04/0004, 2004.
[9] Wood, A.D., Lei, F., Stankovic, J., and Tian, H., "SIGF: A Family of
Configurable, Secure Routing protocols for Wireless Sensor Networks",
SASN2006, ACM 1-59593-554-1/060010, 2006, pp. 35-48.
[10] Wood, A.D. and Stankovic, J., "Denial of Service in Sensor Networks",
IEEE Computer, 0018-9162/02, pp.54-62.
[11] Abu G.N., Kang K., and Liu K., "Towards Resilient Geographic Routing
in WSNs", In Proceedings of Q2SWinet05, ACM 1-59593-241-0, 2005,
pp. 71-78.
[12] Hanapi Z.M., Ismail M., Jumari K., and Mirvaziri H., "A Taxanomy of
Routing Attacks in Geographic Routing in Wireless Sensor Network",
In Proceedings of 1st Engineering Postgraduate Conference (EPC2008):
Innovation through Engineering, 2008.
[1] Karlof, C. and Wagner, D., "Secure Routing in Wireless Sensor
Networks: Attacks and Countermeasures", Elsevier-s AdHoc Networks
Journal, Special Issue on Sensor Network Applications and Protocols,
2003, 1(2003), 293-315.
[2] Yick, J, Mukherjee, and Ghosal, D., "Wireless Sensor Network Survey",
Journal of Elsevier: Computer Network, 2008 52(12):2292-2330.
[3] Hanapi Z.M., Ismail M., Jumari K., and Mirvaziri H., "Analysis of
Routing Attacks in Wireless Sensor Network", In Proceedings of
International Cryptology Workshop and Conference (Cryptology2008),
2008, ISBN 978-983-4069, pp. 202-214.
[4] Kuo, C., Luk, M., Negi, R., and Perrig, A., "Message-In-A-Bottle: User
Friendly and Secure Key Deployment for Sensor Nodes", In
Proceedings of International Conference of Sensor System
(SenSys2007), 2007, ACM-159593-763-6/07/0011.
[5] Heinzelman, W.R., Chandrakasan, A., and Balakrishnan, "Energyefficient
Communication Protocol For Wireless Sensor Networks",
2000. pp. 3005-3014.
[6] Wood, A.D. and Stankovic, J., "Denial of Service in Sensor Networks",
IEEE Computer, 0018-9162/02, pp.54-62.
[7] Blum, B., He, T., Son, S, and Stankovic, J., "IGF: A State-Free Robust
Communication Protocol For Wireless Sensor Network", Technical
Report CS-2003-11, University of Virginia, 2003.
[8] Newsome, J., Shi, E., Song, D., and Perrig, A., "The Sybil Attacks In
Sensor Networks: Analysis and Defense", In Proceedings of Third
International Symposium on Information Processing in Sensor
Networks, ACM 1-58113-846-6/04/0004, 2004.
[9] Wood, A.D., Lei, F., Stankovic, J., and Tian, H., "SIGF: A Family of
Configurable, Secure Routing protocols for Wireless Sensor Networks",
SASN2006, ACM 1-59593-554-1/060010, 2006, pp. 35-48.
[10] Wood, A.D. and Stankovic, J., "Denial of Service in Sensor Networks",
IEEE Computer, 0018-9162/02, pp.54-62.
[11] Abu G.N., Kang K., and Liu K., "Towards Resilient Geographic Routing
in WSNs", In Proceedings of Q2SWinet05, ACM 1-59593-241-0, 2005,
pp. 71-78.
[12] Hanapi Z.M., Ismail M., Jumari K., and Mirvaziri H., "A Taxanomy of
Routing Attacks in Geographic Routing in Wireless Sensor Network",
In Proceedings of 1st Engineering Postgraduate Conference (EPC2008):
Innovation through Engineering, 2008.
@article{"International Journal of Electrical, Electronic and Communication Sciences:55894", author = "Z.M. Hanapi and M. Ismail and K. Jumari and M. Mahdavi", title = "Dynamic Window Secured Implicit Geographic Forwarding Routing for Wireless Sensor Network", abstract = "Routing security is a major concerned in Wireless
Sensor Network since a large scale of unattended nodes is deployed
in ad hoc fashion with no possibility of a global addressing due to a
limitation of node-s memory and the node have to be self organizing
when the systems require a connection with the other nodes. It
becomes more challenging when the nodes have to act as the router
and tightly constrained on energy and computational capabilities
where any existing security mechanisms are not allowed to be fitted
directly. These reasons thus increasing vulnerabilities to the network
layer particularly and to the whole network, generally. In this paper,
a Dynamic Window Secured Implicit Geographic Forwarding
(DWSIGF) routing is presented where a dynamic time is used for
collection window to collect Clear to Send (CTS) control packet in
order to find an appropriate hoping node. The DWIGF is expected to
minimize a chance to select an attacker as the hoping node that
caused by a blackhole attack that happen because of the CTS rushing
attack, which promise a good network performance with high packet
delivery ratios.", keywords = "sensor, security, routing, attack, random.", volume = "3", number = "3", pages = "479-7", }