Dynamic Window Secured Implicit Geographic Forwarding Routing for Wireless Sensor Network

Routing security is a major concerned in Wireless Sensor Network since a large scale of unattended nodes is deployed in ad hoc fashion with no possibility of a global addressing due to a limitation of node-s memory and the node have to be self organizing when the systems require a connection with the other nodes. It becomes more challenging when the nodes have to act as the router and tightly constrained on energy and computational capabilities where any existing security mechanisms are not allowed to be fitted directly. These reasons thus increasing vulnerabilities to the network layer particularly and to the whole network, generally. In this paper, a Dynamic Window Secured Implicit Geographic Forwarding (DWSIGF) routing is presented where a dynamic time is used for collection window to collect Clear to Send (CTS) control packet in order to find an appropriate hoping node. The DWIGF is expected to minimize a chance to select an attacker as the hoping node that caused by a blackhole attack that happen because of the CTS rushing attack, which promise a good network performance with high packet delivery ratios.




References:
[1] Karlof, C. and Wagner, D., "Secure Routing in Wireless Sensor
Networks: Attacks and Countermeasures", Elsevier-s AdHoc Networks
Journal, Special Issue on Sensor Network Applications and Protocols,
2003, 1(2003), 293-315.
[2] Yick, J, Mukherjee, and Ghosal, D., "Wireless Sensor Network Survey",
Journal of Elsevier: Computer Network, 2008 52(12):2292-2330.
[3] Hanapi Z.M., Ismail M., Jumari K., and Mirvaziri H., "Analysis of
Routing Attacks in Wireless Sensor Network", In Proceedings of
International Cryptology Workshop and Conference (Cryptology2008),
2008, ISBN 978-983-4069, pp. 202-214.
[4] Kuo, C., Luk, M., Negi, R., and Perrig, A., "Message-In-A-Bottle: User
Friendly and Secure Key Deployment for Sensor Nodes", In
Proceedings of International Conference of Sensor System
(SenSys2007), 2007, ACM-159593-763-6/07/0011.
[5] Heinzelman, W.R., Chandrakasan, A., and Balakrishnan, "Energyefficient
Communication Protocol For Wireless Sensor Networks",
2000. pp. 3005-3014.
[6] Wood, A.D. and Stankovic, J., "Denial of Service in Sensor Networks",
IEEE Computer, 0018-9162/02, pp.54-62.
[7] Blum, B., He, T., Son, S, and Stankovic, J., "IGF: A State-Free Robust
Communication Protocol For Wireless Sensor Network", Technical
Report CS-2003-11, University of Virginia, 2003.
[8] Newsome, J., Shi, E., Song, D., and Perrig, A., "The Sybil Attacks In
Sensor Networks: Analysis and Defense", In Proceedings of Third
International Symposium on Information Processing in Sensor
Networks, ACM 1-58113-846-6/04/0004, 2004.
[9] Wood, A.D., Lei, F., Stankovic, J., and Tian, H., "SIGF: A Family of
Configurable, Secure Routing protocols for Wireless Sensor Networks",
SASN2006, ACM 1-59593-554-1/060010, 2006, pp. 35-48.
[10] Wood, A.D. and Stankovic, J., "Denial of Service in Sensor Networks",
IEEE Computer, 0018-9162/02, pp.54-62.
[11] Abu G.N., Kang K., and Liu K., "Towards Resilient Geographic Routing
in WSNs", In Proceedings of Q2SWinet05, ACM 1-59593-241-0, 2005,
pp. 71-78.
[12] Hanapi Z.M., Ismail M., Jumari K., and Mirvaziri H., "A Taxanomy of
Routing Attacks in Geographic Routing in Wireless Sensor Network",
In Proceedings of 1st Engineering Postgraduate Conference (EPC2008):
Innovation through Engineering, 2008.