Preview

Proceedings of the Institute for System Programming of the RAS (Proceedings of ISP RAS)

Advanced search

A study of Intrusion-tolerant routing in Wireless Sensor Networks

https://doi.org/10.15514/ISPRAS-2014-26(6)-9

Abstract

Wireless Sensor Networks (WSNs) emerge recently as one of the most attractive research subjects. The resource- constraint characteristics of WSNs limit the secure design and development of security protocols for them. Whilst, sensor nodes those usually operate in unattended and even harsh environments, are prone to failures and are vulnerable to malicious attacks. For reliable and secure communications in WSNs, intrusion-tolerant routing becomes a critical attribute that should be integrated into WSNs. In this paper, we study two intrusion- tolerant routing protocols for WSNs, namely INSENS and ITSRP, as well as analyze the intrusion-tolerant properties gained from these two propositions. Simulation and performance analysis have proved that both of them are practical.

About the Authors

Vin Hoa La
Telecom SudParis
Russian Federation


Ana Cavalli
Telecom SudParis
Russian Federation


References

1. Libelium Comunicaciones Distribuidas S.L. “Waspmote Datasheet”, 2014

2. Akyildiz I, SuW, et al. “Wireless sensor networks: a survey”, in Computer Networks, pp. 393-422, 2002.

3. Ruiping Ma, Liudong Xing, Howard E. Michel. “Fault-Intrusion Tolerant Techniques in Wireless Sensor Networks”, in 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing, pp. 85- 94, 2006.

4. Liang-min Wang, Jian-feng Ma, Chao Wang, A.C. Kot. “Fault and intrusion tolerance of wireless sensor networks”, in 20th International Parallel and Distributed Processing Symposium, 2006.

5. Yves Deswarte, David Powell, “Intrusion-tolerance on the Internet (Tolrance aux intrusions sur Internet)”, in Presentation slide, LAAS- CNRS, Toulouse, France, 2005.

6. B.B. Madan and K.S. Trivedi, “Security modeling and quantification of intrusion tolerant systems”, in ISSRE, 2002.

7. Feiyi Wang, Raghavendra Uppalli, Charles Killian, “Analysis of tech- niques for building intrusion tolerant server systems”, in Military Communications Conference MILCOM ’03 IEEE, pp. 729 - 734 Vol.2, 2003.

8. Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J. D. Tygar, “SPINS: Security Protocols for Sensor Networks”, in Journal of Wireless Networks, Volume 8, Issue 5, pp. 521- 534, Sept. 2002.

9. Chris karlof, Naveen Sastry, David Wagner. “TinySec: A Link Layer Security Architecture for Wireless Sensor Networks”, in Proceedings of the 2nd international conference on Embedded networked sensor networks, pp. 162-175, 2004.

10. Soumya Basu, M.Pushpalatha. “Analysis of energy efficient ECC and TinySec based security schemes in Wireless Sensor Networks”, in IEEE International Conference on Advanced Networks and Telecommunication Systems (ANTS), pp. 1 - 6, 2013.

11. Ajay Mahimkar, Theodore S. Rappaport. “SecureDAV: a secure data aggregation and verification protocol for sensor networks”, in IEEE Global Telecommunications Conference (GLOBECOM), pp. 2175 – 2179, Vol.4, 2004.

12. Leonardo B. Oliveira, Hao Chi Wong, Antonio A. Loureiro. “LHA- SP: secure protocols for hierarchical wireless sensor networks”, in 9th IFIP/IEEE International Symposium on Integrated Network Manage- ment, pp. 31 - 44, 2005.

13. D. Estrin, R. Govindan, J. S. Heidemann, and S. Kumar. “Next century challenges: Scalable coordination in sensor networks ”, in Mobile Computing and Networking , pp. 263 – 270, 1999.

14. Maha Sliti, Mohamed Hamdi, Noureddine Boudriga. “Intrusion-tolerant framework for heterogeneous Wireless Sensor Networks”, in The 7th IEEE/ACS International Conference on Computer Systems and Applications, AICCSA 2009, pp. 633- 636, May 10-13, 2009.

15. J. Deng, R. Han, and S. Mishra. “INSENS: Intrusion-Tolerant Routing in Wireless Sensor Networks”, Poster paper in 23rd IEEE International Conference on Distributed Computing Systems, 2003

16. J. Deng, R. Han, and S. Mishra. “INSENS: Secure and Intrusion Tolerant Routing for Wireless Sensor Networks”, Technical Report CU-CS 939-02. Department of Computer Science. University of Colorado, Boulder, CO. November 2002.

17. J. Deng, R. Han, and S. Mishra. “A Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks”, in 2nd IEEE International Workshop on Information Processing in Sensor Networks, 2003

18. Sapon Tanachaiwiwat, Pinalkumar Dave, Rohan Bhindwale, Ahmed Helmy. “Secure Locations: Routing on Trust and Isolating Compromised Sensors in Location-Aware Sensor Networks”, in SenSys’08, Los Angeles, California, USA, ACM 1-58813-707-9/03/0011, 2008

19. Jiliang Zhou, Caixia Li , Qiying Cao and Yu Shen, “An intrusion-tolerant secure routing protocol with key exchange for wireless sensor network”, in International Conference on Information and Automation-ICIA 2008, pp. 1547 - 1552, 2008.

20. L.M. Feeney. “An energy consumption model for performance analysis of routing protocols for mobile ad hoc networks”, in Mobile Networks and Applications, pp. 239 - 249, 2001.


Review

For citations:


La V.H., Cavalli A. A study of Intrusion-tolerant routing in Wireless Sensor Networks. Proceedings of the Institute for System Programming of the RAS (Proceedings of ISP RAS). 2014;26(6):99-110. (In Russ.) https://doi.org/10.15514/ISPRAS-2014-26(6)-9



Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 2079-8156 (Print)
ISSN 2220-6426 (Online)