Abstract

In this paper, we present CENTERA, a CENtralized Trust-based Efficient Routing protocol with an appropriate authentication scheme for wireless sensor networks (WSN). CENTERA utilizes the more powerful base station (BS) to gather minimal neighbor trust information from nodes and calculate the best routes after isolating different types of “bad” nodes. By periodically accumulating these simple local observations and approximating the nodes' battery lives, the BS draws a global view of the network, calculates three quality metrics—maliciousness, cooperation, and compatibility—and evaluates the Data Trust and Forwarding Trust values of each node. Based on these metrics, the BS isolates “bad”, “misbehaving” or malicious nodes for a certain period, and put some nodes on probation. CENTERA increases the node's bad/probation level with repeated “bad” behavior, and decreases it otherwise. Then it uses a very efficient method to distribute the routing information to “good” nodes. Based on its target environment, and if required, CENTERA uses an authentication scheme suitable for severely constrained nodes, ranging from the symmetric RC5 for safe environments under close administration, to pairing-based cryptography (PBC) for hostile environments with a strong attacker model. We simulate CENTERA using TOSSIM and verify its correctness and show some energy calculations.

Highlights

  • Wireless Sensor Networks (WSN) are a collection of sensor nodes spatially dispersed to sense and collect data from the environment and collaborate with each other to deliver their readings to a base station (BS) for statistical analysis or merely data collection [1]

  • Precautions should be taken in the availability of bad nodes; since any isolation of a non-border node removes a part of the network

  • In this case and whenever any node has only one downlink neighbor (DL) node to the BS in general, banning a bad node should be based on the type of misbehavior as the requirements and needs of the network

Read more

Summary

Introduction

Wireless Sensor Networks (WSN) are a collection of sensor nodes spatially dispersed to sense and collect data from the environment and collaborate with each other to deliver their readings to a base station (BS) for statistical analysis or merely data collection [1]. Following the quality metrics calculations, the BS is able to detect several types of bad nodes: a malicious node sending false or illogical information, a non-cooperative node not reliably forwarding the packets of other nodes, or an incompetent node unable to correctly deliver packets to the sink BS, or a malfunctioned/malicious node broadcasting packets Those “bad” nodes are isolated for a period of. For the proper functioning of our routing protocol and the necessary validation of the nodes to each other and to the base station, CENTERA uses a secure and efficient authentication scheme suitable for the extremely limited sensor nodes in WSNs providing acceptable security levels while requiring minimal processing power and data transmission overhead.

Previous Work
Trust and Security in WSNs
Appropriate Authentication Techniques for WSNs
CENTERA
Initialization Block
Neighbor Discovery Block
Node Observation Block
Report Accumulation Block
Nodes Analysis and Metrics Calculations Block
Bad Nodes Isolation Block
Basic Routing Block
Routing Information Dissemination Block
External Attackers
Protocol Specific Attacks
Bad Packet Attacks
Packet Number Discrepancies
Broadcasting Nodes
Colluding Nodes
Node ID Attacks
False Neighborhood Attacks
Simulation Setup
Simulation Results
Energy Calculations
Conclusions and Future Work
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.