21-06-2012, 02:16 PM
DESIGN AND ANALYSIS OF SECURE ROUTING PROTOCOL ALGORITHM FOR WARLESS SENSOR NETWORKS
DESIGN AND ANALYSIS OF SECURE ROUTING PROTOCOL ALGORITHM.pdf (Size: 770.55 KB / Downloads: 53)
ABSTRACT
Due to limitations of power, computation capability and storage resources wireless sensor networks are vulnerable to many attacks. The paper proposed a novel routing protocol algorithm for Wireless sensor network. The proposed routing protocol algorithm can adopt suitable routing technology for the nodes according to distance of nodes to the base station, density of nodes distribution and residual energy of nodes. Comparing the proposed routing protocol algorithm with other routing protocol algorithm through comprehensive analysis, the results show that the proposed routing protocol algorithm is secure and efficient for wireless sensor networks.
INTRODUCTION
Wireless Sensor Network (WSN) has been a hot issue and has received considerable attention for decade [1-2]. It has been developed for a wide variety of applications, including military sensing and tracking, environment and security monitoring, equipment and human monitoring and tracking, et al. WSN platforms generally have limited processing capability and memory, these basic characteristics of sensor networks make them vulnerable to all kinds of network attacks. Their primary weakness, shared by all wireless networking devices, is the inability to secure the wireless sensor networks poses several important security challenges because of special characteristics and limitations, including DoS[3] attack, key establishment, authentication, privacy, secure routing and node capture.
wireless sensor networks
A wireless sensor network (WSN) consists of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants and to cooperatively pass their data through the network to a main location. The more modern networks are bi-directional, enabling also to control the activity of the sensors. The development of wireless sensor networks was motivated by military applications such as battlefield surveillance; today such networks are used in many industrial and consumer applications, such as industrial process monitoring and control, machine health monitoring, and so on.
Wireless Sensor Node
A key feature of any wireless sensing node is to minimize the power consumed by the system.
A sensor node might vary in size.
Sensor nodes perform two main functions: sensing and relaying.
The sensing component is responsible for probing their environment to track an object or event.
The collected data are then relayed to the base station through cluster heads in each level.
ATTACKS IN WSN ROUTING
Dos attacks are common in wireless sensor networks. Because of severe limited resource in computing, energy and network bandwidths, wireless sensor networks are vulnerable to Dos attacks. In this paper, we are mainly concern about the Dos attacks to the network layer of wireless sensor networks although there maybe exist many kinds of Dos attacks in other layers, such as physical layer and data-link layer. In general, Dos attacks in networks lay of wireless sensor networks mainly aim to destroy or interfere the routing protocols, include spoofing and error data attack, replaying packets attack and congestion attack. If we can take some measures such as authentication on link-layer and we can effectively prevent these attacks.
CONCLUSIONS
Wireless sensor networks are being deployed for a wide variety of applications. It is an important challenge to find out practical secure schemes for wireless sensor networks due to limitation of power, computation and storage resources.
The proposed routing protocol algorithm can adopt suitable routing technology for the nodes according to the distance of nodes to the base station, density of nodes distribution and residual energy of nodes.