Security mechanism based on path sequence detection in wireless sensor network
CHEN Zhuo1,2, TAN Zhihuan2
1. College of Computer Science and Engineering, Chongqing University of Technology, Chongqing 400054, China;
2. National Key Laboratory of Science and Technology on Communications (University of Electronic Science and Technology of China), Chengdu Sichuan 611731, China
To the problem of vulnerable to be attack in Wireless Sensor Network (WSN), a new security mechanism based on path sequence detection was proposed in this paper. This mechanism could detect the routing rule of packets and achieve the authentication of previous hop through constructing reasonable path sequence and sequence verification, then the correctness of routing rule and authenticity of data could be guaranteed. Performance analysis and simulation results show that the probability of the failure of data transmission path attacks detection will not decrease with the network scale. This result demonstrates that the proposed mechanism can effectively detect tampering of data transmission path attacks and can improve the security of the wireless sensor network.
[1] ZHOU Y, FANG Y, ZHANG Y. Securing wireless sensor networks: a survey[J]. IEEE Communications Surveys and Tutorials, 2008,10(3):6-28. [2] HAO J, ZHANG B, MOUFTAH H T. Routing protocols for duty cycled wireless sensor networks: a survey[J]. IEEE Communications Magazine, 2012,50(12):116-123. [3] AHMAD SALEHI S, RAZZAQUE M A, NARAEI P, et al. Security in wireless sensor networks: issues and challenges[C]//Proceedings of the 2013 IEEE International Conference on Space Science and Communication. Piscataway: IEEE, 2013:356-360. [4] ABDELHAKIM M, LIGHTFOOT L E, REN J, et al. Distributed detection in mobile access wireless sensor networks under Byzantine attacks[J]. IEEE Transactions on Parallel and Distributed Systems, 2014,25(4):950-959. [5] MARTINS D, GUYENNET H. Wireless sensor network attacks and security mechanisms: a short survey[C]//Proceedings of the 2010 13th International Conference on Network-based Information Systems. Piscataway: IEEE, 2010:313-320. [6] DENG J, HAN R, MISHRA S. Countermeasures against traffic analysis attacks in wireless sensor networks[C]//Proceedings of the 1st International Conference on Security and Privacy for Emerging Areas in Communications Networks. Piscataway: IEEE, 2005:113-126. [7] LOCKE G, GALLAGHER P. Digital Signature Standard (DSS)[EB/OL].[2014-10-05]. http://www.docin.com/p-434165217.html. [8] BLACK J R. Message authentication codes[D]. Davis: University of California at Davis, 2000. [9] ROMAN R, ZHOU J, LOPEZ J. Applying intrusion detection systems to wireless sensor networks[C]//Proceedings of the 2006 3rd IEEE Consumer Communications and Networking Conference. Piscataway: IEEE, 2006:640-644. [10] VASSEUR J P, AGARWAL N, HUI J, et al. RPL: the IP routing protocol designed for low power and lossy networks[J]. IPSO Alliance, 2011,13(6):120-127. [11] VASSEUR J-P, DUNKELS A. Interconnecting smart objects with IP: the next Internet[M]. San Francisco: Morgan Kaufmann. 2010:112-120. [12] CASADO L, TSIGAS P. Contikisec: a secure network layer for wireless sensor networks under the contiki operating system[EB/OL].[2014-08-06]. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.149.6598&rep=rep1&type=pdf.