1. Presented by
Rajat Soni
M.tech. WCT
Enrl.No.-140291
Secure Routing Protocol in Wireless Sensor
Networks
Supervisor
Prof. P.P. Bhattacharya
Co supervisor
Mr Deepak Sethi
2. Wireless Sensor Network
• WSNs consist of hundreds or thousands of low-power, low-cost nodes having a
computational unit, power source, radio and sensing elements.
• Power is the scarcest resource.
Features of WSN
Self organizing
Dynamic network topology
Limited power
Large scale deployment
3. Components Of Wireless Sensor Network
• Sensor Field
• Sensor Nodes
• Sink
• Base Station
Design Challenges
• Resource Constraints
• Ad-hoc Deployment
• Fault- Tolerance
• Scalability
• QoS
• Security
5. Routing in Wireless Sensor
Network
• Many routing and data dissemination protocols have been specifically
designed for WSNs where energy awareness is an essential design
issue.
• Routing protocols might differ depending on the application and
network architecture
• The design of routing protocols is influenced by many challenging
factors caused by the nature of the WSNs.
some of these factors are
• Data delivery model
• Security
• Data aggregation
• Fault tolerance
9. Attacks
By Spoofing, Altering, or Replaying routing information
Attacker can create loops, attract or repel network traffic, generate
false message, partition network, induce delay, etc.
Selective forwarding
Malicious node forwards only some messages, drop others.
Attacker tries to be on the actual path of data flow
Sinkhole Attacks
• Main Reason : Specialized communication patterns supported by
WSN ; All packets have same destination i.e. base station
• Adversary tries to attract traffic from a particular area to pass
through a compromised node, thereby creating sinkhole with
adversary at the center
• A node may be made to look attractive to neighbors in some
routing algorithm
• Laptop class adversary provide a high quality route to base station
by transmitting at high power OR creating a wormhole
• Can enable other attacks e.g. selective forwarding
10. Sybil Attack
• Single node presents multiple identities to other nodes
• Significantly affect fault-tolerance schemes like distributed storage,
multi-path routing, topology maintenance
• Threat to geographical routing protocols
Wormholes
• tunnelling of messages over alternative low-latency links, e.g.
confuse the routing protocol, create sinkholes. etc.
• Exploit routing race condition
HELLO flood attack
• Some protocols require that nodes broadcast ‘hello’ packets to
advertise themselves
Acknowledgement spoofing
• Adversary can spoof ACKs for control packets and try to
convince the sender that a weak link is strong or a dead link is
alive; causing packet losses
11. Various Secure Routing Protocols
Distributed Security Framework (DSF)
Multipath Data Transfer protocol (MDTP)
Secure and Energy Efficient Disjoint Route (SEDR)
Data Centric Braided Multipath (DCBM)
Energy Efficient Secure Routing Protocol (EESRP)
Bio-inspired Self-Organized Secure Autonomous Routing
Protocol (BIOSARP)
Sink Toroidal Region Routing (STAR)
12. Distributed Security Framework
Uses Hierarchical routing protocols
Prevents network from Sybil, selective forwarding& worm hole
attacks
Works for both mobile and static attackers
Limitations
Consume high energy
End to end delay is very high
Scope
Improvement in success rate
No defence mechanism for attack on gateway node
13. Energy Efficient Secure Routing
Protocol
This protocol makes uses the sink-oriented grid structure for providing
better delivery ratio.
It employs the farthest-highest energy dissemination node search to
find an efficient path from the source to the sink.
use three different key for security.
prevents from Sybil, black hole& worm hole attacks,
Latency is high.
Packet drop ratio is high.
14. Secure and Energy Efficient Disjoint Route
In this protocol messages are
communicated by secret sharing,
by way of dividing them into
packets and by random
forwarding.
Transmit packets to the sink node
by using least hop routing
enhances the energy efficiency of
the network
Prevents from black hole attack
15. Data Centric Braided Multipath
Concentrate on the non-hierarchical approach
Works on Reverse-path-based forwarding
Normally using previous information, but detecting loops and
dismantling them soon after their formation
Monitoring data delivery and limiting refreshes to the
neighbourhood of paths to sources with poor delivery quality
Maintaining braided multiple paths from sources to the sink
Highly energy efficient
16. Multipath Data Transfer Protocol
Data route is decided by updated local table
Provide data confidentiality
Scope
Security mechanism for routing
Improvements on end to end delay
17. Bio-inspired Self-Organized Secure
Autonomous Routing Protocol
Based on ant colony optimization
On demand routing protocol
can be practically implemented for environmental monitoring or
battlefield surveillance.
suitable for a large-scale self-organizing system
Scope
Can be designed by involving the mobility factor and
Autonomous security mechanism based on an artificial immune system
(AIS).
18. Sink Toroidal Region Routing
Employs grid network structure and single path routing
Addresses passive attacks like location privacy or eavesdropping
Limitation
Works for passive attacks only
Low delivery ratio
End to end delay is high
Scope
To remove collisions in the network
Defense mechanism for active attacks
19. Conclusion and Future Scope
Routing is of pivotal importance in getting information from one node to
another. usually from the data collecting nodes or source to the base station
or sink is the primary objective. However, in military and medical
applications just getting the data across the network is not the only desired
focus. In these applications security is of utmost importance due to the
sensitive nature of the data that is transported. Hence, information security
measures must be placed in these types of WSNs.
In near future we are approaching to develop a new routing approach
based on multiple routes and provide security for possible threats using
MATLAB simulator which will have low energy consumption and high
delivery ratio with strong security mechanism.
20. REFRENCES
Himali Saxena, Chunyu Ai, Marco Valero, Yingshu Li, and Raheem Beyah “DSF - A Distributed Security
Framework for Heterogeneous Wireless Sensor Networks” Military Communications Conference Cyber
Security and Network Management 2010.
Shobha Poojary, Manohara “Multipath Data Transfer in Wireless Multimedia Sensor Network” Pai
Information and Communication Technology, Manipal Institute of Technology.2010.
Anfeng Liu, Zhongming Zheng, Chao Zhang, Zhigang Chen, Member, IEEE, and Xuemin (Sherman)
Shen, “Secure and Energy-Efficient Disjoint Multipath Routing for WSNs”, IEEE ,2012.
Alexander Aronsky and Adrian Segall “A Multipath Routing Algorithm for Mobile Wireless Sensor
Networks” Department of Electrical Engineering, Technion IIT, Haifa, Israel.
Huei-Wen Ferng and Dian Rachmarini “A Secure Routing Protocol for Wireless Sensor Networks with
Consideration of Energy Efficiency” IEEE 2012.
Kashif Saleem Norsheila Fisal, M. Ariff Baharudin “A Real-Time Empirical Study of BIOSARP based
Wireless Sensor Network Test bed” IEEE 2012.
Leron Lightfoot, Yun Li, Jian Ren “Preserving Source-Location Privacy in Wireless Sensor Network using
STaR Routing” IEEE Globecom 2010.