• DocumentCode
    1379262
  • Title

    Securing Topology Maintenance Protocols for Sensor Networks

  • Author

    Gabrielli, Andrea ; Mancini, Luigi V. ; Setia, Sanjeev ; Jajodia, Sushil

  • Author_Institution
    Dipt. di Inf., Univ. of Rome La Sapienza, Rome, Italy
  • Volume
    8
  • Issue
    3
  • fYear
    2011
  • Firstpage
    450
  • Lastpage
    465
  • Abstract
    We analyze the security vulnerabilities of PEAS, ASCENT, and CCP, three well-known topology maintenance protocols (TMPs) for sensor networks. These protocols aim to increase the lifetime of the sensor network by only maintaining a subset of nodes in an active or awake state. The design of these protocols assumes that the sensor nodes will be deployed in a trusted, nonadversarial environment, and does not take into account the impact of attacks launched by malicious insider or outsider nodes. We propose a metaprotocol (Meta-TMP) to represent the class of topology maintenance protocols. The Meta-TMP provides us with a better understanding of the characteristics and of how a specific TMP works, and it can be used to study the vulnerabilities of a specific TMP. We describe various types of malicious behavior and actions that can be carried out by an adversary to attack a wireless sensor network by exploiting the TMP being used in the network. We describe three attacks against these protocols that may be used to reduce the lifetime of the sensor network, or to degrade the functionality of the sensor application by reducing the network connectivity and the sensing coverage that can be achieved. Further, we describe countermeasures that can be taken to increase the robustness of the protocols and make them resilient to such attacks.
  • Keywords
    protocols; telecommunication network topology; telecommunication security; wireless sensor networks; ASCENT; CCP; PEAS; malicious nodes; metaprotocol; network connectivity; sensing coverage; sensor nodes; topology maintenance protocols; wireless sensor network; Degradation; Maintenance; Network topology; Pervasive computing; Privacy; Protocols; Robustness; Sensor phenomena and characterization; Sleep; Wireless sensor networks; Mobile applications; pervasive computing; reliability; security and privacy protection.; wireless sensor networks;
  • fLanguage
    English
  • Journal_Title
    Dependable and Secure Computing, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    1545-5971
  • Type

    jour

  • DOI
    10.1109/TDSC.2009.46
  • Filename
    5374414