SlideShare una empresa de Scribd logo
1 de 15
Descargar para leer sin conexión
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING                                                                                               1




           Design and Implementation of TARF: A
         Trust-Aware Routing Framework for WSNs
                           Guoxing Zhan, Weisong Shi, Senior Member, IEEE, and Julia Deng

      Abstract—The multi-hop routing in wireless sensor networks (WSNs) offers little protection against identity deception through replaying
      routing information. An adversary can exploit this defect to launch various harmful or even devastating attacks against the routing
      protocols, including sinkhole attacks, wormhole attacks and Sybil attacks. The situation is further aggravated by mobile and harsh
      network conditions. Traditional cryptographic techniques or efforts at developing trust-aware routing protocols do not effectively address
      this severe problem. To secure the WSNs against adversaries misdirecting the multi-hop routing, we have designed and implemented
      TARF, a robust trust-aware routing framework for dynamic WSNs. Without tight time synchronization or known geographic information,
      TARF provides trustworthy and energy-efficient route. Most importantly, TARF proves effective against those harmful attacks developed
      out of identity deception; the resilience of TARF is verified through extensive evaluation with both simulation and empirical experiments
      on large-scale WSNs under various scenarios including mobile and RF-shielding network conditions. Further, we have implemented a
      low-overhead TARF module in TinyOS; as demonstrated, this implementation can be incorporated into existing routing protocols with
      the least effort. Based on TARF, we also demonstrated a proof-of-concept mobile target detection application that functions well against
      an anti-detection mechanism.

                                                                          3


1    I NTRODUCTION                                                            network traffic. Those routing packets, including their
                                                                              original headers, are replayed without any modification.
Wireless sensor networks (WSNs) [2] are ideal can-
                                                                              Even if this malicious node cannot directly overhear the
didates for applications to report detected events of
                                                                              valid node’s wireless transmission, it can collude with
interest, such as military surveillance and forest fire
                                                                              other malicious nodes to receive those routing packets
monitoring. A WSN comprises battery-powered senor
                                                                              and replay them somewhere far away from the original
nodes with extremely limited processing capabilities.
                                                                              valid node, which is known as a wormhole attack [5].
With a narrow radio communication range, a sensor
                                                                              Since a node in a WSN usually relies solely on the
node wirelessly sends messages to a base station via
                                                                              packets received to know about the sender’s identity,
a multi-hop path. However, the multi-hop routing of
                                                                              replaying routing packets allows the malicious node to
WSNs often becomes the target of malicious attacks.
                                                                              forge the identity of this valid node. After “stealing” that
An attacker may tamper nodes physically, create traffic
                                                                              valid identity, this malicious node is able to misdirect
collision with seemingly valid transmission, drop or
                                                                              the network traffic. For instance, it may drop packets
misdirect messages in routes, or jam the communication
                                                                              received, forward packets to another node not supposed
channel by creating radio interference [3]. This paper
                                                                              to be in the routing path, or even form a transmission
focuses on the kind of attacks in which adversaries
                                                                              loop through which packets are passed among a few
misdirect network traffic by identity deception through
                                                                              malicious nodes infinitely. It is often difficult to know
replaying routing information. Based on identity decep-
                                                                              whether a node forwards received packets correctly even
tion, the adversary is capable of launching harmful and
                                                                              with overhearing techniques [4]. Sinkhole attacks are an-
hard-to-detect attacks against routing, such as selective
                                                                              other kind of attacks that can be launched after stealing
forwarding, wormhole attacks, sinkhole attacks and Sybil
                                                                              a valid identity. In a sinkhole attack, a malicious node
attacks [4].
                                                                              may claim itself to be a base station through replaying
   As a harmful and easy-to-implement type of attack, a
                                                                              all the packets from a real base station [6]. Such a fake
malicious node simply replays all the outgoing routing
                                                                              base station could lure more than half the traffic, creating
packets from a valid node to forge the latter node’s iden-
                                                                              a “black hole”. This same technique can be employed to
tity; the malicious node then uses this forged identity to
                                                                              conduct another strong form of attack - Sybil attack [7]:
participate in the network routing, thus disrupting the
                                                                              through replaying the routing information of multiple
                                                                              legitimate nodes, an attacker may present multiple iden-
• G. Zhan and W. Shi are with the Department of Computer Science, Wayne
  State University, Detroit, MI, 48202.
                                                                              tities to the network. A valid node, if compromised, can
  E-mail: gxzhan@wayne.edu, weisong@wayne.edu.                                also launch all these attacks.
• J. Deng is with Intelligent Automation Inc., Rockville, MD 20855.              The harm of such malicious attacks based on the
  Email: hdeng@i-a-i.com.
                                                                              technique of replaying routing information is further
This work is in part supported by AFRL contract FA8650-10-C-1740 and          aggravated by the introduction of mobility into WSNs
NSF Career Award CCF-0643521. We also would like to thank the program
manager Mr. John Woods for his great support as well as the anonymous         and the hostile network condition. Though mobility is
reviewers for their constructive comments and suggestions.                    introduced into WSNs for efficient data collection and
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING                                                                       2



various applications [8], [9], [10], [11], it greatly increases   TARF can be developed into a complete and indepen-
the chance of interaction between the honest nodes                dent routing protocol, the purpose is to allow existing
and the attackers. Additionally, a poor network connec-           routing protocols to incorporate our implementation of
tion causes much difficulty in distinguishing between              TARF with the least effort and thus producing a secure
an attacker and a honest node with transient failure.             and efficient fully-functional protocol. Unlike other se-
Without proper protection, WSNs with existing routing             curity measures, TARF requires neither tight time syn-
protocols can be completely devastated under certain cir-         chronization nor known geographic information. Most
cumstances. In an emergent sensing application through            importantly, TARF proves resilient under various attacks
WSNs, saving the network from being devastated be-                exploiting the replay of routing information, which is
comes crucial to the success of the application.                  not achieved by previous security protocols. Even under
   Unfortunately, most existing routing protocols for             strong attacks such as sinkhole attacks, wormhole attacks
WSNs either assume the honesty of nodes and focus                 as well as Sybil attacks, and hostile mobile network
on energy efficiency [12], or attempt to exclude unau-             condition, TARF demonstrates steady improvement in
thorized participation by encrypting data and authen-             network performance. The effectiveness of TARF is ver-
ticating packets. Examples of these encryption and au-            ified through extensive evaluation with simulation and
thentication schemes for WSNs include TinySec [13],               empirical experiments on large-scale WSNs. Finally, we
Spins [14], TinyPK [15], and TinyECC [16]. Admittedly, it         have implemented a ready-to-use TARF module with
is important to consider efficient energy use for battery-         low overhead, which as demonstrated can be integrated
powered sensor nodes and the robustness of routing                into existing routing protocols with ease; the demon-
under topological changes as well as common faults                stration of a proof-of-concept mobile target detection
in a wild environment. However, it is also critical to            program indicates the potential of TARF in WSN appli-
incorporate security as one of the most important goals;          cations.
meanwhile, even with perfect encryption and authen-                  We start by stating the design considerations of TARF
tication, by replaying routing information, a malicious           in Section 2. Then we elaborate the design of TARF
node can still participate in the network using another           in Section 3, including the routing procedure as well
valid node’s identity. The gossiping-based routing proto-         as the EnergyWatcher and TrustManager components. In
cols offer certain protection against attackers by selecting      Section 4, we present the simulation results of TARF
random neighbors to forward packets [17], but at a                against various attacks through replaying routing in-
price of considerable overhead in propagation time and            formation in static, mobile and RF-shielding conditions.
energy use.                                                       Section 5 further presents the implementation of TARF,
   In addition to the cryptographic methods, trust and            empirical evaluation at a large sensor network and a
reputation management has been employed in generic                resilient proof-of-concept mobile target detection appli-
ad hoc networks and WSNs to secure routing protocols.             cation based on TARF. Finally, we discuss the related
Basically, a system of trust and reputation management            work in Section 6 and conclude this paper in Section 7.
assigns each node a trust value according to its past
performance in routing. Then such trust values are used
to help decide a secure and efficient route. However,              2   D ESIGN C ONSIDERATIONS
the proposed trust and reputation management systems              Before elaborating the detailed design of TARF, we
for generic ad hoc networks target only relatively pow-           would like to clarify a few design considerations first,
erful hardware platforms such as laptops and smart-               including certain assumptions in Section 2.1 and the
phones [18], [19], [20], [21]. Those systems can not be           goals in Section 2.3.
applied to WSNs due to the excessive overhead for
resource-constrained sensor nodes powered by batteries.
As far as WSNs are concerned, secure routing solutions            2.1 Assumptions
based on trust and reputation management rarely ad-               We target secure routing for data collection tasks, which
dress the identity deception through replaying routing            are one of the most fundamental functions of WSNs. In
information [22], [23]. The countermeasures proposed so           a data collection task, a sensor node sends its sampled
far strongly depends on either tight time synchronization         data to a remote base station with the aid of other inter-
or known geographic information while their effective-            mediate nodes, as shown in Figure 1. Though there could
ness against attacks exploiting the replay of routing             be more than one base station, our routing approach is
information has not been examined yet [4].                        not affected by the number of base stations; to simplify
   At this point, to protect WSNs from the harmful                our discussion, we assume that there is only one base
attacks exploiting the replay of routing information, we          station. An adversary may forge the identity of any legal
have designed and implemented a robust trust-aware                node through replaying that node’s outgoing routing
routing framework, TARF, to secure routing solutions in           packets and spoofing the acknowledgement packets,
wireless sensor networks. Based on the unique character-          even remotely through a wormhole.
istics of resource-constrained WSNs, the design of TARF              Additionally, to merely simplify the introduction of
centers on trustworthiness and energy efficiency. Though           TARF, we assume no data aggregation is involved.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING                                                                   3


                              Node
                              Base station
                                                             the base station broadcast packets which are asymmet-
                                                             rically authenticated. The asymmetric authentication of
                                                             those broadcast packets from the base station is crucial to
                                                             any successful secure routing protocol. It can be achieved
                                                             through existing asymmetrically authenticated broadcast
                                                             schemes that may require loose time synchronization. As
                                                             an example, µTESLA [14] achieves asymmetric authen-
                                                             ticated broadcast through a symmetric cryptographic
                                                             algorithm and a loose delay schedule to disclose the
                                                             keys from a key chain. Other examples of asymmetric
Fig. 1. Multi-hop routing for data collection of a WSN.
                                                             authenticated broadcast schemes requiring either loose
                                                             or no time synchronization are found in [25], [26].
Nonetheless, our approach can still be applied to cluster-      Considering the great computation cost incurred by a
based WSNs with static clusters, where data are aggre-       strong asymmetric authentication scheme and the diffi-
gated by clusters before being relayed [24]. Cluster-based   culty in key management, a regular packet other than a
WSNs allows for the great savings of energy and band-        base station broadcast packet may only be moderately
width through aggregating data from children nodes and       authenticated through existing symmetric schemes with
performing routing and transmission for children nodes.      a limited set of keys, such as the message authentication
In a cluster-based WSN, the cluster headers themselves       code provided by TinySec [13]. It is possible that an
form a sub-network; after certain data reach a cluster       adversary physically captures a non-base legal node and
header, the aggregated data will be routed to a base         reveals its key for the symmetric authentication [27].
station only through such a sub-network consisting of        With that key, the adversary can forge the identity of
the cluster headers. Our framework can then be applied       that non-base legal node and joins the network “legally”.
to this sub-network to achieve secure routing for cluster-   However, when the adversary uses its fake identity to
based WSNs. TARF may run on cluster headers only             falsely attract a great amount of traffic, after receiving
and the cluster headers communicate with their children      broadcast packets about delivery information, other le-
nodes directly since a static cluster has known relation-    gal nodes that directly or indirectly forwards packets
ship between a cluster header and its children nodes,        through it will start to select a more trustworthy path
though any link-level security features may be further       through TrustManager (Section 3.4).
employed.
   Finally, we assume a data packet has at least the         2.3 Goals
following fields: the sender id, the sender sequence
number, the next-hop node id (the receiver in this one-      TARF mainly guards a WSN against the attacks mis-
hop transmission), the source id (the node that initiates    directing the multi-hop routing, especially those based
the data), and the source’s sequence number. We insist       on identity theft through replaying the routing informa-
that the source node’s information should be included        tion. This paper does not address the denial-of-service
for the following reasons because that allows the base       (DoS) [3] attacks, where an attacker intends to damage
station to track whether a data packet is delivered. It      the network by exhausting its resource. For instance, we
would cause too much overhead to transmit all the one-       do not address the DoS attack of congesting the network
hop information to the base station. Also, we assume the     by replaying numerous packets or physically jamming
routing packet is sequenced.                                 the network. TARF aims to achieve the following desir-
                                                             able properties:
                                                             High Throughput Throughput is defined as the ratio of
2.2 Authentication Requirements                              the number of all data packets delivered to the base
Though a specific application may determine whether           station to the number of all sampled data packets. In
data encryption is needed, TARF requires that the pack-      our evaluation, throughput at a moment is computed
ets are properly authenticated, especially the broadcast     over the period from the beginning time (0) until that
packets from the base station. The broadcast from the        particular moment. Note that single-hop re-transmission
base station is asymmetrically authenticated so as to        may happen, and that duplicate packets are considered
guarantee that an adversary is not able to manipulate or     as one packet as far as throughput is concerned. Through-
forge a broadcast message from the base station at will.     put reflects how efficiently the network is collecting and
Importantly, with authenticated broadcast, even with         delivering data. Here we regard high throughput as one
the existence of attackers, TARF may use TrustManager        of our most important goals.
(Section 3.4) and the received broadcast packets about       Energy Efficiency Data transmission accounts for a ma-
delivery information (Section 3.2.1) to choose trustwor-     jor portion of the energy consumption. We evaluate en-
thy path by circumventing compromised nodes. Without         ergy efficiency by the average energy cost to successfully
being able to physically capturing the base station, it is   deliver a unit-sized data packet from a source node to the
generally very difficult for the adversary to manipulate      base station. Note that link-level re-transmission should
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING                                                                                     4



be given enough attention when considering energy cost          necessary to delete some neighbors’ entries to keep the
since each re-transmission causes a noticeable increase in      table size acceptable. The technique of maintaining a
energy consumption. If every node in a WSN consumes             neighborhood table of a moderate size is demonstrated
approximately the same energy to transmit a unit-sized          by Woo, Tong and Culler [28]; TARF may employ the
data packet, we can use another metric hop-per-delivery         same technique.
to evaluate energy efficiency. Under that assumption, the           In TARF, in addition to data packet transmission, there
energy consumption depends on the number of hops,               are two types of routing information that need to be ex-
i.e. the number of one-hop transmissions occurring. To          changed: broadcast messages from the base station about
evaluate how efficiently energy is used, we can measure          data delivery and energy cost report messages from
the average hops that each delivery of a data packet            each node. Neither message needs acknowledgement. A
takes, abbreviated as hop-per-delivery.                         broadcast message from the base station is flooded to the
Scalability & Adaptability TARF should work well with           whole network. The freshness of a broadcast message
WSNs of large magnitude under highly dynamic con-               is checked through its field of source sequence number.
texts. We will evaluate the scalability and adaptability of     The other type of exchanged routing information is the
TARF through experiments with large-scale WSNs and              energy cost report message from each node, which is
under mobile and hash network conditions.                       broadcast to only its neighbors once. Any node receiving
   Here we do not include other aspects such as latency,        such an energy cost report message will not forward it.
load balance, or fairness. Low latency, balanced network           For each node N in a WSN, to maintain such a neigh-
load, and good fairness requirements can be enforced in         borhood table with trust level values and energy cost val-
specific routing protocols incorporating TARF.                   ues for certain known neighbors, two components, Ener-
                                                                gyWatcher and TrustManager, run on the node (Figure 2).
3   D ESIGN    OF   TARF                                        EnergyWatcher is responsible for recording the energy
TARF secures the multi-hop routing in WSNs against in-          cost for each known neighbor, based on N ’s observation
truders misdirecting the multi-hop routing by evaluating        of one-hop transmission to reach its neighbors and the
the trustworthiness of neighboring nodes. It identifies          energy cost report from those neighbors. A compromised
such intruders by their low trustworthiness and routes          node may falsely report an extremely low energy cost to
data through paths circumventing those intruders to             lure its neighbors into selecting this compromised node
achieve satisfactory throughput. TARF is also energy-           as their next-hop node; however, these TARF-enabled
efficient, highly scalable, and well adaptable. Before in-       neighbors eventually abandon that compromised next-
troducing the detailed design, we first introduce several        hop node based on its low trustworthiness as tracked
necessary notions here.                                         by TrustManager. TrustManager is responsible for tracking
Neighbor For a node N , a neighbor (neighboring node)           trust level values of neighbors based on network loop
of N is a node that is reachable from N with one-hop            discovery and broadcast messages from the base station
wireless transmission.                                          about data delivery. Once N is able to decide its next-
Trust level For a node N , the trust level of a neighbor is a   hop neighbor according to its neighborhood table, it
decimal number in [0, 1], representing N ’s opinion of that     sends out its energy report message: it broadcasts to
neighbor’s level of trustworthiness. Specifically, the trust     all its neighbors its energy cost to deliver a packet
level of the neighbor is N ’s estimation of the probability     from the node to the base station. The energy cost is
that this neighbor correctly delivers data received to the      computed as in Section 3.3 by EnergyWatcher. Such an
base station. That trust level is denoted as T in this paper.   energy cost report also serves as the input of its receivers’
Energy cost For a node N , the energy cost of a neighbor        EnergyWatcher.
is the average energy cost to successfully deliver a unit-
sized data packet with this neighbor as its next-hop                 One-hop
                                                                     Delivery
node, from N to the base station. That energy cost is
                                                                                                             Neighbor
denoted as E in this paper.                                        Energy Cost          EnergyWatcher       Energy Cost
                                                                     Report
                                                                                                          Neighborhood       Next-hop
                                                                                                              Table
3.1 Overview                                                       Network Loop                                              Selection
                                                                    Discovery
For a TARF-enabled node N to route a data packet to the                                  TrustManager      Neighbor Trust
                                                                                                               Level
                                                                                                                            Energy Cost
base station, N only needs to decide to which neighbor-            Base Station
                                                                                                                              Report
                                                                    Broadcast
ing node it should forward the data packet considering
both the trustworthiness and the energy efficiency. Once
                                                                Fig. 2.    Each node selects a next-hop node based on its
the data packet is forwarded to that next-hop node, the         neighborhood table, and broadcast its energy cost within its
remaining task to deliver the data to the base station is       neighborhood. To maintain this neighborhood table, Energy-
fully delegated to it, and N is totally unaware of what         Watcher and TrustManager on the node keep track of related
routing decision its next-hop node makes. N maintains           events (on the left) to record the energy cost and the trust level
a neighborhood table with trust level values and energy         values of its neighbors.
cost values for certain known neighbors. It is sometimes
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING                                                                    5



3.2 Routing Procedure                                        explained as follows: the fact that an attacker attracts a
TARF, as with many other routing protocols, runs as a        great deal of traffic from many nodes often gets revealed
periodic service. The length of that period determines       by at least several of those nodes being deceived with
how frequently routing information is exchanged and          a high likelihood. The undelivered sequence interval [a,
updated. At the beginning of each period, the base           b] is explained as follows: the base station searches the
station broadcasts a message about data delivery during      source sequence numbers received in last period, identi-
last period to the whole network consisting of a few         fies which source sequence numbers for the source node
contiguous packets (one packet may not hold all the          with this id are missing, and chooses certain significant
information). Each such packet has a field to indicate        interval [a, b] of missing source sequence numbers as
how many packets are remaining to complete the broad-        an undelivered sequence interval. For example, the base
cast of the current message. The completion of the base      station may have all the source sequence numbers for the
station broadcast triggers the exchange of energy report     source node 2 as {109, 110, 111, 150, 151} in last period.
in this new period. Whenever a node receives such a          Then [112, 149] is an undelivered sequence interval;
broadcast message from the base station, it knows that       [109, 151] is also recorded as the sequence boundary
the most recent period has ended and a new period has        of delivered packets. Since the base station is usually
just started. No tight time synchronization is required      connected to a powerful platform such as a desktop, a
for a node to keep track of the beginning or ending of a     program can be developed on that powerful platform to
period. During each period, the EnergyWatcher on a node      assist in recording all the source sequence numbers and
monitors energy consumption of one-hop transmission          finding undelivered sequence intervals.
to its neighbors and processes energy cost reports from         Accordingly, each node in the network stores a table
those neighbors to maintain energy cost entries in its       of <node id of a source node, a forwarded sequence
                                                             interval [a, b] with a significant length> about last
neighborhood table; its TrustManager also keeps track of
network loops and processes broadcast messages from          period. The data packets with the source node and the
the base station about data delivery to maintain trust       sequence numbers falling in this forwarded sequence
                                                             interval [a, b] have already been forwarded by this node.
level entries in its neighborhood table.
                                                             When the node receives a broadcast message about data
   To maintain the stability of its routing path, a node
                                                             delivery, its TrustManager will be able to identify which
may retain the same next-hop node until the next fresh
                                                             data packets forwarded by this node are not delivered to
broadcast message from the base station occurs. Mean-
                                                             the base station. Considering the overhead to store such
while, to reduce traffic, its energy cost report could
                                                             a table, old entries will be deleted once the table is full.
be configured to not occur again until the next fresh
                                                                Once a fresh broadcast message from the base station
broadcast message from the base station. If a node does
                                                             is received, a node immediately invalidates all the ex-
not change its next-hop node selection until the next
                                                             isting energy cost entries: it is ready to receive a new
broadcast message from the base station, that guaran-
                                                             energy report from its neighbors and choose its new
tees all paths to be loop-free, as can be deducted from
                                                             next-hop node afterwards. Also, it is going to select a
the procedure of next-hop node selection. However, as
                                                             node either after a timeout is reached or after it has
noted in our experiments, that would lead to slow
                                                             received an energy cost report from some highly trusted
improvement in routing paths. Therefore, we allow a
                                                             candidates with acceptable energy cost. A node imme-
node to change its next-hop selection in a period when
                                                             diately broadcasts its energy cost to its neighbors only
its current next-hop node performs the task of receiving
                                                             after it has selected a new next-hop node. That energy
and delivering data poorly.
                                                             cost is computed by its EnergyWatcher (see Section 3.3).
   Next, we introduce the structure and exchange of
                                                             A natural question is which node starts reporting its
routing information as well as how nodes make routing
                                                             energy cost first. For that, note that when the base station
decisions in TARF.
                                                             is sending a broadcast message, a side effect is that its
                                                             neighbors receiving that message will also regard this
3.2.1   Structure and Exchange of Routing Information        as an energy report: the base station needs 0 amount
A broadcast message from the base station fits into at        of energy to reach itself. As long as the original base
most a fixed small number of packets. Such a message          station is faithful, it will be viewed as a trustworthy
consists of some pairs of <node id of a source node, an      candidate by TrustManager on the neighbors of the base
undelivered sequence interval [a, b] with a significant       station. Therefore, those neighbors will be the first nodes
length>, <node id of a source node, minimal sequence         to decide their next-hop node, which is the base station;
number received in last period, maximum sequence             they will start reporting their energy cost once that
number received in last period>, as well as several node     decision is made.
id intervals of those without any delivery record in last
period. To reduce overhead to an acceptable amount,          3.2.2 Route Selection
our implementation selects only a limited number of          Now, we introduce how TARF decides routes in a WSN.
such pairs to broadcast (Section 5.1) and proved effec-      Each node N relies on its neighborhood table to select an
tive (Section 5.3, 5.4). Roughly, the effectiveness can be   optimal route, considering both energy consumption and
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING                                                                     6



reliability. TARF makes good efforts in excluding those       relation:
nodes that misdirect traffic by exploiting the replay of
                                                                                     EN b = EN →b + Eb
routing information.
   For a node N to select a route for delivering data         Since each known neighbor b of N is supposed to
to the base station, N will select an optimal next-hop        broadcast its own energy cost Eb to N , to compute EN b ,
node from its neighbors based on trust level and energy       N still needs to know the value EN →b , i.e., the average
cost and forward the data to the chosen next-hop node         energy cost of successfully delivering a data packet from
immediately. The neighbors with trust levels below a          N to its neighbor b with one hop. For that, assuming
certain threshold will be excluded from being considered      that the endings (being acknowledged or not) of one-
as candidates. Among the remaining known neighbors,           hop transmissions from N to b are independent with
N will select its next-hop node through evaluating each       the same probability psucc of being acknowledged, we
neighbor b based on a trade-off between TN b and EN b ,
                                                      T
                                                        Nb    first compute the average number of one-hop sendings
with EN b and TN b being b’s energy cost and trust level      needed before the acknowledgement is received as fol-
value in the neighborhood table respectively (see Sec-        lows:
                                                                          ∞
tion 3.3, 3.4). Basically, EN b reflects the energy cost of                                                        1
delivering a packet to the base station from N assuming                         i · psucc · (1 − psucc )i−1 =
                                               1                          i=1
                                                                                                                psucc
that all the nodes in the route are honest; TN b approx-
imately reflects the number of the needed attempts to          Denote Eunit as the energy cost for node N to send a
send a packet from N to the base station via multiple         unit-sized data packet once regardless of whether it is
hops before such an attempt succeeds, considering the         received or not. Then we have
trust level of b. Thus, EN b combines the trustworthiness
                          Nb                                                             Eunit
                        T                                                         EN b =       + Eb
and energy cost. However, the metric EN b suffers from
                                          T
                                            Nb                                           psucc
the fact that an adversary may falsely reports extremely      The remaining job for computing EN b is to get the proba-
low energy cost to attract traffic and thus resulting in a     bility psucc that a one-hop transmission is acknowledged.
low value of EN b even with a low TN b . Therefore, TARF
               T
                 Nb
                                                              Considering the variable wireless connection among
prefers nodes with significantly higher trust values; this     wireless sensor nodes, we do not use the simplistic
preference of trustworthiness effectively protects the net-   averaging method to compute psucc . Instead, after each
work from an adversary who forges the identity of an          transmission from N to b, N ’s EnergyWatcher will update
attractive node such as a base station. For deciding the      psucc based on whether that transmission is acknowl-
next-hop node, a specific trade-off between TN b and EN b
                                                       T
                                                         Nb
                                                              edged or not with a weighted averaging technique. We
is demonstrated in Figure 5 (see Section 5.2).                use a binary variable Ack to record the result of current
   Observe that in an ideal misbehavior-free environ-         transmission: 1 if an acknowledgement is received; oth-
ment, all nodes are absolutely faithful, and each node        erwise, 0. Given Ack and the last probability value of an
will choose a neighbor through which the routing path         acknowledged transmission pold succ , an intuitive way is
is optimized in terms of energy; thus, an energy-driven       to use a simply weighted average of Ack and pold succ as
route is achieved.                                            the value of pnew succ . That is what is essentially adopted
                                                              in the aging mechanism [29]. However, that method used
3.3 EnergyWatcher                                             against sleeper attacks still suffers periodic attacks [30].
                                                              To solve this problem, we update the psucc value using
Here we describe how a node N ’s EnergyWatcher com-           two different weights as in our previous work [30], a
putes the energy cost EN b for its neighbor b in N ’s         relatively big wdegrade ∈ (0, 1) and a relatively small
neighborhood table and how N decides its own energy           wupgrade ∈ (0, 1) as follows:
cost EN . Before going further, we will clarify some                        
notations. EN b mentioned is the average energy cost                         (1 − wdegrade ) × pold succ + wdegrade × Ack,
                                                                            
                                                                               if Ack = 0.
                                                                            
of successfully delivering a unit-sized data packet from      pnew succ =
N to the base station, with b as N ’s next-hop node                          (1 − wupgrade ) × pold succ + wupgrade × Ack,
                                                                            
                                                                               if Ack = .1
                                                                            
being responsible for the remaining route. Here, one-hop
re-transmission may occur until the acknowledgement           The two parameters wdegrade and wupgrade allow flexible
is received or the number of re-transmissions reaches         application requirements. wdegrade and wupgrade repre-
a certain threshold. The cost caused by one-hop re-           sent the extent to which upgraded and degraded per-
transmissions should be included when computing EN b .        formance are rewarded and penalized, respectively. If
Suppose N decides that A should be its next-hop node          any fault and compromise is very likely to be associated
after comparing energy cost and trust level. Then N ’s        with a high risk, wdegrade should be assigned a relatively
energy cost is EN = EN A . Denote EN →b as the average        high value to penalize fault and compromise relatively
energy cost of successfully delivering a data packet from     heavily; if a few positive transactions can’t constitute ev-
N to its neighbor b with one hop. Note that the re-           idence of good connectivity which requires many more
transmission cost needs to be considered. With the above      positive transactions, then wupgrade should be assigned
notations, it is straightforward to establish the following   a relatively low value.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING                                                                         7



3.4 TrustManager                                               are forwarded by this node to the number of those
A node N ’s TrustManager decides the trust level of            forwarded data packets, denoted as DeliveryRatio. Then
each neighbor based on the following events: discovery         N ’s TrustManager updates its next-hop node b’s trust
of network loops, and broadcast from the base station          level as follows:
                                                                                 
about data delivery. For each neighbor b of N , TN b                              (1 − wdegrade ) × Told N b
                                                                                 
denotes the trust level of b in N ’s neighborhood table.                          +wdegrade × DeliveryRatio,
                                                                                 
                                                                                 
                                                                                 
At the beginning, each neighbor is given a neutral trust                          if DeliveryRatio < Told N b .
                                                                                 
                                                                                 
level 0.5. After any of those events occurs, the relevant            Tnew N b =
neighbors’ trust levels are updated.                                              (1 − wupgrade ) × Told N b
                                                                                 
                                                                                 
                                                                                 
   Note that many existing routing protocols have their                           +wupgrade × DeliveryRatio,
                                                                                 
                                                                                 
                                                                                 
own mechanisms to detect routing loops and to react                              
                                                                                   if DeliveryRatio >= Told N b .
accordingly [31], [32], [28]. In that case, when integrating
TARF into those protocols with anti-loop mechanisms,
                                                               3.5 Analysis on EnergyWatcher and TrustManager
TrustManager may solely depend on the broadcast from
the base station to decide the trust level; we adopted         Now that a node N relies on its EnergyWatcher and
such a policy when implementing TARF later (see Sec-           TrustManager to select an optimal neighbor as its next-
tion 5). If anti-loop mechanisms are both enforced in          hop node, we would like to clarify a few important
the TARF component and the routing protocol that in-           points on the design of EnergyWatcher and TrustManager.
tegrates TARF, then the resulting hybrid protocol may              First, as described in Section 3.1, the energy cost report
overly react towards the discovery of loops. Though so-        is the only information that a node is to passively receive
phisticated loop-discovery methods exist in the currently      and take as “fact”. It appears that such acceptance of en-
developed protocols, they often rely on the comparison         ergy cost report could be a pitfall when an attacker or a
of specific routing cost to reject routes likely leading to     compromised node forges false report of its energy cost.
loops [32]. To minimize the effort to integrate TARF and       Note that the main interest of an attacker is to prevent
the existing protocol and to reduce the overhead, when         data delivery rather than to trick a data packet into a less
an existing routing protocol does not provide any anti-        efficient route, considering the effort it takes to launch
loop mechanism, we adopt the following mechanism to            an attack. As far as an attack aiming at preventing data
detect routing loops. To detect loops, the TrustManager        delivery is concerned, TARF well mitigates the effect of
on N reuses the table of <node id of a source node,            this pitfall through the operation of TrustManager. Note
a forwarded sequence interval [a, b] with a significant         that the TrustManager on one node does not take any rec-
length> (see Section 3.2) in last period. If N finds that a     ommendation from the TrustManager on another node.
received data packet is already in that record table, not      If an attacker forges false energy report to form a false
only will the packet be discarded, but the TrustManager        route, such intention will be defeated by TrustManager:
on N also degrades its next-hop node’s trust level. If         when the TrustManager on one node finds out the many
that next-hop node is b, then Told N b is the latest trust     delivery failures from the broadcast messages of the base
level value of b. We use a binary variable Loop to record      station, it degrades the trust level of its current next-hop
the result of loop discovery: 0 if a loop is received; 1       node; when that trust level goes below certain threshold,
otherwise. As in the update of energy cost, the new trust      it causes the node to switch to a more promising next-
level of b is                                                  hop node.
                                                                  Second, TrustManager identities the low trustworthi-
             (1 − wdegrade ) × Told N b + wdegrade × Loop,
                                                              ness of various attackers misdirecting the multi-hop
               if Loop = 0.
            
Tnew N b =                                                     routing, especially those exploiting the replay of routing
             (1 − wupgrade ) × Told N b + wupgrade × Loop,
                                                              information. It is noteworthy that TrustManager does not
               if Loop = 1.
            
                                                               distinguish whether an error or an attack occurs to the
   Once a loop has been detected by N for a few times          next-hop node or other succeeding nodes in the route.
so that the trust level of the next-hop node is too low,       It seems unfair that TrustManager downgrades the trust
N will change its next-hop selection; thus, that loop is       level of an honest next-hop node while the attack occurs
broken. Though N can not tell which node should be             somewhere after that next-hop node in the route. Con-
held responsible for the occurrence of a loop, degrading       trary to that belief, TrustManager significantly improves
its next-hop node’s trust level gradually leads to the         data delivery ratio in the existence of attack attempts of
breaking of the loop. On the other hand, to detect the         preventing data delivery. First of all, it is often difficult to
traffic misdirection by nodes exploiting the replay of          identify an attacker who participates in the network us-
routing information, TrustManager on N compares N’s            ing an id “stolen” from another legal node. For example,
stored table of <node id of a source node, forwarded se-       it is extremely difficult to detect a few attackers colluding
quence interval [a, b] with a significant length> recorded      to launch a combined wormhole and sinkhole attack [4].
in last period with the broadcast messages from the            Additionally, despite the certain inevitable unfairness
base station about data delivery. It computes the ratio        involved, TrustManager encourages a node to choose
of the number of successfully delivered packets which          another route when its current route frequently fails to
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING                                                                     8



deliver data to the base station. Though only those legal     Matlab to test TARF. We have conducted extensive sim-
neighboring nodes of an attacker might have correctly         ulation experiments; however, due to the page limit,
identified the adversary, our evaluation results indicate      interested readers may refer to our technical report [33]
that the strategy of switching to a new route without         and the conference version of paper [1] for detailed
identifying the attacker actually significantly improves       simulation settings and experimental results. In our ex-
the network performance, even with the existence of           periments, initially, 35 nodes are randomly distributed
wormhole and sinkhole attacks. Fig 3 gives an example to      within a 300*300 rectangular area, with unreliable wire-
illustrate this point. In this example, node A, B, C and D    less transmission. All the nodes have the same power
are all honest nodes and not compromised. Node A has          level and the same maximal transmission range of 100m.
node B as its current next-hop node while node B has an       Each node samples 6 times in every period; the timing
attacker node as its next-hop node. The attacker drops        gap between every two consecutive samplings of the
every packet received and thus any data packet passing        same node is equivalent. We simulate the sensor network
node A will not arrive at the base station. After a while,    in 1440 consecutive periods.
node A discovers that the data packets it forwarded did          Regarding the network topology, we set up three types
not get delivered. The TrustManager on node A starts to       of network topologies. The first type is the static-location
degrade the trust level of its current next-hop node B        case under which all nodes stand still. The second type
although node B is absolutely honest. Once that trust         is a customized group-motion-with-noise case based on
level becomes too low, node A decides to select node C        Reference Point Group Mobility (RPGM) model that
as its new next-hop node. In this way node A identifies a      mimics the behavior of a set of nodes moving in one
better and successful route (A - C - D - base). In spite of   or more groups [34], [35]. The last type of dynamic
the sacrifice of node B’s trust level, the network performs    network incorporated in the experiments is the addition
better. Further, concerning the stability of routing path,    of scattered RF-shielded areas to the aforementioned
                                                              group-motion-with-noise case.
                                                                 The performance of TARF is compared to that of a
                      B                                       link connectivity-based routing protocol adapted from
                               Attacker
                                                              what is proposed by Alec Woo, Terence Tong and
        A                                                     David Culler [28]. We denote the link connectivity-
                                           Base Station       based routing protocol as Link-connectivity. With the
                                                              Link-connectivity protocol, each node selects its next-hop
                      C          D
                                                              node among its neighborhood table according to an
Fig. 3. An example to illustrate how TrustManager works.      link estimator based on exponentially weighted moving
                                                              average (EWMA). The simulation results show, in the
                                                              presence of misbehaviors, the throughput in TARF is often
once a valid node identifies a trustworthy honest neigh-
                                                              much higher than that in Link-connectivity; the hop-per-
bor as its next-hop node, it tends to keep that next-hop
                                                              delivery in the Link-connectivity protocol is generally at
selection without considering other seemingly attractive
                                                              least comparable to that in TARF.
nodes such as a fake base station. That tendency is
                                                                 Under a misbehavior-free environment, the simula-
caused by both the preference to maintain stable routes
                                                              tion results show that TARF and Link-connectivity have
and the preference to highly trustable nodes.
                                                              comparable performance when there is no adversary.
   Finally, we would like to stress that TARF is designed
                                                              Both protocols are also evaluated under three common
to guard a WSN against the attacks misdirecting the
                                                              types of attacks: (1) a certain node forges the identity of
multi-hop routing, especially those based on identity
                                                              the based station by replaying broadcast messages, also
theft through replaying the routing information. Other
                                                              known as the sinkhole attack; (2) a set of nodes colludes to
types of attacks such as the denial-of-service (DoS) [3]
                                                              form a forwarding loop; and (3) a set of nodes drops re-
attacks are out of the discussion of this paper. For
                                                              ceived data packets. These experiments were conducted
instance, we do not address the attacks of injecting
                                                              in the static case, the group-motion-with-noise case, and
into the network a number of data packets containing
                                                              the addition of RF-shielded areas to the group-motion-
false sensing data but authenticated (possibly through
                                                              with-noise case separately. Generally, under these com-
hacking). That type of attacks aim to exhaust the network
                                                              mon attacks, TARF produces a substantial improvement
resource instead of misdirecting the routing. However, if
                                                              over Link-connectivity in terms of data collection and en-
the attacker intends to periodically inject a few routing
                                                              ergy efficiency. Further, we have evaluated TARF under
packets to cause wrong route, such attacks can still be
                                                              more severe attacks: multiple moving fake bases and
defended by TARF through TrustManager.
                                                              multiple Sybil attackers. As before, the experiments are
                                                              conducted under all the three types of network topology.
                                                              Under these two types of most severe attacks which
4   S IMULATION
                                                              almost devastates the Link-connectivity protocol, TARF
We have developed a reconfigurable emulator of wire-           succeeds in achieving a steady improvement over the
less sensor networks on a two-dimensional plane with          Link-connectivity protocol. Finally, we have conducted
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING                                                                                                       9



certain experiments to explore the choice of the period       sensing frequency, the energy efficiency and trustworthi-
length and the trust updating scheme. Our experiments         ness requirement. TrustManagerC provides two inter-
reveal that a shorter period or a faster trust updating       faces (see Figure 4), TrustControl and Record, which
scheme may not necessarily benefit TARF.                       are implemented in other modules. The TrustControl
                                                              interface provides the commands to enable and disable
                                                              the trust evaluation, while the Record interface provides
5   I MPLEMENTATION        AND   E MPIRICAL E VALUA -         the commands for a root, i.e., a base station, to add
TION                                                          delivered message record, for a non-root node to add
                                                              forwarded message record, and for a node to retrieve the
In order to evaluate TARF in a real-world setting, we         trust level of any neighboring node. The implementation
implemented the TrustManager component on TinyOS              on a root node differs from that on a non-root node: a
2.x, which can be integrated into the existing routing pro-   root node stores the information of messages received
tocols for WSNs with the least effort. Originally, we had     (delivered) during the current period into a record table
implemented TARF as a self-contained routing proto-           and broadcast delivery failure record; a non-root node
col [1] on TinyOS 1.x before this second implementation.      stores the information of forwarded messages during the
However, we decided to re-design the implementation           current period also in a record table and compute the
considering the following factors. First, the first imple-     trust of its neighbors based on that and the broadcast in-
mentation only supports TinyOS 1.x, which was replaced        formation. Noting that much implementation overhead
by TinyOS 2.x; the porting procedure from TinyOS 1.x          for a root can always be transferred to a more powerful
to TinyOS 2.x tends to frustrate the developers. Second,      device connected to the root, it is reasonable to assume
rather than developing a self-contained routing protocol,     that the root would have great capability of processing
the second implementation only provides a TrustMan-           and storage.
ager component that can be easily incorporated into the
existing protocols for routing decisions. The detection        configuration TrustManagerC {                      interface TrustControl
of routing loops and the corresponding reaction are              provides {                                       {
excluded from the implementation of TrustManager since             interface TrustControl;                           //enable trust evaluation
                                                                   interface Record;                                 command error_t start();
many existing protocols, such as Collection Tree Proto-          }                                                  //disable trust evaluation
col [32] and the link connectivity-based protocol [28],          implementation {                                    command error_t stop();
                                                                   ...........................................    }
already provide that feature. As we worked on the first           }
implementation, we noted that the existing protocols           }
provide many nice features, such as the analysis of
link quality, the loop detection and the routing decision      interface Record
                                                               {
mainly considering the communication cost. Instead of            //for a root to add delivered record <source node id, source sequence number>
providing those features, our implementation focuses             command void addDelivered(am_addr_t src, uint8_t seq);
                                                                 //for a non-root node to add forwarded record <source id, source sequence, next-hop id>
on the trust evaluation based on the base broadcast              command void addForwarded(am_addr_t src, uint8_t seq, am_addr_t next);
of the data delivery, and such trust information can             //return the trust level of a node
                                                                 command uint16_t getTrust(am_addr_t id);
be easily reused by other protocols. Finally, instead of       }
using TinySec [13] exclusively for encryption and au-
thentication as in the first implementation on TinyOS 1.x,
                                                              Fig. 4. TrustManager component.
this re-implementation let the developers decide which
encryption or authentication techniques to employ; the           A root broadcasts two types of delivery failure record:
encryption and authentication techniques of TARF may          at most three packets of significant undelivered intervals
be different than that of the existing protocol.              for individual origins and at most two packets of the id’s
                                                              of the origins without any record in the current period.
                                                              For each origin, at most three significant undelivered
5.1 TrustManager Implementation Details
                                                              intervals are broadcast. For a non-root node, considering
The TrustManager component in TARF is wrapped                 the processing and memory usage overhead, the record
into an independent TinyOS configuration named                 table keeps the forwarded message intervals for up to 20
TrustManagerC. TrustManagerC uses a dedicated                 source nodes, with up to 5 non-overlapped intervals for
logic channel for communication and runs as a periodic        each individual origin. Our later experiments verify that
service with a configurable period, thus not interfering       such size limit of the table on a non-root node produces a
with the application code. Though it is possible to im-       resilient TARF with moderate overhead. The record table
plement TARF with a period always synchronized with           on a node keeps adding entries for new origins until it
the routing protocol’s period, that would cause much in-      is full.
trusion into the source code of the routing protocol. The        With our current implementation, a valid trust value is
current TrustManagerC uses a period of 30 seconds;            an integer between 0 and 100, and any node is assigned
for specific applications, by modifying a certain header       an initial trust value of 50. The weigh parameters are:
file, the period length may be re-configured to reflect the      wupgrade = 0.1, wdegrade = 0.3. The trust table of a
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING                                                                                                                    10



non-root node node keeps the trust level for up to 10          candidate has a trust level above certain threshold. The
neighbors. Considering that an attacker may present            reason is, the sole trust/cost criteria could be exploited
multiple fake id’s, the implementation evicts entries with     by an adversary replaying the routing information from
a trust level close to the initial trust of any node. Such     a base station and thus pretending to be an extremely
eviction policy is to ensure that the trust table remembers    attractive node. As for Step 2, compared to the CTP
those neighbors with high trust and low trust; any other       implementation, we add two more circumstances when
neighbor not in this table is deemed to have the initial       a node decides to switch to the optimal candidate found
trust value of 50.                                             at Step 1: that candidate has a higher trust level, or the
                                                               current next-hop neighbor has a too low trust level.
5.2 Incorporation of TARF into Existing Protocols
                                                                //Step 1. traverse the neighborhood table for an optimal candidate for the next hop
To demonstrate how this TARF implementation can be              optimal_candidate = NULL
                                                                //the cost of routing via the optimal candidate provided by the existing protocol, initially infinity
integrated into the exiting protocols with the least effort,    optimal_cost = MAX_COST
we incorporated TARF into a collection tree routing             //the trust level of the optimal candidate, initially 0
                                                                optimal_trust = MIN_TRUST
protocol (CTP) [32]. The CTP protocol is efficient, robust,      for each candidate in the neighborhood table
                                                                     if link is congested, or may cause a loop, or does not pass quality threshold
and reliable in a network with highly dynamic link                        continue
topology. It quantifies link quality estimation in order              better = false
                                                                     if candidate.trust >= optimal_trust && candidate.cost < optimal_cost
to choose a next-hop node. The software platform is                       better = true
                                                                     //prefer trustworthy candidates
TinyOS 2.x. To perform the integration, after proper                 if candidate.trust >= TRUST_THRESHOLD && optimal_trust < TRUST_THRESHOLD
interface wiring, invoke the TrustControl.start                           better = true
                                                                     if candidate.trust >= ESSENTIAL_DIFFERENCE_THRESHOLD + optimal_trust
command to enable the trust evaluation; call the                          better = true
                                                                     //effective when all nodes have low trust due to network change or poor connectivity
Record.addForwarded command for a non-root node                      if candidate.trust >= 3 * optimal_trust / 2
to add forwarded record once a data packet has been                       better = true
                                                                     //add restriction of trust level requirement
forwarded; call the Record.addDelivered command                      if candidate.trust >= TRUST_THRESHOLD && candidate.trust / candidate.cost >
                                                                optimal_trust / optimal_cost
for a root to add delivered record once a data packet has                 better = true
been received by the root. Finally, inside the CTP’s task            if better == true
                                                                          optimal_candidate = candidate
to update the routing path, call the Record.getTrust                      optimal_cost = candidate.cost
                                                                          optimal_trust = candidate.trust
command to retrieve the trust level of each next-hop
candidate; an algorithm taking trust into routing consid-       //Step 2. decide whether to switch from the current next-hop node to the optimal candidate found:
                                                                if optimal_trust >= currentNextHop.trust                                                          
eration is executed to decide the new next-hop neighbor          || currentNextHop.trust <= TRUST_THRESHOLD                                                       
                                                                 || current link is congested and switching is not likely to cause loops                          
(see Figure 5).                                                  || optimal_cost + NEXTHOP_SWITCH_THRESHOLD < currentNextHop.cost 
   Similar to the original CTP’s implementation, the im-             currentNextHop = optimal_candidate

plementation of this new protocol decides the next-hop
neighbor for a node with two steps (see Figure 5): Step        Fig. 5. Routing decision incorporating trust management.
1 traverses the neighborhood table for an optimal candi-
date for the next hop; Step 2 decides whether to switch          This new implementation integrating TARF requires
from the current next-hop node to the optimal candidate        moderate program storage and memory usage. We im-
found. For Step 1, as in the CTP implementation, a             plemented a typical TinyOS data collection application,
node would not consider those links congested, likely          MultihopOscilloscope, based on this new protocol. The
to cause a loop, or having a poor quality lower than           MultihopOscilloscope application, with certain modified
a certain threshold. This new implementation prefers           sensing parameters for our later evaluation purpose,
those candidates with higher trust levels; in certain          periodically makes sensing samples and sends out the
circumstances, regardless of the link quality, the rules       sensed data to a root via multiple routing hops. Orig-
deems a neighbor with a much higher trust level to             inally, MultihopOscilloscope uses CTP as its routing
be a better candidate (see Figure 5). The preference of        protocol. Now, we list the ROM size and RAM size
highly trustable candidates is based on the following          requirement of both implementation of MultihopOscillo-
consideration: on the one hand, it creates the least chance    scope on non-root Telosb motes in Table 1. The enabling
for an adversary to misguide other nodes into a wrong          of TARF in MultihopOscilloscope increases the size of
routing path by forging the identity of an attractive          ROM by around 1.3KB and the size of memory by
node such as a root; on the other hand, forwarding data        around 1.2KB.
packets to a candidate with a low trust level would result
in many unsuccessful link-level transmission attempts,                                TABLE 1
thus leading to much re-transmission and a potential           Size comparison of MultihopOscilloscope implementation
waste of energy. When the network throughput becomes
low and a node has a list of low-trust neighbors, the                           Protocol                           ROM (bytes)                RAM (bytes)
node will exclusively use the trust as the criterion to                           CTP                                31164                      3579
                                                                            TARF-enabled CTP                         34290                      4767
evaluate those neighbors for routing decisions. As show
in Figure 5, it uses trust/cost as a criteria only when the
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING                                                                    11



5.3 Empirical Evaluation on Motelab                             addition to programming those 91 motes with CTP, we
We evaluated the performance of TARF against a com-             also programmed the five fake base stations so that they
bined sinkhole and wormhole attack on Motelab [36] at           stole the id the base station through replaying. In the
Harvard University. 184 TMote Sky sensor motes were             last experiment, we programmed those 91 motes with
deployed across many rooms at three floors in the de-            the TARF-enabled CTP, and programmed the five fake
partment building (see Figure 6), with two to four motes        base stations as in the second experiment. Each of our
in most rooms. Around 97 nodes functioned properly              programs run for 30 minutes.
while the rest were either removed or disabled. Each               As illustrated in Figure 7(a), the existence of the five
mote has a 2.4GHz Chipcon CC2420 radio with an                  wormhole attackers greatly degraded the performance
indoor range of approximately 100 meters. In Figure 6,          of CTP: the number of the delivered data packets in
the thin green lines indicate the direct (one-hop) wireless     the case of CTP with the five-node wormhole is no more
connection between motes. Certain wireless connection           than 14% that in the case of CTP without adversaries.
also exists between nodes from different floors.                 The TARF-enabled CTP succeeded in bringing an
                                                                immense improvement over CTP in the presence of
                                                                the five-node wormhole, almost doubling the throughput.
                                                                That improvement did not show any sign of slowing
                                                                down as time elapsed. The number of nodes from each
                                                                floor that delivered at least one data packet in each
                                                                six-minute sub-period is plotted in Figure 7(a), 7(b) and
                                                                7(c) separately. On each floor, without any adversary,
                                                                at least 24 CTP nodes were able to find a successful
                                                                route in each six minute. However, with the five fake
                                                                base stations in the wormhole, the number of CTP nodes
                                                                that could find a successful route goes down to 9 for
                                                                the first floor; it decreases to no more than 4 for the
                                                                second floor; as the worst impact, none of the nodes on
                                                                the third floor ever found a successful route. A further
                                                                look at the data showed that all the nine nodes from
                                                                the first floor with successful delivery record were all
Fig. 6. Connectivity map of Motelab (not including the inter-   close to the real base station. The CTP nodes relatively
floor connectivity), adapted from Motelab[Motelab].              far away from the base station, such as those on the
                                                                second and the third floor, had little luck in making
   We developed a simple data collection application in         good routing decisions. When TARF was enabled on
TinyOS 2.x that sends a data packet every five seconds to        each node, most nodes made correct routing decisions
a base station node (root) via multi-hop. This application      circumventing the attackers. That improvement can
was executed on 91 functioning non-root nodes on Mote-          be verified by the fact that the number of the TARF-
lab. For comparison, we used CTP and the TARF-enabled           enabled nodes with successful delivery record under
CTP implementation as the routing protocols for the data        the threat of the wormhole is close to that of CTP nodes
collection program separately. The TARF-enabled CTP             with no attackers, as shown in Figure 7(a), 7(b) and 7(c).
has a TARF period of 30 seconds. We conducted an attack
with five fake base stations that formed a wormhole. As
in Figure 6, whenever the base station sent out any             5.4 Application: Mobile Target Detection in the Pres-
packet, three fake base stations which overheard that           ence of an Anti-Detection Mechanism
packet replayed the complete packet without changing            To demonstrate how TARF can be applied in networked
any content including the node id. Other fake base              sensing systems, we developed a proof-of-concept re-
stations overhearing that replayed packet would also            silient application of target detection. This application
replay the same packet. Each fake base station essentially      relies on a deployed wireless sensor network to detect
launched a sinkhole attack. Note that there is a distinction    a target that could move, and to deliver the detection
between such malicious replay and the forwarding when           events to a base station via multiple hops with the TARF-
a well-behaved node receives a broadcast from the base          enabled CTP protocol. For simplification, the target is a
station. When a well-behaved node forwards a broadcast          LEGO MINDSTORM NXT 2.0 vehicle robot equipped
packet from the base station, it will include its own           with a TelosB mote that sends out an AM (Active
id in the packet so that its receivers will not recognize       Message) packet every three seconds. A sensor node
the forwarder as a base station. We conducted the first          receiving such a packet from the target issues a detection
experiment by uploading the program with the CTP                report, which will be sent to the base station with the
protocol onto 91 motes (not including those 5 selected          aforementioned TARF-enabled CTP protocol.
motes as fake bases in later experiments), and no attack           The experiment is set up within a clear floor space of
was involved here. Then, in another experiment, in              90 by 40 inches with 15 TelosB motes (see Figure 8(a)). To
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING                                                                                                                                    12

                                                   4
                                              x 10
                                         3
                                                       CTP without adversaries
                                                                                                                             power of all the Telosb motes except two fake base
          Number of delivered packets


                                                       CTP with 5-node wormhole                                              stations in the network is reduced through both software
                                        2.5            TARF-enabled CTP with 5-node wormhole
                                                                                                                             reduction and attenuator devices to within 30 inches. The
                                         2                                                                                   target uses an anti-detection mechanism utilizing a fake
                                                                                                                             base station close to the real base station, and another
                                        1.5                                                                                  remote base station close to the target and mounted on
                                                                                                                             another LEGO vehicle robot. The two fake base stations,
                                         1
                                                                                                                             with a transmission range of at least 100 feet, collude
                                        0.5                                                                                  to form a wormhole: the fake base station close to the
                                                                                                                             base station replays all the packets from the base station
                                         0
                                          0                 5            10        15        20           25            30
                                                                                                                             immediately; the remote fake base station, after receiving
                                                                         Time in minutes                                     those packets, immediately replays it again. This anti-
                                                            (a) All three floors.                                             detection mechanism tricks some network nodes into
                                                                                                                             sending their event reports into these fake base stations
                                                       26                     26
                                                                                                                             instead of the real base station. Though the fake base
                 Number of nodes with




                                              25                25                          25            25
                                                                         24                                        24
                                                                                                                             station close to the real base station is capable of cheating
                   delivery record




                                                                                       21
                                                                                                     20
                                                                                                                             the whole network alone by itself with its powerful radio
                                                                                                                             for a certain amount of time, it can be easily recognized
                                                   9                 9             9             9             9
                                                                                                                             by remote nodes as a poor next-hop candidate soon by
                                                                                                                             most routing protocols based on link quality: that fake
                                          [0min, 6min]          [6min,        [12min,       [18min,       [24min,
                                                                                                                             base station does not acknowledge the packets “sent”
                                                                12min]        18min]        24min]        30min]
                                                                                                                             to it from remote nodes with a weak radio via a single
                                                                               Time
                                                            CTP without adversaries                                          hop since it can not really receive them. Thus, the anti-
                                                            CTP with 5-node wormhole
                                                            TARF-enabled CTP with 5-node wormhole                            detection mechanism needs to create such a wormhole to
                                                                 (b) First floor.                                             replay the packets from the base station remotely.

                                              36       36       36            36            37            36
                                                                         34
                 Number of nodes with




                                                                                                     33            32
                                                                                       30
                   delivery record




                                                                                   4             3
                                                   2                 2                                         2


                                          [0min, 6min]          [6min,        [12min,       [18min,       [24min,
                                                                12min]        18min]        24min]        30min]
                                                                               Time
                                                            CTP without adversaries
                                                            CTP with 5-node wormhole
                                                            TARF-enabled CTP with 5-node wormhole


                                                                (c) Second floor.
                                                                                                                                          (a) A snapshot of the network.
                 Number of nodes with




                                              25       25       25            25            25
                                                                         24                               24
                                                                                       23                          23
                                                                                                     22
                   delivery record




                                                   0                 0             0             0             0

                                          [0min, 6min]          [6min,        [12min,       [18min,       [24min,
                                                                12min]        18min]        24min]        30min]
                                                                               Time
                                                            CTP without adversaries
                                                            CTP with 5-node wormhole
                                                            TARF-enabled CTP with 5-node wormhole


                                                                (d) Third floor.
Fig. 7. Empirical comparison of CTP and TARF-enabled CTP                                                                                          (b) A closer look.
on Motelab: (a) number of all delivered data packets since the
beginning; number of nodes on (b) the first floor, (c) the second                                                              Fig. 8. Deployment of a TARF-enabled wireless sensor network
floor and (d) the third floor that delivered at least one data packet                                                          to detect a moving target under the umbrella of two fake base
in sub-periods.                                                                                                              stations in a wormhole.

                                                                                                                                The target node 14 and the fake base station 13 close to
                                                                                                                             it move across the network along two parallel tracks of
make the multi-hop delivery necessary, the transmission                                                                      22 inches back and forth (see Figure 8(b)); they travel
Implementing TARF: A Trust-Aware Routing Framework for Securing Wireless Sensor Networks
Implementing TARF: A Trust-Aware Routing Framework for Securing Wireless Sensor Networks
Implementing TARF: A Trust-Aware Routing Framework for Securing Wireless Sensor Networks

Más contenido relacionado

La actualidad más candente

A NEW CLUSTER-BASED WORMHOLE INTRUSION DETECTION ALGORITHM FOR MOBILE AD-HOC ...
A NEW CLUSTER-BASED WORMHOLE INTRUSION DETECTION ALGORITHM FOR MOBILE AD-HOC ...A NEW CLUSTER-BASED WORMHOLE INTRUSION DETECTION ALGORITHM FOR MOBILE AD-HOC ...
A NEW CLUSTER-BASED WORMHOLE INTRUSION DETECTION ALGORITHM FOR MOBILE AD-HOC ...IJNSA Journal
 
REPLICATION ATTACK MITIGATIONS FOR STATIC AND MOBILE WSN
REPLICATION ATTACK MITIGATIONS FOR STATIC AND MOBILE WSNREPLICATION ATTACK MITIGATIONS FOR STATIC AND MOBILE WSN
REPLICATION ATTACK MITIGATIONS FOR STATIC AND MOBILE WSNIJNSA Journal
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networksnagibtech
 
A Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANET
A Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANETA Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANET
A Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANETIJERA Editor
 
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...IOSR Journals
 
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...IOSR Journals
 
Mitigation of Colluding Selective Forwarding Attack in WMNs using FADE
Mitigation of Colluding Selective Forwarding Attack in WMNs using FADEMitigation of Colluding Selective Forwarding Attack in WMNs using FADE
Mitigation of Colluding Selective Forwarding Attack in WMNs using FADEIJTET Journal
 
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING  INTERNAL ATTACK FROM WSNSA NOVEL TWO-STAGE ALGORITHM PROTECTING  INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNSIJCNC
 
DOS Attacks on TCP/IP Layers in WSN
DOS Attacks on TCP/IP Layers in WSNDOS Attacks on TCP/IP Layers in WSN
DOS Attacks on TCP/IP Layers in WSNijcncs
 
A survey on complex wormhole attack in wireless
A survey on complex wormhole attack in wirelessA survey on complex wormhole attack in wireless
A survey on complex wormhole attack in wirelessfarrukh Farrukh
 
disruption of black hole attacks in manet
disruption of black hole attacks in manetdisruption of black hole attacks in manet
disruption of black hole attacks in manetINFOGAIN PUBLICATION
 
Securing the Data Communication between the Neighboring Sensor Nodes using Bi...
Securing the Data Communication between the Neighboring Sensor Nodes using Bi...Securing the Data Communication between the Neighboring Sensor Nodes using Bi...
Securing the Data Communication between the Neighboring Sensor Nodes using Bi...IJMTST Journal
 
A Review of Network Layer Attacks and Countermeasures in WSN
A Review of Network Layer Attacks and Countermeasures in WSNA Review of Network Layer Attacks and Countermeasures in WSN
A Review of Network Layer Attacks and Countermeasures in WSNiosrjce
 

La actualidad más candente (16)

A NEW CLUSTER-BASED WORMHOLE INTRUSION DETECTION ALGORITHM FOR MOBILE AD-HOC ...
A NEW CLUSTER-BASED WORMHOLE INTRUSION DETECTION ALGORITHM FOR MOBILE AD-HOC ...A NEW CLUSTER-BASED WORMHOLE INTRUSION DETECTION ALGORITHM FOR MOBILE AD-HOC ...
A NEW CLUSTER-BASED WORMHOLE INTRUSION DETECTION ALGORITHM FOR MOBILE AD-HOC ...
 
REPLICATION ATTACK MITIGATIONS FOR STATIC AND MOBILE WSN
REPLICATION ATTACK MITIGATIONS FOR STATIC AND MOBILE WSNREPLICATION ATTACK MITIGATIONS FOR STATIC AND MOBILE WSN
REPLICATION ATTACK MITIGATIONS FOR STATIC AND MOBILE WSN
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
1705 1708
1705 17081705 1708
1705 1708
 
A Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANET
A Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANETA Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANET
A Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANET
 
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...
 
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...
 
Mitigation of Colluding Selective Forwarding Attack in WMNs using FADE
Mitigation of Colluding Selective Forwarding Attack in WMNs using FADEMitigation of Colluding Selective Forwarding Attack in WMNs using FADE
Mitigation of Colluding Selective Forwarding Attack in WMNs using FADE
 
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING  INTERNAL ATTACK FROM WSNSA NOVEL TWO-STAGE ALGORITHM PROTECTING  INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
 
K1803036872
K1803036872K1803036872
K1803036872
 
DOS Attacks on TCP/IP Layers in WSN
DOS Attacks on TCP/IP Layers in WSNDOS Attacks on TCP/IP Layers in WSN
DOS Attacks on TCP/IP Layers in WSN
 
A survey on complex wormhole attack in wireless
A survey on complex wormhole attack in wirelessA survey on complex wormhole attack in wireless
A survey on complex wormhole attack in wireless
 
disruption of black hole attacks in manet
disruption of black hole attacks in manetdisruption of black hole attacks in manet
disruption of black hole attacks in manet
 
Securing the Data Communication between the Neighboring Sensor Nodes using Bi...
Securing the Data Communication between the Neighboring Sensor Nodes using Bi...Securing the Data Communication between the Neighboring Sensor Nodes using Bi...
Securing the Data Communication between the Neighboring Sensor Nodes using Bi...
 
A Review of Network Layer Attacks and Countermeasures in WSN
A Review of Network Layer Attacks and Countermeasures in WSNA Review of Network Layer Attacks and Countermeasures in WSN
A Review of Network Layer Attacks and Countermeasures in WSN
 

Destacado

LibroSIG: Aprendiendo a manejar los SIG en la gestión ambiental
LibroSIG: Aprendiendo a manejar los SIG en la gestión ambientalLibroSIG: Aprendiendo a manejar los SIG en la gestión ambiental
LibroSIG: Aprendiendo a manejar los SIG en la gestión ambientalPedro Roberto Casanova
 
Identificación de peligros e identificación de riesgos y controles -IPERC
Identificación de peligros e identificación de riesgos y controles -IPERCIdentificación de peligros e identificación de riesgos y controles -IPERC
Identificación de peligros e identificación de riesgos y controles -IPERCTVPerú
 
A Wandering Round Robin Legacy - Gen. 1 - Deel 4
A Wandering Round Robin Legacy - Gen. 1 - Deel 4A Wandering Round Robin Legacy - Gen. 1 - Deel 4
A Wandering Round Robin Legacy - Gen. 1 - Deel 4dutch_girl2
 
Pcn 09 LíNgua Estrangeira
Pcn   09   LíNgua EstrangeiraPcn   09   LíNgua Estrangeira
Pcn 09 LíNgua Estrangeiraliteratoliberato
 
Lineamientos para la_practica_evaluativa_docente
Lineamientos para la_practica_evaluativa_docenteLineamientos para la_practica_evaluativa_docente
Lineamientos para la_practica_evaluativa_docenteJorge Hugo Rojas Beltran
 
Material monster is ii emco
Material  monster is ii emcoMaterial  monster is ii emco
Material monster is ii emcoFranz Marulanda
 
Evaluacion de desempeños
Evaluacion de desempeñosEvaluacion de desempeños
Evaluacion de desempeños19472546
 
¿Qué es un modelo de negocio?
¿Qué es un modelo de negocio?¿Qué es un modelo de negocio?
¿Qué es un modelo de negocio?Omar Vite
 
Total Quality Service Management Book 1
Total Quality Service Management Book 1Total Quality Service Management Book 1
Total Quality Service Management Book 1aireen clores
 
Simplifiez votre activité grâce au traitement documentaire intelligent
Simplifiez votre activité grâce au traitement documentaire intelligentSimplifiez votre activité grâce au traitement documentaire intelligent
Simplifiez votre activité grâce au traitement documentaire intelligentXerox Global
 
Gerenciamento de projetos apostila completa
Gerenciamento de projetos   apostila completaGerenciamento de projetos   apostila completa
Gerenciamento de projetos apostila completaPaulo Junior
 
Aprovechamiento rso uencolombia
Aprovechamiento rso uencolombiaAprovechamiento rso uencolombia
Aprovechamiento rso uencolombiaRaychi Rodriguez
 
Guia informaticabasica
Guia informaticabasicaGuia informaticabasica
Guia informaticabasicalinda31
 
Gfpi f-019 guia de aprendizaje 01 tda orientar fpi
Gfpi f-019 guia de aprendizaje 01 tda orientar fpiGfpi f-019 guia de aprendizaje 01 tda orientar fpi
Gfpi f-019 guia de aprendizaje 01 tda orientar fpilisbet bravo
 
Manual de cadena de custodia
Manual de cadena de custodiaManual de cadena de custodia
Manual de cadena de custodiaMona Beautifull
 

Destacado (20)

LibroSIG: Aprendiendo a manejar los SIG en la gestión ambiental
LibroSIG: Aprendiendo a manejar los SIG en la gestión ambientalLibroSIG: Aprendiendo a manejar los SIG en la gestión ambiental
LibroSIG: Aprendiendo a manejar los SIG en la gestión ambiental
 
Identificación de peligros e identificación de riesgos y controles -IPERC
Identificación de peligros e identificación de riesgos y controles -IPERCIdentificación de peligros e identificación de riesgos y controles -IPERC
Identificación de peligros e identificación de riesgos y controles -IPERC
 
A Wandering Round Robin Legacy - Gen. 1 - Deel 4
A Wandering Round Robin Legacy - Gen. 1 - Deel 4A Wandering Round Robin Legacy - Gen. 1 - Deel 4
A Wandering Round Robin Legacy - Gen. 1 - Deel 4
 
Ethical issues of IS
Ethical issues of ISEthical issues of IS
Ethical issues of IS
 
Domotique
DomotiqueDomotique
Domotique
 
Essentials Modulo1
Essentials Modulo1Essentials Modulo1
Essentials Modulo1
 
Pcn 09 LíNgua Estrangeira
Pcn   09   LíNgua EstrangeiraPcn   09   LíNgua Estrangeira
Pcn 09 LíNgua Estrangeira
 
Lineamientos para la_practica_evaluativa_docente
Lineamientos para la_practica_evaluativa_docenteLineamientos para la_practica_evaluativa_docente
Lineamientos para la_practica_evaluativa_docente
 
Material monster is ii emco
Material  monster is ii emcoMaterial  monster is ii emco
Material monster is ii emco
 
Evaluacion de desempeños
Evaluacion de desempeñosEvaluacion de desempeños
Evaluacion de desempeños
 
¿Qué es un modelo de negocio?
¿Qué es un modelo de negocio?¿Qué es un modelo de negocio?
¿Qué es un modelo de negocio?
 
Total Quality Service Management Book 1
Total Quality Service Management Book 1Total Quality Service Management Book 1
Total Quality Service Management Book 1
 
Simplifiez votre activité grâce au traitement documentaire intelligent
Simplifiez votre activité grâce au traitement documentaire intelligentSimplifiez votre activité grâce au traitement documentaire intelligent
Simplifiez votre activité grâce au traitement documentaire intelligent
 
Gerenciamento de projetos apostila completa
Gerenciamento de projetos   apostila completaGerenciamento de projetos   apostila completa
Gerenciamento de projetos apostila completa
 
Aprovechamiento rso uencolombia
Aprovechamiento rso uencolombiaAprovechamiento rso uencolombia
Aprovechamiento rso uencolombia
 
Segmentacion del mercado
Segmentacion del mercado Segmentacion del mercado
Segmentacion del mercado
 
Conexión a bases de datos
Conexión a bases de datosConexión a bases de datos
Conexión a bases de datos
 
Guia informaticabasica
Guia informaticabasicaGuia informaticabasica
Guia informaticabasica
 
Gfpi f-019 guia de aprendizaje 01 tda orientar fpi
Gfpi f-019 guia de aprendizaje 01 tda orientar fpiGfpi f-019 guia de aprendizaje 01 tda orientar fpi
Gfpi f-019 guia de aprendizaje 01 tda orientar fpi
 
Manual de cadena de custodia
Manual de cadena de custodiaManual de cadena de custodia
Manual de cadena de custodia
 

Similar a Implementing TARF: A Trust-Aware Routing Framework for Securing Wireless Sensor Networks

In Multi-Hop Routing identifying trusted paths through TARF in Wireless sens...
In Multi-Hop Routing identifying trusted paths through TARF in  Wireless sens...In Multi-Hop Routing identifying trusted paths through TARF in  Wireless sens...
In Multi-Hop Routing identifying trusted paths through TARF in Wireless sens...IJMER
 
Trusted Routing Path Selection in WSNs through TARF
Trusted Routing Path Selection in WSNs through TARFTrusted Routing Path Selection in WSNs through TARF
Trusted Routing Path Selection in WSNs through TARFEditor IJMTER
 
Performance Analysis of Trust-Aware Routing Framework for Wireless Mesh Networks
Performance Analysis of Trust-Aware Routing Framework for Wireless Mesh NetworksPerformance Analysis of Trust-Aware Routing Framework for Wireless Mesh Networks
Performance Analysis of Trust-Aware Routing Framework for Wireless Mesh NetworksIJMER
 
Detection of-sybil-attack-using-position-verification-method-in-manets
Detection of-sybil-attack-using-position-verification-method-in-manetsDetection of-sybil-attack-using-position-verification-method-in-manets
Detection of-sybil-attack-using-position-verification-method-in-manetsEditor IJMTER
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...IDES Editor
 
VARIOUS TYPES OF ATTACKS ON WIRELESS NETWORKS
VARIOUS TYPES OF ATTACKS ON WIRELESS NETWORKSVARIOUS TYPES OF ATTACKS ON WIRELESS NETWORKS
VARIOUS TYPES OF ATTACKS ON WIRELESS NETWORKSIRJET Journal
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networksVishnu Kudumula
 
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...IJARIIE JOURNAL
 
Securing WSN communication using Enhanced Adaptive Acknowledgement Protocol
Securing WSN communication using Enhanced Adaptive Acknowledgement ProtocolSecuring WSN communication using Enhanced Adaptive Acknowledgement Protocol
Securing WSN communication using Enhanced Adaptive Acknowledgement ProtocolIJMTST Journal
 
A adaptive neighbor analysis approach to detect cooperative selfish node in m...
A adaptive neighbor analysis approach to detect cooperative selfish node in m...A adaptive neighbor analysis approach to detect cooperative selfish node in m...
A adaptive neighbor analysis approach to detect cooperative selfish node in m...Jyoti Parashar
 
Wireless Sensor Network Security
Wireless Sensor Network  Security Wireless Sensor Network  Security
Wireless Sensor Network Security ghaidaa WN
 
IJSRED-V2I5P18
IJSRED-V2I5P18IJSRED-V2I5P18
IJSRED-V2I5P18IJSRED
 
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACKPERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACKIJCNCJournal
 
Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANETSunita Sahu
 
A Study on Evaluation of DoS Attacks in WiMAX Networks
A Study on Evaluation of DoS Attacks in WiMAX NetworksA Study on Evaluation of DoS Attacks in WiMAX Networks
A Study on Evaluation of DoS Attacks in WiMAX NetworksIRJET Journal
 
Security in mobile ad hoc networks
Security in mobile ad hoc networksSecurity in mobile ad hoc networks
Security in mobile ad hoc networksPiyush Mittal
 
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...ijsrd.com
 

Similar a Implementing TARF: A Trust-Aware Routing Framework for Securing Wireless Sensor Networks (20)

In Multi-Hop Routing identifying trusted paths through TARF in Wireless sens...
In Multi-Hop Routing identifying trusted paths through TARF in  Wireless sens...In Multi-Hop Routing identifying trusted paths through TARF in  Wireless sens...
In Multi-Hop Routing identifying trusted paths through TARF in Wireless sens...
 
Trusted Routing Path Selection in WSNs through TARF
Trusted Routing Path Selection in WSNs through TARFTrusted Routing Path Selection in WSNs through TARF
Trusted Routing Path Selection in WSNs through TARF
 
Performance Analysis of Trust-Aware Routing Framework for Wireless Mesh Networks
Performance Analysis of Trust-Aware Routing Framework for Wireless Mesh NetworksPerformance Analysis of Trust-Aware Routing Framework for Wireless Mesh Networks
Performance Analysis of Trust-Aware Routing Framework for Wireless Mesh Networks
 
Detection of-sybil-attack-using-position-verification-method-in-manets
Detection of-sybil-attack-using-position-verification-method-in-manetsDetection of-sybil-attack-using-position-verification-method-in-manets
Detection of-sybil-attack-using-position-verification-method-in-manets
 
D0961927
D0961927D0961927
D0961927
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
 
VARIOUS TYPES OF ATTACKS ON WIRELESS NETWORKS
VARIOUS TYPES OF ATTACKS ON WIRELESS NETWORKSVARIOUS TYPES OF ATTACKS ON WIRELESS NETWORKS
VARIOUS TYPES OF ATTACKS ON WIRELESS NETWORKS
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networks
 
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
 
Ls3620132016
Ls3620132016Ls3620132016
Ls3620132016
 
Securing WSN communication using Enhanced Adaptive Acknowledgement Protocol
Securing WSN communication using Enhanced Adaptive Acknowledgement ProtocolSecuring WSN communication using Enhanced Adaptive Acknowledgement Protocol
Securing WSN communication using Enhanced Adaptive Acknowledgement Protocol
 
A adaptive neighbor analysis approach to detect cooperative selfish node in m...
A adaptive neighbor analysis approach to detect cooperative selfish node in m...A adaptive neighbor analysis approach to detect cooperative selfish node in m...
A adaptive neighbor analysis approach to detect cooperative selfish node in m...
 
Wireless Sensor Network Security
Wireless Sensor Network  Security Wireless Sensor Network  Security
Wireless Sensor Network Security
 
IJSRED-V2I5P18
IJSRED-V2I5P18IJSRED-V2I5P18
IJSRED-V2I5P18
 
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACKPERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK
 
Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANET
 
A Study on Evaluation of DoS Attacks in WiMAX Networks
A Study on Evaluation of DoS Attacks in WiMAX NetworksA Study on Evaluation of DoS Attacks in WiMAX Networks
A Study on Evaluation of DoS Attacks in WiMAX Networks
 
Security in mobile ad hoc networks
Security in mobile ad hoc networksSecurity in mobile ad hoc networks
Security in mobile ad hoc networks
 
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
 
1705 1708
1705 17081705 1708
1705 1708
 

Último

ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvRicaMaeCastro1
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operationalssuser3e220a
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDhatriParmar
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Association for Project Management
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17Celine George
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSMae Pangan
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...DhatriParmar
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Developmentchesterberbo7
 
Mental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsMental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsPooky Knightsmith
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxkarenfajardo43
 
week 1 cookery 8 fourth - quarter .pptx
week 1 cookery 8  fourth  -  quarter .pptxweek 1 cookery 8  fourth  -  quarter .pptx
week 1 cookery 8 fourth - quarter .pptxJonalynLegaspi2
 

Último (20)

ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
 
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of EngineeringFaculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operational
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHS
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Development
 
Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"
 
Mental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsMental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young minds
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
 
week 1 cookery 8 fourth - quarter .pptx
week 1 cookery 8  fourth  -  quarter .pptxweek 1 cookery 8  fourth  -  quarter .pptx
week 1 cookery 8 fourth - quarter .pptx
 

Implementing TARF: A Trust-Aware Routing Framework for Securing Wireless Sensor Networks

  • 1. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 1 Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs Guoxing Zhan, Weisong Shi, Senior Member, IEEE, and Julia Deng Abstract—The multi-hop routing in wireless sensor networks (WSNs) offers little protection against identity deception through replaying routing information. An adversary can exploit this defect to launch various harmful or even devastating attacks against the routing protocols, including sinkhole attacks, wormhole attacks and Sybil attacks. The situation is further aggravated by mobile and harsh network conditions. Traditional cryptographic techniques or efforts at developing trust-aware routing protocols do not effectively address this severe problem. To secure the WSNs against adversaries misdirecting the multi-hop routing, we have designed and implemented TARF, a robust trust-aware routing framework for dynamic WSNs. Without tight time synchronization or known geographic information, TARF provides trustworthy and energy-efficient route. Most importantly, TARF proves effective against those harmful attacks developed out of identity deception; the resilience of TARF is verified through extensive evaluation with both simulation and empirical experiments on large-scale WSNs under various scenarios including mobile and RF-shielding network conditions. Further, we have implemented a low-overhead TARF module in TinyOS; as demonstrated, this implementation can be incorporated into existing routing protocols with the least effort. Based on TARF, we also demonstrated a proof-of-concept mobile target detection application that functions well against an anti-detection mechanism. 3 1 I NTRODUCTION network traffic. Those routing packets, including their original headers, are replayed without any modification. Wireless sensor networks (WSNs) [2] are ideal can- Even if this malicious node cannot directly overhear the didates for applications to report detected events of valid node’s wireless transmission, it can collude with interest, such as military surveillance and forest fire other malicious nodes to receive those routing packets monitoring. A WSN comprises battery-powered senor and replay them somewhere far away from the original nodes with extremely limited processing capabilities. valid node, which is known as a wormhole attack [5]. With a narrow radio communication range, a sensor Since a node in a WSN usually relies solely on the node wirelessly sends messages to a base station via packets received to know about the sender’s identity, a multi-hop path. However, the multi-hop routing of replaying routing packets allows the malicious node to WSNs often becomes the target of malicious attacks. forge the identity of this valid node. After “stealing” that An attacker may tamper nodes physically, create traffic valid identity, this malicious node is able to misdirect collision with seemingly valid transmission, drop or the network traffic. For instance, it may drop packets misdirect messages in routes, or jam the communication received, forward packets to another node not supposed channel by creating radio interference [3]. This paper to be in the routing path, or even form a transmission focuses on the kind of attacks in which adversaries loop through which packets are passed among a few misdirect network traffic by identity deception through malicious nodes infinitely. It is often difficult to know replaying routing information. Based on identity decep- whether a node forwards received packets correctly even tion, the adversary is capable of launching harmful and with overhearing techniques [4]. Sinkhole attacks are an- hard-to-detect attacks against routing, such as selective other kind of attacks that can be launched after stealing forwarding, wormhole attacks, sinkhole attacks and Sybil a valid identity. In a sinkhole attack, a malicious node attacks [4]. may claim itself to be a base station through replaying As a harmful and easy-to-implement type of attack, a all the packets from a real base station [6]. Such a fake malicious node simply replays all the outgoing routing base station could lure more than half the traffic, creating packets from a valid node to forge the latter node’s iden- a “black hole”. This same technique can be employed to tity; the malicious node then uses this forged identity to conduct another strong form of attack - Sybil attack [7]: participate in the network routing, thus disrupting the through replaying the routing information of multiple legitimate nodes, an attacker may present multiple iden- • G. Zhan and W. Shi are with the Department of Computer Science, Wayne State University, Detroit, MI, 48202. tities to the network. A valid node, if compromised, can E-mail: gxzhan@wayne.edu, weisong@wayne.edu. also launch all these attacks. • J. Deng is with Intelligent Automation Inc., Rockville, MD 20855. The harm of such malicious attacks based on the Email: hdeng@i-a-i.com. technique of replaying routing information is further This work is in part supported by AFRL contract FA8650-10-C-1740 and aggravated by the introduction of mobility into WSNs NSF Career Award CCF-0643521. We also would like to thank the program manager Mr. John Woods for his great support as well as the anonymous and the hostile network condition. Though mobility is reviewers for their constructive comments and suggestions. introduced into WSNs for efficient data collection and
  • 2. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 2 various applications [8], [9], [10], [11], it greatly increases TARF can be developed into a complete and indepen- the chance of interaction between the honest nodes dent routing protocol, the purpose is to allow existing and the attackers. Additionally, a poor network connec- routing protocols to incorporate our implementation of tion causes much difficulty in distinguishing between TARF with the least effort and thus producing a secure an attacker and a honest node with transient failure. and efficient fully-functional protocol. Unlike other se- Without proper protection, WSNs with existing routing curity measures, TARF requires neither tight time syn- protocols can be completely devastated under certain cir- chronization nor known geographic information. Most cumstances. In an emergent sensing application through importantly, TARF proves resilient under various attacks WSNs, saving the network from being devastated be- exploiting the replay of routing information, which is comes crucial to the success of the application. not achieved by previous security protocols. Even under Unfortunately, most existing routing protocols for strong attacks such as sinkhole attacks, wormhole attacks WSNs either assume the honesty of nodes and focus as well as Sybil attacks, and hostile mobile network on energy efficiency [12], or attempt to exclude unau- condition, TARF demonstrates steady improvement in thorized participation by encrypting data and authen- network performance. The effectiveness of TARF is ver- ticating packets. Examples of these encryption and au- ified through extensive evaluation with simulation and thentication schemes for WSNs include TinySec [13], empirical experiments on large-scale WSNs. Finally, we Spins [14], TinyPK [15], and TinyECC [16]. Admittedly, it have implemented a ready-to-use TARF module with is important to consider efficient energy use for battery- low overhead, which as demonstrated can be integrated powered sensor nodes and the robustness of routing into existing routing protocols with ease; the demon- under topological changes as well as common faults stration of a proof-of-concept mobile target detection in a wild environment. However, it is also critical to program indicates the potential of TARF in WSN appli- incorporate security as one of the most important goals; cations. meanwhile, even with perfect encryption and authen- We start by stating the design considerations of TARF tication, by replaying routing information, a malicious in Section 2. Then we elaborate the design of TARF node can still participate in the network using another in Section 3, including the routing procedure as well valid node’s identity. The gossiping-based routing proto- as the EnergyWatcher and TrustManager components. In cols offer certain protection against attackers by selecting Section 4, we present the simulation results of TARF random neighbors to forward packets [17], but at a against various attacks through replaying routing in- price of considerable overhead in propagation time and formation in static, mobile and RF-shielding conditions. energy use. Section 5 further presents the implementation of TARF, In addition to the cryptographic methods, trust and empirical evaluation at a large sensor network and a reputation management has been employed in generic resilient proof-of-concept mobile target detection appli- ad hoc networks and WSNs to secure routing protocols. cation based on TARF. Finally, we discuss the related Basically, a system of trust and reputation management work in Section 6 and conclude this paper in Section 7. assigns each node a trust value according to its past performance in routing. Then such trust values are used to help decide a secure and efficient route. However, 2 D ESIGN C ONSIDERATIONS the proposed trust and reputation management systems Before elaborating the detailed design of TARF, we for generic ad hoc networks target only relatively pow- would like to clarify a few design considerations first, erful hardware platforms such as laptops and smart- including certain assumptions in Section 2.1 and the phones [18], [19], [20], [21]. Those systems can not be goals in Section 2.3. applied to WSNs due to the excessive overhead for resource-constrained sensor nodes powered by batteries. As far as WSNs are concerned, secure routing solutions 2.1 Assumptions based on trust and reputation management rarely ad- We target secure routing for data collection tasks, which dress the identity deception through replaying routing are one of the most fundamental functions of WSNs. In information [22], [23]. The countermeasures proposed so a data collection task, a sensor node sends its sampled far strongly depends on either tight time synchronization data to a remote base station with the aid of other inter- or known geographic information while their effective- mediate nodes, as shown in Figure 1. Though there could ness against attacks exploiting the replay of routing be more than one base station, our routing approach is information has not been examined yet [4]. not affected by the number of base stations; to simplify At this point, to protect WSNs from the harmful our discussion, we assume that there is only one base attacks exploiting the replay of routing information, we station. An adversary may forge the identity of any legal have designed and implemented a robust trust-aware node through replaying that node’s outgoing routing routing framework, TARF, to secure routing solutions in packets and spoofing the acknowledgement packets, wireless sensor networks. Based on the unique character- even remotely through a wormhole. istics of resource-constrained WSNs, the design of TARF Additionally, to merely simplify the introduction of centers on trustworthiness and energy efficiency. Though TARF, we assume no data aggregation is involved.
  • 3. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 3 Node Base station the base station broadcast packets which are asymmet- rically authenticated. The asymmetric authentication of those broadcast packets from the base station is crucial to any successful secure routing protocol. It can be achieved through existing asymmetrically authenticated broadcast schemes that may require loose time synchronization. As an example, µTESLA [14] achieves asymmetric authen- ticated broadcast through a symmetric cryptographic algorithm and a loose delay schedule to disclose the keys from a key chain. Other examples of asymmetric Fig. 1. Multi-hop routing for data collection of a WSN. authenticated broadcast schemes requiring either loose or no time synchronization are found in [25], [26]. Nonetheless, our approach can still be applied to cluster- Considering the great computation cost incurred by a based WSNs with static clusters, where data are aggre- strong asymmetric authentication scheme and the diffi- gated by clusters before being relayed [24]. Cluster-based culty in key management, a regular packet other than a WSNs allows for the great savings of energy and band- base station broadcast packet may only be moderately width through aggregating data from children nodes and authenticated through existing symmetric schemes with performing routing and transmission for children nodes. a limited set of keys, such as the message authentication In a cluster-based WSN, the cluster headers themselves code provided by TinySec [13]. It is possible that an form a sub-network; after certain data reach a cluster adversary physically captures a non-base legal node and header, the aggregated data will be routed to a base reveals its key for the symmetric authentication [27]. station only through such a sub-network consisting of With that key, the adversary can forge the identity of the cluster headers. Our framework can then be applied that non-base legal node and joins the network “legally”. to this sub-network to achieve secure routing for cluster- However, when the adversary uses its fake identity to based WSNs. TARF may run on cluster headers only falsely attract a great amount of traffic, after receiving and the cluster headers communicate with their children broadcast packets about delivery information, other le- nodes directly since a static cluster has known relation- gal nodes that directly or indirectly forwards packets ship between a cluster header and its children nodes, through it will start to select a more trustworthy path though any link-level security features may be further through TrustManager (Section 3.4). employed. Finally, we assume a data packet has at least the 2.3 Goals following fields: the sender id, the sender sequence number, the next-hop node id (the receiver in this one- TARF mainly guards a WSN against the attacks mis- hop transmission), the source id (the node that initiates directing the multi-hop routing, especially those based the data), and the source’s sequence number. We insist on identity theft through replaying the routing informa- that the source node’s information should be included tion. This paper does not address the denial-of-service for the following reasons because that allows the base (DoS) [3] attacks, where an attacker intends to damage station to track whether a data packet is delivered. It the network by exhausting its resource. For instance, we would cause too much overhead to transmit all the one- do not address the DoS attack of congesting the network hop information to the base station. Also, we assume the by replaying numerous packets or physically jamming routing packet is sequenced. the network. TARF aims to achieve the following desir- able properties: High Throughput Throughput is defined as the ratio of 2.2 Authentication Requirements the number of all data packets delivered to the base Though a specific application may determine whether station to the number of all sampled data packets. In data encryption is needed, TARF requires that the pack- our evaluation, throughput at a moment is computed ets are properly authenticated, especially the broadcast over the period from the beginning time (0) until that packets from the base station. The broadcast from the particular moment. Note that single-hop re-transmission base station is asymmetrically authenticated so as to may happen, and that duplicate packets are considered guarantee that an adversary is not able to manipulate or as one packet as far as throughput is concerned. Through- forge a broadcast message from the base station at will. put reflects how efficiently the network is collecting and Importantly, with authenticated broadcast, even with delivering data. Here we regard high throughput as one the existence of attackers, TARF may use TrustManager of our most important goals. (Section 3.4) and the received broadcast packets about Energy Efficiency Data transmission accounts for a ma- delivery information (Section 3.2.1) to choose trustwor- jor portion of the energy consumption. We evaluate en- thy path by circumventing compromised nodes. Without ergy efficiency by the average energy cost to successfully being able to physically capturing the base station, it is deliver a unit-sized data packet from a source node to the generally very difficult for the adversary to manipulate base station. Note that link-level re-transmission should
  • 4. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 4 be given enough attention when considering energy cost necessary to delete some neighbors’ entries to keep the since each re-transmission causes a noticeable increase in table size acceptable. The technique of maintaining a energy consumption. If every node in a WSN consumes neighborhood table of a moderate size is demonstrated approximately the same energy to transmit a unit-sized by Woo, Tong and Culler [28]; TARF may employ the data packet, we can use another metric hop-per-delivery same technique. to evaluate energy efficiency. Under that assumption, the In TARF, in addition to data packet transmission, there energy consumption depends on the number of hops, are two types of routing information that need to be ex- i.e. the number of one-hop transmissions occurring. To changed: broadcast messages from the base station about evaluate how efficiently energy is used, we can measure data delivery and energy cost report messages from the average hops that each delivery of a data packet each node. Neither message needs acknowledgement. A takes, abbreviated as hop-per-delivery. broadcast message from the base station is flooded to the Scalability & Adaptability TARF should work well with whole network. The freshness of a broadcast message WSNs of large magnitude under highly dynamic con- is checked through its field of source sequence number. texts. We will evaluate the scalability and adaptability of The other type of exchanged routing information is the TARF through experiments with large-scale WSNs and energy cost report message from each node, which is under mobile and hash network conditions. broadcast to only its neighbors once. Any node receiving Here we do not include other aspects such as latency, such an energy cost report message will not forward it. load balance, or fairness. Low latency, balanced network For each node N in a WSN, to maintain such a neigh- load, and good fairness requirements can be enforced in borhood table with trust level values and energy cost val- specific routing protocols incorporating TARF. ues for certain known neighbors, two components, Ener- gyWatcher and TrustManager, run on the node (Figure 2). 3 D ESIGN OF TARF EnergyWatcher is responsible for recording the energy TARF secures the multi-hop routing in WSNs against in- cost for each known neighbor, based on N ’s observation truders misdirecting the multi-hop routing by evaluating of one-hop transmission to reach its neighbors and the the trustworthiness of neighboring nodes. It identifies energy cost report from those neighbors. A compromised such intruders by their low trustworthiness and routes node may falsely report an extremely low energy cost to data through paths circumventing those intruders to lure its neighbors into selecting this compromised node achieve satisfactory throughput. TARF is also energy- as their next-hop node; however, these TARF-enabled efficient, highly scalable, and well adaptable. Before in- neighbors eventually abandon that compromised next- troducing the detailed design, we first introduce several hop node based on its low trustworthiness as tracked necessary notions here. by TrustManager. TrustManager is responsible for tracking Neighbor For a node N , a neighbor (neighboring node) trust level values of neighbors based on network loop of N is a node that is reachable from N with one-hop discovery and broadcast messages from the base station wireless transmission. about data delivery. Once N is able to decide its next- Trust level For a node N , the trust level of a neighbor is a hop neighbor according to its neighborhood table, it decimal number in [0, 1], representing N ’s opinion of that sends out its energy report message: it broadcasts to neighbor’s level of trustworthiness. Specifically, the trust all its neighbors its energy cost to deliver a packet level of the neighbor is N ’s estimation of the probability from the node to the base station. The energy cost is that this neighbor correctly delivers data received to the computed as in Section 3.3 by EnergyWatcher. Such an base station. That trust level is denoted as T in this paper. energy cost report also serves as the input of its receivers’ Energy cost For a node N , the energy cost of a neighbor EnergyWatcher. is the average energy cost to successfully deliver a unit- sized data packet with this neighbor as its next-hop One-hop Delivery node, from N to the base station. That energy cost is Neighbor denoted as E in this paper. Energy Cost EnergyWatcher Energy Cost Report Neighborhood Next-hop Table 3.1 Overview Network Loop Selection Discovery For a TARF-enabled node N to route a data packet to the TrustManager Neighbor Trust Level Energy Cost base station, N only needs to decide to which neighbor- Base Station Report Broadcast ing node it should forward the data packet considering both the trustworthiness and the energy efficiency. Once Fig. 2. Each node selects a next-hop node based on its the data packet is forwarded to that next-hop node, the neighborhood table, and broadcast its energy cost within its remaining task to deliver the data to the base station is neighborhood. To maintain this neighborhood table, Energy- fully delegated to it, and N is totally unaware of what Watcher and TrustManager on the node keep track of related routing decision its next-hop node makes. N maintains events (on the left) to record the energy cost and the trust level a neighborhood table with trust level values and energy values of its neighbors. cost values for certain known neighbors. It is sometimes
  • 5. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 5 3.2 Routing Procedure explained as follows: the fact that an attacker attracts a TARF, as with many other routing protocols, runs as a great deal of traffic from many nodes often gets revealed periodic service. The length of that period determines by at least several of those nodes being deceived with how frequently routing information is exchanged and a high likelihood. The undelivered sequence interval [a, updated. At the beginning of each period, the base b] is explained as follows: the base station searches the station broadcasts a message about data delivery during source sequence numbers received in last period, identi- last period to the whole network consisting of a few fies which source sequence numbers for the source node contiguous packets (one packet may not hold all the with this id are missing, and chooses certain significant information). Each such packet has a field to indicate interval [a, b] of missing source sequence numbers as how many packets are remaining to complete the broad- an undelivered sequence interval. For example, the base cast of the current message. The completion of the base station may have all the source sequence numbers for the station broadcast triggers the exchange of energy report source node 2 as {109, 110, 111, 150, 151} in last period. in this new period. Whenever a node receives such a Then [112, 149] is an undelivered sequence interval; broadcast message from the base station, it knows that [109, 151] is also recorded as the sequence boundary the most recent period has ended and a new period has of delivered packets. Since the base station is usually just started. No tight time synchronization is required connected to a powerful platform such as a desktop, a for a node to keep track of the beginning or ending of a program can be developed on that powerful platform to period. During each period, the EnergyWatcher on a node assist in recording all the source sequence numbers and monitors energy consumption of one-hop transmission finding undelivered sequence intervals. to its neighbors and processes energy cost reports from Accordingly, each node in the network stores a table those neighbors to maintain energy cost entries in its of <node id of a source node, a forwarded sequence interval [a, b] with a significant length> about last neighborhood table; its TrustManager also keeps track of network loops and processes broadcast messages from period. The data packets with the source node and the the base station about data delivery to maintain trust sequence numbers falling in this forwarded sequence interval [a, b] have already been forwarded by this node. level entries in its neighborhood table. When the node receives a broadcast message about data To maintain the stability of its routing path, a node delivery, its TrustManager will be able to identify which may retain the same next-hop node until the next fresh data packets forwarded by this node are not delivered to broadcast message from the base station occurs. Mean- the base station. Considering the overhead to store such while, to reduce traffic, its energy cost report could a table, old entries will be deleted once the table is full. be configured to not occur again until the next fresh Once a fresh broadcast message from the base station broadcast message from the base station. If a node does is received, a node immediately invalidates all the ex- not change its next-hop node selection until the next isting energy cost entries: it is ready to receive a new broadcast message from the base station, that guaran- energy report from its neighbors and choose its new tees all paths to be loop-free, as can be deducted from next-hop node afterwards. Also, it is going to select a the procedure of next-hop node selection. However, as node either after a timeout is reached or after it has noted in our experiments, that would lead to slow received an energy cost report from some highly trusted improvement in routing paths. Therefore, we allow a candidates with acceptable energy cost. A node imme- node to change its next-hop selection in a period when diately broadcasts its energy cost to its neighbors only its current next-hop node performs the task of receiving after it has selected a new next-hop node. That energy and delivering data poorly. cost is computed by its EnergyWatcher (see Section 3.3). Next, we introduce the structure and exchange of A natural question is which node starts reporting its routing information as well as how nodes make routing energy cost first. For that, note that when the base station decisions in TARF. is sending a broadcast message, a side effect is that its neighbors receiving that message will also regard this 3.2.1 Structure and Exchange of Routing Information as an energy report: the base station needs 0 amount A broadcast message from the base station fits into at of energy to reach itself. As long as the original base most a fixed small number of packets. Such a message station is faithful, it will be viewed as a trustworthy consists of some pairs of <node id of a source node, an candidate by TrustManager on the neighbors of the base undelivered sequence interval [a, b] with a significant station. Therefore, those neighbors will be the first nodes length>, <node id of a source node, minimal sequence to decide their next-hop node, which is the base station; number received in last period, maximum sequence they will start reporting their energy cost once that number received in last period>, as well as several node decision is made. id intervals of those without any delivery record in last period. To reduce overhead to an acceptable amount, 3.2.2 Route Selection our implementation selects only a limited number of Now, we introduce how TARF decides routes in a WSN. such pairs to broadcast (Section 5.1) and proved effec- Each node N relies on its neighborhood table to select an tive (Section 5.3, 5.4). Roughly, the effectiveness can be optimal route, considering both energy consumption and
  • 6. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 6 reliability. TARF makes good efforts in excluding those relation: nodes that misdirect traffic by exploiting the replay of EN b = EN →b + Eb routing information. For a node N to select a route for delivering data Since each known neighbor b of N is supposed to to the base station, N will select an optimal next-hop broadcast its own energy cost Eb to N , to compute EN b , node from its neighbors based on trust level and energy N still needs to know the value EN →b , i.e., the average cost and forward the data to the chosen next-hop node energy cost of successfully delivering a data packet from immediately. The neighbors with trust levels below a N to its neighbor b with one hop. For that, assuming certain threshold will be excluded from being considered that the endings (being acknowledged or not) of one- as candidates. Among the remaining known neighbors, hop transmissions from N to b are independent with N will select its next-hop node through evaluating each the same probability psucc of being acknowledged, we neighbor b based on a trade-off between TN b and EN b , T Nb first compute the average number of one-hop sendings with EN b and TN b being b’s energy cost and trust level needed before the acknowledgement is received as fol- value in the neighborhood table respectively (see Sec- lows: ∞ tion 3.3, 3.4). Basically, EN b reflects the energy cost of 1 delivering a packet to the base station from N assuming i · psucc · (1 − psucc )i−1 = 1 i=1 psucc that all the nodes in the route are honest; TN b approx- imately reflects the number of the needed attempts to Denote Eunit as the energy cost for node N to send a send a packet from N to the base station via multiple unit-sized data packet once regardless of whether it is hops before such an attempt succeeds, considering the received or not. Then we have trust level of b. Thus, EN b combines the trustworthiness Nb Eunit T EN b = + Eb and energy cost. However, the metric EN b suffers from T Nb psucc the fact that an adversary may falsely reports extremely The remaining job for computing EN b is to get the proba- low energy cost to attract traffic and thus resulting in a bility psucc that a one-hop transmission is acknowledged. low value of EN b even with a low TN b . Therefore, TARF T Nb Considering the variable wireless connection among prefers nodes with significantly higher trust values; this wireless sensor nodes, we do not use the simplistic preference of trustworthiness effectively protects the net- averaging method to compute psucc . Instead, after each work from an adversary who forges the identity of an transmission from N to b, N ’s EnergyWatcher will update attractive node such as a base station. For deciding the psucc based on whether that transmission is acknowl- next-hop node, a specific trade-off between TN b and EN b T Nb edged or not with a weighted averaging technique. We is demonstrated in Figure 5 (see Section 5.2). use a binary variable Ack to record the result of current Observe that in an ideal misbehavior-free environ- transmission: 1 if an acknowledgement is received; oth- ment, all nodes are absolutely faithful, and each node erwise, 0. Given Ack and the last probability value of an will choose a neighbor through which the routing path acknowledged transmission pold succ , an intuitive way is is optimized in terms of energy; thus, an energy-driven to use a simply weighted average of Ack and pold succ as route is achieved. the value of pnew succ . That is what is essentially adopted in the aging mechanism [29]. However, that method used 3.3 EnergyWatcher against sleeper attacks still suffers periodic attacks [30]. To solve this problem, we update the psucc value using Here we describe how a node N ’s EnergyWatcher com- two different weights as in our previous work [30], a putes the energy cost EN b for its neighbor b in N ’s relatively big wdegrade ∈ (0, 1) and a relatively small neighborhood table and how N decides its own energy wupgrade ∈ (0, 1) as follows: cost EN . Before going further, we will clarify some  notations. EN b mentioned is the average energy cost  (1 − wdegrade ) × pold succ + wdegrade × Ack,  if Ack = 0.  of successfully delivering a unit-sized data packet from pnew succ = N to the base station, with b as N ’s next-hop node  (1 − wupgrade ) × pold succ + wupgrade × Ack,  if Ack = .1  being responsible for the remaining route. Here, one-hop re-transmission may occur until the acknowledgement The two parameters wdegrade and wupgrade allow flexible is received or the number of re-transmissions reaches application requirements. wdegrade and wupgrade repre- a certain threshold. The cost caused by one-hop re- sent the extent to which upgraded and degraded per- transmissions should be included when computing EN b . formance are rewarded and penalized, respectively. If Suppose N decides that A should be its next-hop node any fault and compromise is very likely to be associated after comparing energy cost and trust level. Then N ’s with a high risk, wdegrade should be assigned a relatively energy cost is EN = EN A . Denote EN →b as the average high value to penalize fault and compromise relatively energy cost of successfully delivering a data packet from heavily; if a few positive transactions can’t constitute ev- N to its neighbor b with one hop. Note that the re- idence of good connectivity which requires many more transmission cost needs to be considered. With the above positive transactions, then wupgrade should be assigned notations, it is straightforward to establish the following a relatively low value.
  • 7. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 7 3.4 TrustManager are forwarded by this node to the number of those A node N ’s TrustManager decides the trust level of forwarded data packets, denoted as DeliveryRatio. Then each neighbor based on the following events: discovery N ’s TrustManager updates its next-hop node b’s trust of network loops, and broadcast from the base station level as follows:  about data delivery. For each neighbor b of N , TN b  (1 − wdegrade ) × Told N b  denotes the trust level of b in N ’s neighborhood table.  +wdegrade × DeliveryRatio,    At the beginning, each neighbor is given a neutral trust  if DeliveryRatio < Told N b .   level 0.5. After any of those events occurs, the relevant Tnew N b = neighbors’ trust levels are updated.  (1 − wupgrade ) × Told N b    Note that many existing routing protocols have their  +wupgrade × DeliveryRatio,    own mechanisms to detect routing loops and to react  if DeliveryRatio >= Told N b . accordingly [31], [32], [28]. In that case, when integrating TARF into those protocols with anti-loop mechanisms, 3.5 Analysis on EnergyWatcher and TrustManager TrustManager may solely depend on the broadcast from the base station to decide the trust level; we adopted Now that a node N relies on its EnergyWatcher and such a policy when implementing TARF later (see Sec- TrustManager to select an optimal neighbor as its next- tion 5). If anti-loop mechanisms are both enforced in hop node, we would like to clarify a few important the TARF component and the routing protocol that in- points on the design of EnergyWatcher and TrustManager. tegrates TARF, then the resulting hybrid protocol may First, as described in Section 3.1, the energy cost report overly react towards the discovery of loops. Though so- is the only information that a node is to passively receive phisticated loop-discovery methods exist in the currently and take as “fact”. It appears that such acceptance of en- developed protocols, they often rely on the comparison ergy cost report could be a pitfall when an attacker or a of specific routing cost to reject routes likely leading to compromised node forges false report of its energy cost. loops [32]. To minimize the effort to integrate TARF and Note that the main interest of an attacker is to prevent the existing protocol and to reduce the overhead, when data delivery rather than to trick a data packet into a less an existing routing protocol does not provide any anti- efficient route, considering the effort it takes to launch loop mechanism, we adopt the following mechanism to an attack. As far as an attack aiming at preventing data detect routing loops. To detect loops, the TrustManager delivery is concerned, TARF well mitigates the effect of on N reuses the table of <node id of a source node, this pitfall through the operation of TrustManager. Note a forwarded sequence interval [a, b] with a significant that the TrustManager on one node does not take any rec- length> (see Section 3.2) in last period. If N finds that a ommendation from the TrustManager on another node. received data packet is already in that record table, not If an attacker forges false energy report to form a false only will the packet be discarded, but the TrustManager route, such intention will be defeated by TrustManager: on N also degrades its next-hop node’s trust level. If when the TrustManager on one node finds out the many that next-hop node is b, then Told N b is the latest trust delivery failures from the broadcast messages of the base level value of b. We use a binary variable Loop to record station, it degrades the trust level of its current next-hop the result of loop discovery: 0 if a loop is received; 1 node; when that trust level goes below certain threshold, otherwise. As in the update of energy cost, the new trust it causes the node to switch to a more promising next- level of b is hop node.  Second, TrustManager identities the low trustworthi-  (1 − wdegrade ) × Told N b + wdegrade × Loop,  ness of various attackers misdirecting the multi-hop if Loop = 0.  Tnew N b = routing, especially those exploiting the replay of routing  (1 − wupgrade ) × Told N b + wupgrade × Loop,  information. It is noteworthy that TrustManager does not if Loop = 1.  distinguish whether an error or an attack occurs to the Once a loop has been detected by N for a few times next-hop node or other succeeding nodes in the route. so that the trust level of the next-hop node is too low, It seems unfair that TrustManager downgrades the trust N will change its next-hop selection; thus, that loop is level of an honest next-hop node while the attack occurs broken. Though N can not tell which node should be somewhere after that next-hop node in the route. Con- held responsible for the occurrence of a loop, degrading trary to that belief, TrustManager significantly improves its next-hop node’s trust level gradually leads to the data delivery ratio in the existence of attack attempts of breaking of the loop. On the other hand, to detect the preventing data delivery. First of all, it is often difficult to traffic misdirection by nodes exploiting the replay of identify an attacker who participates in the network us- routing information, TrustManager on N compares N’s ing an id “stolen” from another legal node. For example, stored table of <node id of a source node, forwarded se- it is extremely difficult to detect a few attackers colluding quence interval [a, b] with a significant length> recorded to launch a combined wormhole and sinkhole attack [4]. in last period with the broadcast messages from the Additionally, despite the certain inevitable unfairness base station about data delivery. It computes the ratio involved, TrustManager encourages a node to choose of the number of successfully delivered packets which another route when its current route frequently fails to
  • 8. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 8 deliver data to the base station. Though only those legal Matlab to test TARF. We have conducted extensive sim- neighboring nodes of an attacker might have correctly ulation experiments; however, due to the page limit, identified the adversary, our evaluation results indicate interested readers may refer to our technical report [33] that the strategy of switching to a new route without and the conference version of paper [1] for detailed identifying the attacker actually significantly improves simulation settings and experimental results. In our ex- the network performance, even with the existence of periments, initially, 35 nodes are randomly distributed wormhole and sinkhole attacks. Fig 3 gives an example to within a 300*300 rectangular area, with unreliable wire- illustrate this point. In this example, node A, B, C and D less transmission. All the nodes have the same power are all honest nodes and not compromised. Node A has level and the same maximal transmission range of 100m. node B as its current next-hop node while node B has an Each node samples 6 times in every period; the timing attacker node as its next-hop node. The attacker drops gap between every two consecutive samplings of the every packet received and thus any data packet passing same node is equivalent. We simulate the sensor network node A will not arrive at the base station. After a while, in 1440 consecutive periods. node A discovers that the data packets it forwarded did Regarding the network topology, we set up three types not get delivered. The TrustManager on node A starts to of network topologies. The first type is the static-location degrade the trust level of its current next-hop node B case under which all nodes stand still. The second type although node B is absolutely honest. Once that trust is a customized group-motion-with-noise case based on level becomes too low, node A decides to select node C Reference Point Group Mobility (RPGM) model that as its new next-hop node. In this way node A identifies a mimics the behavior of a set of nodes moving in one better and successful route (A - C - D - base). In spite of or more groups [34], [35]. The last type of dynamic the sacrifice of node B’s trust level, the network performs network incorporated in the experiments is the addition better. Further, concerning the stability of routing path, of scattered RF-shielded areas to the aforementioned group-motion-with-noise case. The performance of TARF is compared to that of a B link connectivity-based routing protocol adapted from Attacker what is proposed by Alec Woo, Terence Tong and A David Culler [28]. We denote the link connectivity- Base Station based routing protocol as Link-connectivity. With the Link-connectivity protocol, each node selects its next-hop C D node among its neighborhood table according to an Fig. 3. An example to illustrate how TrustManager works. link estimator based on exponentially weighted moving average (EWMA). The simulation results show, in the presence of misbehaviors, the throughput in TARF is often once a valid node identifies a trustworthy honest neigh- much higher than that in Link-connectivity; the hop-per- bor as its next-hop node, it tends to keep that next-hop delivery in the Link-connectivity protocol is generally at selection without considering other seemingly attractive least comparable to that in TARF. nodes such as a fake base station. That tendency is Under a misbehavior-free environment, the simula- caused by both the preference to maintain stable routes tion results show that TARF and Link-connectivity have and the preference to highly trustable nodes. comparable performance when there is no adversary. Finally, we would like to stress that TARF is designed Both protocols are also evaluated under three common to guard a WSN against the attacks misdirecting the types of attacks: (1) a certain node forges the identity of multi-hop routing, especially those based on identity the based station by replaying broadcast messages, also theft through replaying the routing information. Other known as the sinkhole attack; (2) a set of nodes colludes to types of attacks such as the denial-of-service (DoS) [3] form a forwarding loop; and (3) a set of nodes drops re- attacks are out of the discussion of this paper. For ceived data packets. These experiments were conducted instance, we do not address the attacks of injecting in the static case, the group-motion-with-noise case, and into the network a number of data packets containing the addition of RF-shielded areas to the group-motion- false sensing data but authenticated (possibly through with-noise case separately. Generally, under these com- hacking). That type of attacks aim to exhaust the network mon attacks, TARF produces a substantial improvement resource instead of misdirecting the routing. However, if over Link-connectivity in terms of data collection and en- the attacker intends to periodically inject a few routing ergy efficiency. Further, we have evaluated TARF under packets to cause wrong route, such attacks can still be more severe attacks: multiple moving fake bases and defended by TARF through TrustManager. multiple Sybil attackers. As before, the experiments are conducted under all the three types of network topology. Under these two types of most severe attacks which 4 S IMULATION almost devastates the Link-connectivity protocol, TARF We have developed a reconfigurable emulator of wire- succeeds in achieving a steady improvement over the less sensor networks on a two-dimensional plane with Link-connectivity protocol. Finally, we have conducted
  • 9. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 9 certain experiments to explore the choice of the period sensing frequency, the energy efficiency and trustworthi- length and the trust updating scheme. Our experiments ness requirement. TrustManagerC provides two inter- reveal that a shorter period or a faster trust updating faces (see Figure 4), TrustControl and Record, which scheme may not necessarily benefit TARF. are implemented in other modules. The TrustControl interface provides the commands to enable and disable the trust evaluation, while the Record interface provides 5 I MPLEMENTATION AND E MPIRICAL E VALUA - the commands for a root, i.e., a base station, to add TION delivered message record, for a non-root node to add forwarded message record, and for a node to retrieve the In order to evaluate TARF in a real-world setting, we trust level of any neighboring node. The implementation implemented the TrustManager component on TinyOS on a root node differs from that on a non-root node: a 2.x, which can be integrated into the existing routing pro- root node stores the information of messages received tocols for WSNs with the least effort. Originally, we had (delivered) during the current period into a record table implemented TARF as a self-contained routing proto- and broadcast delivery failure record; a non-root node col [1] on TinyOS 1.x before this second implementation. stores the information of forwarded messages during the However, we decided to re-design the implementation current period also in a record table and compute the considering the following factors. First, the first imple- trust of its neighbors based on that and the broadcast in- mentation only supports TinyOS 1.x, which was replaced formation. Noting that much implementation overhead by TinyOS 2.x; the porting procedure from TinyOS 1.x for a root can always be transferred to a more powerful to TinyOS 2.x tends to frustrate the developers. Second, device connected to the root, it is reasonable to assume rather than developing a self-contained routing protocol, that the root would have great capability of processing the second implementation only provides a TrustMan- and storage. ager component that can be easily incorporated into the existing protocols for routing decisions. The detection configuration TrustManagerC { interface TrustControl of routing loops and the corresponding reaction are provides { { excluded from the implementation of TrustManager since interface TrustControl; //enable trust evaluation interface Record; command error_t start(); many existing protocols, such as Collection Tree Proto- } //disable trust evaluation col [32] and the link connectivity-based protocol [28], implementation { command error_t stop(); ........................................... } already provide that feature. As we worked on the first } implementation, we noted that the existing protocols } provide many nice features, such as the analysis of link quality, the loop detection and the routing decision interface Record { mainly considering the communication cost. Instead of //for a root to add delivered record <source node id, source sequence number> providing those features, our implementation focuses command void addDelivered(am_addr_t src, uint8_t seq); //for a non-root node to add forwarded record <source id, source sequence, next-hop id> on the trust evaluation based on the base broadcast command void addForwarded(am_addr_t src, uint8_t seq, am_addr_t next); of the data delivery, and such trust information can //return the trust level of a node command uint16_t getTrust(am_addr_t id); be easily reused by other protocols. Finally, instead of } using TinySec [13] exclusively for encryption and au- thentication as in the first implementation on TinyOS 1.x, Fig. 4. TrustManager component. this re-implementation let the developers decide which encryption or authentication techniques to employ; the A root broadcasts two types of delivery failure record: encryption and authentication techniques of TARF may at most three packets of significant undelivered intervals be different than that of the existing protocol. for individual origins and at most two packets of the id’s of the origins without any record in the current period. For each origin, at most three significant undelivered 5.1 TrustManager Implementation Details intervals are broadcast. For a non-root node, considering The TrustManager component in TARF is wrapped the processing and memory usage overhead, the record into an independent TinyOS configuration named table keeps the forwarded message intervals for up to 20 TrustManagerC. TrustManagerC uses a dedicated source nodes, with up to 5 non-overlapped intervals for logic channel for communication and runs as a periodic each individual origin. Our later experiments verify that service with a configurable period, thus not interfering such size limit of the table on a non-root node produces a with the application code. Though it is possible to im- resilient TARF with moderate overhead. The record table plement TARF with a period always synchronized with on a node keeps adding entries for new origins until it the routing protocol’s period, that would cause much in- is full. trusion into the source code of the routing protocol. The With our current implementation, a valid trust value is current TrustManagerC uses a period of 30 seconds; an integer between 0 and 100, and any node is assigned for specific applications, by modifying a certain header an initial trust value of 50. The weigh parameters are: file, the period length may be re-configured to reflect the wupgrade = 0.1, wdegrade = 0.3. The trust table of a
  • 10. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 10 non-root node node keeps the trust level for up to 10 candidate has a trust level above certain threshold. The neighbors. Considering that an attacker may present reason is, the sole trust/cost criteria could be exploited multiple fake id’s, the implementation evicts entries with by an adversary replaying the routing information from a trust level close to the initial trust of any node. Such a base station and thus pretending to be an extremely eviction policy is to ensure that the trust table remembers attractive node. As for Step 2, compared to the CTP those neighbors with high trust and low trust; any other implementation, we add two more circumstances when neighbor not in this table is deemed to have the initial a node decides to switch to the optimal candidate found trust value of 50. at Step 1: that candidate has a higher trust level, or the current next-hop neighbor has a too low trust level. 5.2 Incorporation of TARF into Existing Protocols //Step 1. traverse the neighborhood table for an optimal candidate for the next hop To demonstrate how this TARF implementation can be optimal_candidate = NULL //the cost of routing via the optimal candidate provided by the existing protocol, initially infinity integrated into the exiting protocols with the least effort, optimal_cost = MAX_COST we incorporated TARF into a collection tree routing //the trust level of the optimal candidate, initially 0 optimal_trust = MIN_TRUST protocol (CTP) [32]. The CTP protocol is efficient, robust, for each candidate in the neighborhood table if link is congested, or may cause a loop, or does not pass quality threshold and reliable in a network with highly dynamic link continue topology. It quantifies link quality estimation in order better = false if candidate.trust >= optimal_trust && candidate.cost < optimal_cost to choose a next-hop node. The software platform is better = true //prefer trustworthy candidates TinyOS 2.x. To perform the integration, after proper if candidate.trust >= TRUST_THRESHOLD && optimal_trust < TRUST_THRESHOLD interface wiring, invoke the TrustControl.start better = true if candidate.trust >= ESSENTIAL_DIFFERENCE_THRESHOLD + optimal_trust command to enable the trust evaluation; call the better = true //effective when all nodes have low trust due to network change or poor connectivity Record.addForwarded command for a non-root node if candidate.trust >= 3 * optimal_trust / 2 to add forwarded record once a data packet has been better = true //add restriction of trust level requirement forwarded; call the Record.addDelivered command if candidate.trust >= TRUST_THRESHOLD && candidate.trust / candidate.cost > optimal_trust / optimal_cost for a root to add delivered record once a data packet has better = true been received by the root. Finally, inside the CTP’s task if better == true optimal_candidate = candidate to update the routing path, call the Record.getTrust optimal_cost = candidate.cost optimal_trust = candidate.trust command to retrieve the trust level of each next-hop candidate; an algorithm taking trust into routing consid- //Step 2. decide whether to switch from the current next-hop node to the optimal candidate found: if optimal_trust >= currentNextHop.trust eration is executed to decide the new next-hop neighbor || currentNextHop.trust <= TRUST_THRESHOLD || current link is congested and switching is not likely to cause loops (see Figure 5). || optimal_cost + NEXTHOP_SWITCH_THRESHOLD < currentNextHop.cost Similar to the original CTP’s implementation, the im- currentNextHop = optimal_candidate plementation of this new protocol decides the next-hop neighbor for a node with two steps (see Figure 5): Step Fig. 5. Routing decision incorporating trust management. 1 traverses the neighborhood table for an optimal candi- date for the next hop; Step 2 decides whether to switch This new implementation integrating TARF requires from the current next-hop node to the optimal candidate moderate program storage and memory usage. We im- found. For Step 1, as in the CTP implementation, a plemented a typical TinyOS data collection application, node would not consider those links congested, likely MultihopOscilloscope, based on this new protocol. The to cause a loop, or having a poor quality lower than MultihopOscilloscope application, with certain modified a certain threshold. This new implementation prefers sensing parameters for our later evaluation purpose, those candidates with higher trust levels; in certain periodically makes sensing samples and sends out the circumstances, regardless of the link quality, the rules sensed data to a root via multiple routing hops. Orig- deems a neighbor with a much higher trust level to inally, MultihopOscilloscope uses CTP as its routing be a better candidate (see Figure 5). The preference of protocol. Now, we list the ROM size and RAM size highly trustable candidates is based on the following requirement of both implementation of MultihopOscillo- consideration: on the one hand, it creates the least chance scope on non-root Telosb motes in Table 1. The enabling for an adversary to misguide other nodes into a wrong of TARF in MultihopOscilloscope increases the size of routing path by forging the identity of an attractive ROM by around 1.3KB and the size of memory by node such as a root; on the other hand, forwarding data around 1.2KB. packets to a candidate with a low trust level would result in many unsuccessful link-level transmission attempts, TABLE 1 thus leading to much re-transmission and a potential Size comparison of MultihopOscilloscope implementation waste of energy. When the network throughput becomes low and a node has a list of low-trust neighbors, the Protocol ROM (bytes) RAM (bytes) node will exclusively use the trust as the criterion to CTP 31164 3579 TARF-enabled CTP 34290 4767 evaluate those neighbors for routing decisions. As show in Figure 5, it uses trust/cost as a criteria only when the
  • 11. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 11 5.3 Empirical Evaluation on Motelab addition to programming those 91 motes with CTP, we We evaluated the performance of TARF against a com- also programmed the five fake base stations so that they bined sinkhole and wormhole attack on Motelab [36] at stole the id the base station through replaying. In the Harvard University. 184 TMote Sky sensor motes were last experiment, we programmed those 91 motes with deployed across many rooms at three floors in the de- the TARF-enabled CTP, and programmed the five fake partment building (see Figure 6), with two to four motes base stations as in the second experiment. Each of our in most rooms. Around 97 nodes functioned properly programs run for 30 minutes. while the rest were either removed or disabled. Each As illustrated in Figure 7(a), the existence of the five mote has a 2.4GHz Chipcon CC2420 radio with an wormhole attackers greatly degraded the performance indoor range of approximately 100 meters. In Figure 6, of CTP: the number of the delivered data packets in the thin green lines indicate the direct (one-hop) wireless the case of CTP with the five-node wormhole is no more connection between motes. Certain wireless connection than 14% that in the case of CTP without adversaries. also exists between nodes from different floors. The TARF-enabled CTP succeeded in bringing an immense improvement over CTP in the presence of the five-node wormhole, almost doubling the throughput. That improvement did not show any sign of slowing down as time elapsed. The number of nodes from each floor that delivered at least one data packet in each six-minute sub-period is plotted in Figure 7(a), 7(b) and 7(c) separately. On each floor, without any adversary, at least 24 CTP nodes were able to find a successful route in each six minute. However, with the five fake base stations in the wormhole, the number of CTP nodes that could find a successful route goes down to 9 for the first floor; it decreases to no more than 4 for the second floor; as the worst impact, none of the nodes on the third floor ever found a successful route. A further look at the data showed that all the nine nodes from the first floor with successful delivery record were all Fig. 6. Connectivity map of Motelab (not including the inter- close to the real base station. The CTP nodes relatively floor connectivity), adapted from Motelab[Motelab]. far away from the base station, such as those on the second and the third floor, had little luck in making We developed a simple data collection application in good routing decisions. When TARF was enabled on TinyOS 2.x that sends a data packet every five seconds to each node, most nodes made correct routing decisions a base station node (root) via multi-hop. This application circumventing the attackers. That improvement can was executed on 91 functioning non-root nodes on Mote- be verified by the fact that the number of the TARF- lab. For comparison, we used CTP and the TARF-enabled enabled nodes with successful delivery record under CTP implementation as the routing protocols for the data the threat of the wormhole is close to that of CTP nodes collection program separately. The TARF-enabled CTP with no attackers, as shown in Figure 7(a), 7(b) and 7(c). has a TARF period of 30 seconds. We conducted an attack with five fake base stations that formed a wormhole. As in Figure 6, whenever the base station sent out any 5.4 Application: Mobile Target Detection in the Pres- packet, three fake base stations which overheard that ence of an Anti-Detection Mechanism packet replayed the complete packet without changing To demonstrate how TARF can be applied in networked any content including the node id. Other fake base sensing systems, we developed a proof-of-concept re- stations overhearing that replayed packet would also silient application of target detection. This application replay the same packet. Each fake base station essentially relies on a deployed wireless sensor network to detect launched a sinkhole attack. Note that there is a distinction a target that could move, and to deliver the detection between such malicious replay and the forwarding when events to a base station via multiple hops with the TARF- a well-behaved node receives a broadcast from the base enabled CTP protocol. For simplification, the target is a station. When a well-behaved node forwards a broadcast LEGO MINDSTORM NXT 2.0 vehicle robot equipped packet from the base station, it will include its own with a TelosB mote that sends out an AM (Active id in the packet so that its receivers will not recognize Message) packet every three seconds. A sensor node the forwarder as a base station. We conducted the first receiving such a packet from the target issues a detection experiment by uploading the program with the CTP report, which will be sent to the base station with the protocol onto 91 motes (not including those 5 selected aforementioned TARF-enabled CTP protocol. motes as fake bases in later experiments), and no attack The experiment is set up within a clear floor space of was involved here. Then, in another experiment, in 90 by 40 inches with 15 TelosB motes (see Figure 8(a)). To
  • 12. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 12 4 x 10 3 CTP without adversaries power of all the Telosb motes except two fake base Number of delivered packets CTP with 5-node wormhole stations in the network is reduced through both software 2.5 TARF-enabled CTP with 5-node wormhole reduction and attenuator devices to within 30 inches. The 2 target uses an anti-detection mechanism utilizing a fake base station close to the real base station, and another 1.5 remote base station close to the target and mounted on another LEGO vehicle robot. The two fake base stations, 1 with a transmission range of at least 100 feet, collude 0.5 to form a wormhole: the fake base station close to the base station replays all the packets from the base station 0 0 5 10 15 20 25 30 immediately; the remote fake base station, after receiving Time in minutes those packets, immediately replays it again. This anti- (a) All three floors. detection mechanism tricks some network nodes into sending their event reports into these fake base stations 26 26 instead of the real base station. Though the fake base Number of nodes with 25 25 25 25 24 24 station close to the real base station is capable of cheating delivery record 21 20 the whole network alone by itself with its powerful radio for a certain amount of time, it can be easily recognized 9 9 9 9 9 by remote nodes as a poor next-hop candidate soon by most routing protocols based on link quality: that fake [0min, 6min] [6min, [12min, [18min, [24min, base station does not acknowledge the packets “sent” 12min] 18min] 24min] 30min] to it from remote nodes with a weak radio via a single Time CTP without adversaries hop since it can not really receive them. Thus, the anti- CTP with 5-node wormhole TARF-enabled CTP with 5-node wormhole detection mechanism needs to create such a wormhole to (b) First floor. replay the packets from the base station remotely. 36 36 36 36 37 36 34 Number of nodes with 33 32 30 delivery record 4 3 2 2 2 [0min, 6min] [6min, [12min, [18min, [24min, 12min] 18min] 24min] 30min] Time CTP without adversaries CTP with 5-node wormhole TARF-enabled CTP with 5-node wormhole (c) Second floor. (a) A snapshot of the network. Number of nodes with 25 25 25 25 25 24 24 23 23 22 delivery record 0 0 0 0 0 [0min, 6min] [6min, [12min, [18min, [24min, 12min] 18min] 24min] 30min] Time CTP without adversaries CTP with 5-node wormhole TARF-enabled CTP with 5-node wormhole (d) Third floor. Fig. 7. Empirical comparison of CTP and TARF-enabled CTP (b) A closer look. on Motelab: (a) number of all delivered data packets since the beginning; number of nodes on (b) the first floor, (c) the second Fig. 8. Deployment of a TARF-enabled wireless sensor network floor and (d) the third floor that delivered at least one data packet to detect a moving target under the umbrella of two fake base in sub-periods. stations in a wormhole. The target node 14 and the fake base station 13 close to it move across the network along two parallel tracks of make the multi-hop delivery necessary, the transmission 22 inches back and forth (see Figure 8(b)); they travel