Academia.eduAcademia.edu

A secure routing scheme for mobile wireless sensor networks

2010, Artificial Life and Robotics

Abstract

A secure routing scheme for mobile wireless sensor networks such things as robots. For example, research into mobile WSNs are Robomote, 2 Emulab, 3 and ZebraNet. 4 Challenges in mobile WSNs include deployment, localization, selforganization, navigation, coverage, and energy maintenance. One difference between static and mobile WSNs is routing, i.e., dynamic routing is used in a mobile WSN, unlike a static WSN which uses fi xed routing or fl ooding. The issue of security in WSNs must be addressed because WSNs may be deployed in potentially adverse or hostile environments. Adversaries can inject jamming, which may cause not only false alarms, but also depletion of the limited energy of sensor nodes. Frequency-hopping (FH) is a well-known spread-spectrum method of transmitting radio signals by rapidly changing the frequency channel using a predefi ned hopping sequence known to both transmitter and receiver. 5,6 Although FH is resistant to jamming by external malicious nodes which have no knowledge of the sequence, it is of no effect against attacks by internal compromised nodes which know the sequence. Since the computation and storage constraints of low-end sensor nodes make complex cryptographybased mechanisms for creating the hopping sequence unfeasible, it is necessary to create the sequence simply and securely. In this article, we propose a secure scheme for creating a hopping sequence for mobile wireless sensor networks. The proposed scheme is based on the idea of statistical enroute fi ltering (SEF). 7 In SEF, assuming that the same event can be detected by multiple nodes, forwarding nodes along the way to the base station can statistically detect false reports en-route. SEF has achieved the early detection of false data reports with low computation and communication overheads. We evaluated the performance of our scheme thorough simulations. The rest of the article is organized as follows. In Sect. 2, we describe the frequency-hopping and the statistical enroute fi ltering in detail. Section 3 presents our secure scheme for creating the hopping sequence for mobile wireless sensor networks. In Sect. 4, we evaluate the performance of our scheme thorough simulations, and Sect. 5 concludes the paper.