SGOR: secure and scalable geographic opportunistic routing with received signal strength in WSNs

Chen Lyu, Dawu Gu, Xiaomei Zhang, Shifeng Sun, Yuanyuan Zhang, Amit Pande

Research output: Contribution to journalArticleResearchpeer-review

Abstract

Wireless sensor networks (WSNs) are inherently susceptible to attacks as malicious nodes can disrupt the communication from any other node to the sink. To address a wide range of attacks, we propose a novel and comprehensive approach called Secure and Scalable Geographic Opportunistic Routing with received signal strength (SGOR), satisfying the requirements of both security and scalability in WSNs. Unlike most of previous secure protocols relying on infrastructure like anchor nodes, a distributed location verification algorithm is presented to utilize the received signal strength to address the location spoofing attack. As one of opportunistic geographic routings, SGOR provides the property of robustness by taking full advantage of the broadcast nature of wireless channels, and scalability for being inherited from geographic routing. Moreover, an ambient-sensitive trust model is proposed to defend against more kinds of attackers in SGOR. The theoretical results are given to demonstrate the effectiveness and robustness of SGOR to survive more severe attacks. In extensive simulations, we compare SGOR with four other representative protocols. The results show that SGOR achieves about two times higher packet delivery rate with acceptable overhead, particularly in large and highly hostile networks.

Original languageEnglish
Pages (from-to)37-51
Number of pages15
JournalComputer Communications
Volume59
DOIs
Publication statusPublished - 15 Mar 2015
Externally publishedYes

Keywords

  • Geographic routing
  • Location verification
  • Opportunistic forwarding
  • Wireless sensor networks

Cite this

Lyu, Chen ; Gu, Dawu ; Zhang, Xiaomei ; Sun, Shifeng ; Zhang, Yuanyuan ; Pande, Amit. / SGOR : secure and scalable geographic opportunistic routing with received signal strength in WSNs. In: Computer Communications. 2015 ; Vol. 59. pp. 37-51.
@article{d27c913702464cb58cfc3ecd39889df7,
title = "SGOR: secure and scalable geographic opportunistic routing with received signal strength in WSNs",
abstract = "Wireless sensor networks (WSNs) are inherently susceptible to attacks as malicious nodes can disrupt the communication from any other node to the sink. To address a wide range of attacks, we propose a novel and comprehensive approach called Secure and Scalable Geographic Opportunistic Routing with received signal strength (SGOR), satisfying the requirements of both security and scalability in WSNs. Unlike most of previous secure protocols relying on infrastructure like anchor nodes, a distributed location verification algorithm is presented to utilize the received signal strength to address the location spoofing attack. As one of opportunistic geographic routings, SGOR provides the property of robustness by taking full advantage of the broadcast nature of wireless channels, and scalability for being inherited from geographic routing. Moreover, an ambient-sensitive trust model is proposed to defend against more kinds of attackers in SGOR. The theoretical results are given to demonstrate the effectiveness and robustness of SGOR to survive more severe attacks. In extensive simulations, we compare SGOR with four other representative protocols. The results show that SGOR achieves about two times higher packet delivery rate with acceptable overhead, particularly in large and highly hostile networks.",
keywords = "Geographic routing, Location verification, Opportunistic forwarding, Wireless sensor networks",
author = "Chen Lyu and Dawu Gu and Xiaomei Zhang and Shifeng Sun and Yuanyuan Zhang and Amit Pande",
year = "2015",
month = "3",
day = "15",
doi = "10.1016/j.comcom.2015.01.003",
language = "English",
volume = "59",
pages = "37--51",
journal = "Computer Communications",
issn = "0140-3664",
publisher = "Elsevier",

}

SGOR : secure and scalable geographic opportunistic routing with received signal strength in WSNs. / Lyu, Chen; Gu, Dawu; Zhang, Xiaomei; Sun, Shifeng; Zhang, Yuanyuan; Pande, Amit.

In: Computer Communications, Vol. 59, 15.03.2015, p. 37-51.

Research output: Contribution to journalArticleResearchpeer-review

TY - JOUR

T1 - SGOR

T2 - secure and scalable geographic opportunistic routing with received signal strength in WSNs

AU - Lyu, Chen

AU - Gu, Dawu

AU - Zhang, Xiaomei

AU - Sun, Shifeng

AU - Zhang, Yuanyuan

AU - Pande, Amit

PY - 2015/3/15

Y1 - 2015/3/15

N2 - Wireless sensor networks (WSNs) are inherently susceptible to attacks as malicious nodes can disrupt the communication from any other node to the sink. To address a wide range of attacks, we propose a novel and comprehensive approach called Secure and Scalable Geographic Opportunistic Routing with received signal strength (SGOR), satisfying the requirements of both security and scalability in WSNs. Unlike most of previous secure protocols relying on infrastructure like anchor nodes, a distributed location verification algorithm is presented to utilize the received signal strength to address the location spoofing attack. As one of opportunistic geographic routings, SGOR provides the property of robustness by taking full advantage of the broadcast nature of wireless channels, and scalability for being inherited from geographic routing. Moreover, an ambient-sensitive trust model is proposed to defend against more kinds of attackers in SGOR. The theoretical results are given to demonstrate the effectiveness and robustness of SGOR to survive more severe attacks. In extensive simulations, we compare SGOR with four other representative protocols. The results show that SGOR achieves about two times higher packet delivery rate with acceptable overhead, particularly in large and highly hostile networks.

AB - Wireless sensor networks (WSNs) are inherently susceptible to attacks as malicious nodes can disrupt the communication from any other node to the sink. To address a wide range of attacks, we propose a novel and comprehensive approach called Secure and Scalable Geographic Opportunistic Routing with received signal strength (SGOR), satisfying the requirements of both security and scalability in WSNs. Unlike most of previous secure protocols relying on infrastructure like anchor nodes, a distributed location verification algorithm is presented to utilize the received signal strength to address the location spoofing attack. As one of opportunistic geographic routings, SGOR provides the property of robustness by taking full advantage of the broadcast nature of wireless channels, and scalability for being inherited from geographic routing. Moreover, an ambient-sensitive trust model is proposed to defend against more kinds of attackers in SGOR. The theoretical results are given to demonstrate the effectiveness and robustness of SGOR to survive more severe attacks. In extensive simulations, we compare SGOR with four other representative protocols. The results show that SGOR achieves about two times higher packet delivery rate with acceptable overhead, particularly in large and highly hostile networks.

KW - Geographic routing

KW - Location verification

KW - Opportunistic forwarding

KW - Wireless sensor networks

UR - http://www.scopus.com/inward/record.url?scp=84926252660&partnerID=8YFLogxK

U2 - 10.1016/j.comcom.2015.01.003

DO - 10.1016/j.comcom.2015.01.003

M3 - Article

VL - 59

SP - 37

EP - 51

JO - Computer Communications

JF - Computer Communications

SN - 0140-3664

ER -