order to establish routes between nodes. Such
information could become a target for malicious
adversaries who intend to bring the network down.
There are two sources of threats to routing protocols.
The first comes from external attackers. By injecting
erroneous routing information, replaying old routing
information, or distorting routing information, an
attacker can successfully partition a network or
introduce excessive traffic load into the network by
causing retransmission and inefficient routing. There
are two ways of ensuring security: either by
encrypting the data or by identification and removal
of malicious node from the network. The first
approach using public-key algorithms such as the
Diffie Hellman (Perrig et al., 2001) is not suitable for
a wireless sensor network in which nodes have
limited computing resources. Using such an algorithm
will mean a large amount of computation power being
used to encrypt and decrypt every message making
the network slow.
The second and more severe kind of threat comes
from the compromised nodes, which might advertise
incorrect routing information to other nodes.
Detection of such incorrect information is difficult.
Merely requiring routing information to be signed by
each node would not work, because compromised
nodes are able to generate valid signatures using their
private keys. To defend against the first kind of
threats, nodes can protect routing information in the
same way they protect data traffic, i.e., through the
use of cryptographic schemes [3, 4] such as digital
signature. However, this defense is ineffective against
attacks from compromised servers. Worse yet, as we
have argued, we cannot neglect the possibility of
nodes being compromised in an ad hoc network.
Detection of compromised nodes through routing
information is also difficult in an ad hoc network
because of its dynamically changing topology: when a
piece of routing information is found invalid, the
information could be generated by a compromised
node, or, it could have become invalid as a result of
topology changes. It is difficult to distinguish
between the two cases. On the other hand, we can
exploit certain properties of ad hoc networks to
achieve secure routing. Note that routing protocols for
ad hoc networks must handle outdated routing
information to accommodate the dynamically
changing topology. False routing information
generated by compromised nodes could, to some
extent, be considered outdated information. As long
as there are sufficiently many non-malicious nodes,
the routing protocol should be able to find routes that
go around these compromised nodes. Such capability
of the routing protocols usually relies on the inherent
redundancies‚ multiple, possibly disjoint, routes
between nodes in ad hoc networks.
With the above premise in mind; we propose a
solution to work around malicious nodes and also to
detect and remove the malicious nodes when found
from the trusted population (other nodes to which a
node transmits data). The solution to this has been
proposed in this paper which is an extension of the
proposed energy efficient protocol in (Sanjay et al.,
2010). We have named this protocol as Dynamic
Energy Efficient and Secure Routing (DEESR)
protocol. This can easily be extended to other cluster
based routing protocols. The distributed algorithm
applied in this protocol does not require excessive
computation resources. Also, there is no extra
network cost involved with this protocol. The paper
goes on to compare the proposed DEESR solution
with some of the earlier proposed secure routing
protocols using simulation techniques. The paper has
been divided as follows. Section 2 discusses existing
methods of achieving secure routing by discussing
some of the well known secure routing protocols.
Section 3 describes the terms and terminologies used
throughout the paper. In section 4, we provide a
detailed explanation of the proposed DEESR
protocol. Simulation results comparing DEESR
protocol with the existing approaches are presented in
Section 5. Lastly, Section 6 summarizes our finding
and provides insights into the future works.
2 PREVIOUS WORKS
There are various security based protocols (Perrig et
al., 2001), (Sanjay et al., 2009), (Yi et al., 2001),
(Karlof et al., 2004) for ad hoc networks. Yi (Yi et al.,
2001) have discussed in their paper that if the routing
protocol is compromised by changing the messages in
the transit, then no security at higher layers can help.
To address this problem they have proposed Security
Aware Ad-hoc Routing (SAR). It makes sure that data
is routed through a secure route composed of trusted
nodes and the security of the information in the
routing protocol. Apart from this, security has been
implemented at link layer in TinySec protocol given
in (Karlof et al., 2004).
SPINS (Perrig et al., 2001) was proposed keeping
in mind the resource limitations. This protocol
encrypts a message differently each time. SPINS
comprises of two building blocks, SNEP and μ-
TESLA. SNEP protocol was designed for stationary
networks and assumed that the base station is trusted.
It also assumed an access point for the other nodes in
the network. The μ-TESLA protocol is based on key
WINSYS 2010 - International Conference on Wireless Information Networks and Systems
24