• DocumentCode
    1376237
  • Title

    Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs

  • Author

    Zhan, Guoxing ; Shi, Weisong ; Deng, Julia

  • Author_Institution
    Dept. of Comput. Sci., Wayne State Univ., Detroit, MI, USA
  • Volume
    9
  • Issue
    2
  • fYear
    2012
  • Firstpage
    184
  • Lastpage
    197
  • Abstract
    The multihop routing in wireless sensor networks (WSNs) offers little protection against identity deception through replaying routing information. An adversary can exploit this defect to launch various harmful or even devastating attacks against the routing protocols, including sinkhole attacks, wormhole attacks, and Sybil attacks. The situation is further aggravated by mobile and harsh network conditions. Traditional cryptographic techniques or efforts at developing trust-aware routing protocols do not effectively address this severe problem. To secure the WSNs against adversaries misdirecting the multihop routing, we have designed and implemented TARF, a robust trust-aware routing framework for dynamic WSNs. Without tight time synchronization or known geographic information, TARF provides trustworthy and energy-efficient route. Most importantly, TARF proves effective against those harmful attacks developed out of identity deception; the resilience of TARF is verified through extensive evaluation with both simulation and empirical experiments on large-scale WSNs under various scenarios including mobile and RF-shielding network conditions. Further, we have implemented a low-overhead TARF module in TinyOS; as demonstrated, this implementation can be incorporated into existing routing protocols with the least effort. Based on TARF, we also demonstrated a proof-of-concept mobile target detection application that functions well against an antidetection mechanism.
  • Keywords
    cryptographic protocols; routing protocols; synchronisation; telecommunication security; wireless sensor networks; RF-shielding network; Sybil attacks; TARF; TinyOS; WSN; cryptographic techniques; geographic information; multihop routing; proof-of-concept mobile target detection; replaying routing information; sinkhole attacks; synchronization; trust-aware routing framework; trust-aware routing protocols; wireless sensor networks; wormhole attacks; Base stations; Mobile communication; Routing protocols; Synchronization; Throughput; Wireless sensor networks; Wireless sensor networks; routing protocols; security.;
  • fLanguage
    English
  • Journal_Title
    Dependable and Secure Computing, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    1545-5971
  • Type

    jour

  • DOI
    10.1109/TDSC.2011.58
  • Filename
    6081880