Selective Authentication Based Geographic Opportunistic Routing in Wireless Sensor Networks for Internet of Things Against DoS Attacks

被引:35
作者
Lyu, Chen [1 ]
Zhang, Xiaomei [2 ]
Liu, Zhiqiang [3 ]
Chi, Chi-Hung [4 ]
机构
[1] Shanghai Univ Finance & Econ, Dept Comp Sci & Technol, Shanghai 200433, Peoples R China
[2] Shanghai Univ Engn Sci, Sch Elect & Elect Engn, Shanghai 201620, Peoples R China
[3] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
[4] CSIRO, Data61, Hobart, Tas 7005, Australia
基金
中国国家自然科学基金;
关键词
Internet of Things; opportunistic routing; DoS attacks; selective authentication; SECURITY;
D O I
10.1109/ACCESS.2019.2902843
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless Sensor Networks (WSNs) have been widely used as the communication system in the Internet of Things (IoT). In addition to the services provided by WSNs, many IoT-based applications require reliable data delivery over unstable wireless links. To guarantee reliable data delivery, existing works exploit geographic opportunistic routing with multiple candidate forwarders in WSNs. However, these approaches suffer from serious Denial of Service (DoS) attacks, where a large number of invalid data are deliberately delivered to receivers to disrupt the normal operations of WSNs. In this paper, we propose a selective authentication-based geographic opportunistic routing (SelGOR) to defend against the DoS attacks, meeting the requirements of authenticity and reliability in WSNs. By analyzing statistic state information (SSI) of wireless links, SelGOR leverages an SSI-based trust model to improve the efficiency of data delivery. Unlike previous opportunistic routing protocols, SelGOR ensures data integrity by developing an entropy-based selective authentication algorithm, and is able to isolate DoS attackers and reduce the computational cost. Specifically, we design a distributed cooperative verification scheme to accelerate the isolation of attackers. This scheme also makes SelGOR avoid duplicate data transmission and redundant signature verification resulting from opportunistic routing. The extensive simulations show that SelGOR provides reliable and authentic data delivery, while it only consumes 50% of the computational cost compared to other related solutions.
引用
收藏
页码:31068 / 31082
页数:15
相关论文
共 37 条
[1]  
Agah A., 2007, INT J NETW SECUR, V5, P145
[2]   Routing techniques in wireless sensor networks: A survey [J].
Al-Karaki, JN ;
Kamal, AE .
IEEE WIRELESS COMMUNICATIONS, 2004, 11 (06) :6-28
[3]  
[Anonymous], 2001, P NETW DISTR SYST SE
[4]  
[Anonymous], 2008, P IEEE INFOCOM 2008
[5]   The Internet of Things: A survey [J].
Atzori, Luigi ;
Iera, Antonio ;
Morabito, Giacomo .
COMPUTER NETWORKS, 2010, 54 (15) :2787-2805
[6]   ExOR: Opportunistic multi-hop routing for wireless networks [J].
Biswas, S ;
Morris, R .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2005, 35 (04) :133-143
[7]  
Cheng L, 2015, 2015 12TH ANNUAL IEEE INTERNATIONAL CONFERENCE ON SENSING, COMMUNICATION, AND NETWORKING (SECON), P46, DOI 10.1109/SAHCN.2015.7338290
[8]   QoS Aware Geographic Opportunistic Routing in Wireless Sensor Networks [J].
Cheng, Long ;
Niu, Jianwei ;
Cao, Jiannong ;
Das, Sajal K. ;
Gu, Yu .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (07) :1864-1875
[9]   Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks [J].
Chonka, Ashley ;
Xiang, Yang ;
Zhou, Wanlei ;
Bonti, Alessio .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (04) :1097-1107
[10]  
Deng J., 2005, SASN '05: Proceedings of the 3rd ACM workshop 138 on Security of ad hoc and sensor networks, P89, DOI DOI 10.1145/1102219.1102235