Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes
Source: University of Arizona
Compromised-node and denial-of-service are two key attacks in Wireless Sensor Networks (WSNs). This paper studies routing mechanisms that circumvent (bypass) black holes formed by these attacks. The paper argues that existing multi-path routing approaches are vulnerable to such attacks, mainly due to their deterministic nature. So once an adversary acquires the routing algorithm, it can compute the same routes known to the source, and hence endanger all information sent over these routes. This paper develops mechanisms that generate randomized multipath routes. Under the design, the routes taken by the "Shares" of different packets change over time. So even if the routing algorithm becomes known to the adversary, the adversary still cannot pinpoint the routes traversed by each packet.