SUMP: a secure unicast messaging protocol for wireless ad hoc sensor networks

  • Authors:
  • Jeff Janies;Chin-Tser Huang;Nathan L. Johnson;Theodor Richardson

  • Affiliations:
  • Department of Computer Science and Engineering, University of South Carolina, Columbia, SC, USA.;Department of Computer Science and Engineering, University of South Carolina, Columbia, SC, USA.;Department of Computer Science and Engineering, University of South Carolina, Columbia, SC, USA.;Department of Computer Science and Engineering, University of South Carolina, Columbia, SC, USA

  • Venue:
  • International Journal of Sensor Networks
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

Most wireless ad hoc sensor networks are susceptible to routing level attacks, in which an adversary masquerades as a legitimate node to convince neighbouring nodes that it is the 'logical' next hop or is on a 'better' path for forwarding packets and arbitrarily drops the packets forwarded by neighbouring nodes. In this paper, we propose a Secure Unicast Messaging Protocol (SUMP) for wireless ad hoc sensor networks to mitigate the threat of routing level attacks. SUMP groups nodes into levels based on hop count to provide hop-by-hop group authentication using Merkle hash trees. This method allows for varied levels of security in accordance with a node's hop count from the base station and secure, directed unicast communications from the base station to individual nodes. Unlike other such protocols the parent information maintained by a node running SUMP is securely provided by the base station and thus mitigates the threat of the adversary convincing a node to forward through a non-existent path.