Exploiting routing tree construction in CTP

  • Authors:
  • Islam Hegazy;Reihaneh Safavi-Naini;Carey Williamson

  • Affiliations:
  • Department of Computer Science, University of Calgary, Canada;Department of Computer Science, University of Calgary, Canada;Department of Computer Science, University of Calgary, Canada

  • Venue:
  • WISA'11 Proceedings of the 12th international conference on Information Security Applications
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

Sensor nodes in a Wireless Sensor Network (WSN) are scattered in an environment to collect data. These nodes are limited in resources and cannot process the collected data or store it for long periods of time. Thus, the sensor nodes rely on routing protocols to relay the collected data wirelessly to a central controller for analysis and storage. However, the routing protocols are not immune against malicious nodes because they sacrifice the security aspect to meet the limited resources of the sensor nodes. In this paper, we demonstrate how a malicious node can exploit the computation of link qualities in the Collection Tree routing Protocol (CTP) to disrupt the construction of routing trees. We propose a lightweight detection system to detect this malicious node. The proposed detection system is implemented and evaluated using the network simulator ns-2. The simulation results show that the detection system provides a robust detection.