INFORMATION CHANGE THE WORLD

International Journal of Intelligent Systems and Applications(IJISA)

ISSN: 2074-904X (Print), ISSN: 2074-9058 (Online)

Published By: MECS Press

IJISA Vol.6, No.6, May. 2014

Impact of Multipath Routing on WSN Security Attacks

Full Text (PDF, 498KB), PP.72-78


Views:173   Downloads:4

Author(s)

Koffka Khan, Wayne Goodridge

Index Terms

Multipath, wireless sensor networks, security attacks, AODV, AOMDV

Abstract

Multipath routing does not minimize the consequences of security attacks. Due to this many WSNs are still in danger of most security attacks even when multipath routing is used. In critical situations, for example, in military and health applications this may lead to undesired, harmful and disastrous effects. These applications need to get their data communicated efficiently and in a secure manner. In this paper, we show the results of a series of security attacks on a multipath extension to the ad hoc on-demand distance vector AODV protocol, AOMDV. It is proved that many security parameters are negatively affected by security attacks on AOMDV, which is contradictory to research claims. This means that alternative refinements have to be made to present multipath routing protocols in order to make them more effective against network security attacks.

Cite This Paper

Koffka Khan, Wayne Goodridge,"Impact of Multipath Routing on WSN Security Attacks", International Journal of Intelligent Systems and Applications(IJISA), vol.6, no.6, pp.72-78, 2014. DOI: 10.5815/ijisa.2014.06.08

Reference

[1]A. Gamal, J. Mammen, B. Prabhakar, D. Shah. Throughput-delay trade-off in wireless networks. In INFOCOM. Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies, 2004, (Vol. 1).

[2]C. Frías, D. Díaz, A. Zavala, I. Aguilar. Dynamic cross-layer framework to provide QoS for video streaming services over ad hoc networks, 2012.

[3]C. K.-L. Lee, X.-H. Lin, and Y.-K. Kwok, “A Multipath Ad Hoc Routing Approach to Combat Wireless Link Insecurity,” Proc. ICC 2003, vol. 1, pp. 448–452, May 2003.

[4]D. Johnson, D. Maltz. Dynamic source routing in ad hoc wireless networks. Mobile computing, 1996, pp. 153-181.

[5]D. Kotz, et al. "Experimental evaluation of wireless simulation assumptions." Proceedings of the 7th ACM international symposium on Modeling, analysis and simulation of wireless and mobile systems. ACM, 2004.

[6]E. Royer, C. Perkins, An implementation study of the AODV routing protocol. In IEEE Wireless Communications and Networking Confernce, 2000, (Vol. 3, pp. 1003-1008).

[7]E. Stavrou, A. Pitsillides. A survey on secure multipath routing protocols in WSNs. Computer Networks, 2010, 54(13), 2215-2238.

[8]G. Almes, S. Kalidindi, M. Zekauskas. A one-way packet loss metric for IPPM. RFC 2680, 1999..

[9]G. Bianchi. "Performance analysis of the IEEE 802.11 distributed coordination function." Selected Areas in Communications, IEEE Journal, 2000, 18.3: 535-547.

[10]I. Chakeres, E. Belding-Royer. AODV routing protocol implementation design. In IEEE Distributed Computing Systems Workshops, 2004. Proceedings. 24th International Conference, 2004, pp. 698-703. 

[11]J. Chen, “New approaches to routing for large-scale data networks”, Ph.D dissertation, Rice university, 1999.

[12]J. Wu. An extended dynamic source routing scheme in ad hoc wireless networks. Telecommunication Systems, 22(1-4):61–75, 2003.

[13]M. Hussain, K. Kyung. WSN research activities for military application. In Advanced Communication Technology, 2009. ICACT 2009. 11th International Conference, 2009, (Vol. 1, pp. 271-274). IEEE.

[14]M. K. Marina and S. R. Das. Ad hoc on-demand multipath distance vector routing. ACM SIGMOBILE Mobile Computing and Communications Review, 2002, 6(3).

[15]P. Gupta, P. Kumar. The capacity of wireless networks.Information Theory, IEEE Transactions on, 2000, 46(2), 388-404.

[16]P. Kotzanikolaou, R. Mavropodi, R. C. Douligeris. Secure multipath routing for mobile ad hoc networks. In IEEE Wireless On-demand Network Systems and Services, 2005. WONS 2005. Second Annual Conference, 2005, (pp. 89-96).

[17]P. Papadimitratos and Z. J. Haas, “Secure Data Transmission in Mobile Ad Hoc Networks,” Proc. ACM WiSe 2003, pp. 41–50, Sept. 2003.

[18]P. Sambasivam, A. Murthy, E. Belding-Royer. Dynamically adaptive multipath routing based on AODV. In Proc. 3rd Annual Mediterranean Ad Hoc Networking Workshop, 2004..

[19]S. Bouam and J. Ben-Othman, “Data Security in Ad Hoc Networks Using Multipath Routing,” Proc. PIMRC 2003, vol. 2, pp. 1331–1335, Sept. 2003.

[20]S.-J. Lee and M. Gerla. Split multipath routing with maximally disjoint paths in ad hoc networks. In IEEE Proceedings of ICC 2001, pages 3201–3205.

[21]W. Lou and Y. Fang, “A Multipath Routing Approach for Secure Data Delivery,” Proc. MILCOM 2001, vol. 2, pp. 1467–1473, Oct. 2001. 

[22]Y. Yuan, H. Chen, M. Jia. An optimized ad-hoc on-demand multipath distance vector (AOMDV) routing protocol. In Communications, IEEE Asia-Pacific Conference, 2005 (pp. 569-573).

[23]Z. Li, Y. Kwok. A new multipath routing approach to enhancing TCP security in ad hoc wireless networks. In IEEE Parallel Processing, 2005. ICPP 2005 Workshops. International Conference Workshops, 2005, (pp. 372-379).