Abstract
1. Introduction
Routing protocol in data fusion is one of the key parts of wireless sensor networks (WSNs), while security problems challenge the routing of sensor networks. Since sensor nodes in real applications are often deployed in hostile environment such as battlefield, the adversaries may capture sensor nodes and pretend valid member inside the network to collect information or inject false messages into the network; it is necessary to design a secure routing protocol for WSNs, while many traditional security measures cost too much overhead of communication and computation for those sensor nodes which only have limited power and energy. Hence, traditional strong security methods such as asymmetric cryptographic schemes are not suitable for wireless sensor network because of their high computation and communication overhead. Naturally, lightweight security measures are much more popular in the routing protocols of WSNs.
In this paper we propose a lightweight secure routing scheme in data fusion for wireless sensor networks, which we call lightweight secure directed diffusion (LSDD). It mainly provides authenticity and integrity in the routing process with relative low overhead by extending a popular routing protocol-directed diffusion. We show how LSDD can effectively defend multiple attacks such as DOS attacks and sinkhole attacks. We have simulated LSDD in network simulator-NS2 [1] and the performance of LSDD is invigorating.
2. Background
Routing in WSNs is an important part, while it is also challenging because there are some particular characteristics (e.g., energy and power limitation) which other wireless networks do not possess. Because the number of deployed sensor nodes is commonly large, it definitely costs too much for maintaining ID table if ID-based routing system is employed. Therefore, traditional ID-based protocols may not be applicable to WSNs. Besides, in WSNs to some extent receiving data is more significant than getting the IDs of which nodes sent the data.
Considering a particular requirement of WSNs that receiving data is more significant than getting the IDs of which nodes sent the data, researchers have specifically designed some new algorithms for routing problems in WSNs. In order to reduce energy consumption, routing techniques proposed in the literature [2–7] for WSNs employ some well-known routing mechanisms as well as mechanism special to WSNs, for example, clustering, different node role assignment, data aggregation and in-network processing, and data-centric methods.
Among those protocols, several routing protocols became popular such as SPIN (sensor protocols for information via negotiation) [8] and directed diffusion [9]. In SPIN routing process, nodes name their data metadata. They remove the transmission of redundant data throughout the network by metadata negotiations. Moreover, SPIN nodes can decide how to communicate based on both knowledge of the data and knowledge of the available resources. While, directed diffusion (DD) is a data-centric routing protocol since all communication is for named data, it provides a mechanism to flood queries based on events or tasks and then sets up the route by establishing reverse gradients to send data back. DD involves several elements: interests, data messages, gradients, and reinforcements. An interest message is a query that describes user's needs. Each interest contains a sensing task description which is supported by a sensor network for querying data. Typically, data in sensor networks is the collected or processed information of a physical environment that can be a short description of event for the sensed environment. In DD, data is named by pairs of “attribute-value.” As shown in Figure 1, a sensing task is disseminated throughout the sensor network as an interest from sink to sources firstly. Then the dissemination sets up gradients within the network designed to retrieve events (the event can be retrieved by a form of data matching interests). Specially, a gradient is direction state created in each node that receives an interest. The steps of directed diffusion are shown in Figure 1.

Directed diffusion protocol.
3. Lightweight Secure Directed Diffusion (LSDD)
Lightweight secure directed diffusion scheme involves two parts, one is a secure directed diffusion protocol, which improves directed diffusion protocol by integrating delay-tolerant one-way hash chain authentication and black list techniques, and the other is lightweight key management service.
The protocol includes an extra preload setup and the same set of phases as in the original
Each node also maintains its own one-way hash key chain. Base station sends out as a verifier
Notes: It allows
suppose
⋮
if result is OK, it accept
source node
Base station (or sink) randomly chooses a seed (
For every task, the sink broadcasts a compound interest message including authentication data and interest to each of its neighbors periodically. This initial compound interest message contains the specified interest, blacklist, and their
Intuitively, this initial interest functions like exploratory which means to call for what kind of data the sink wants.
Every node maintains an interest cache. Each item in the cache corresponds to a distinct interest. For any node who receives interest, the pseudocode of the step is as shown in Pseudocode 1.
{
Pseudocode 1
Each node
For any node who receives interest, the pseudocode of the step is as shown in Pseudocode 2.
Pseudocode 2
After the reinforcement, node
A node that receives the above packet from its neighbor firstly checks if the
4. Key Management Services for LSDD
Since keys in our protocol originate from one-way hash key chain (OWH), the key management scheme is mainly based on OWH life cycle. In this work, we focus on addressing two problems: bootstrapping a new one-way hash chain and refreshing a hash chain for maintenance.
4.1. Bootstrapping of OWH
Since in this
4.2. Maintenance of OWH
4.2.1. Packets Loss
Since the packets pass through wireless channel, it is possible that packets loss. Actually, it is necessary for a routing protocol to allow the packets loss. In one message dissemination of our protocol, it is allowed for
4.2.2. Path Changes
Routing path could be changed for some radio transmission problems; for example, by monitoring routing information broadcast by its neighbor nodes, a node
When there is a path change, one natural way to handle it is to rebootstrap
In order to defend against this kind of DOS attacks, we need to rebootstrap

Path changes when node B1 fails.
4.2.3. Joining of New Node(s)
There are two scenarios we need to handle. One scenario is when only one new node is added in the path, there is no need to bootstrap the
The other scenario is when there are multiple new nodes added at same time, the bootstrapping process can be performed periodically or when the sink finds that the number of new nodes in the path exceeds some threshold, the bootstrapping process should be performed immediately. For example, when three new nodes (A, B, and C) just join the path, an adversary can try to only attack some of these nodes (A and B) but cannot attack the other nodes which are divided by old nodes. Hence, one observation is that not all nodes joining do require immediate rebootstrapping.
4.2.4. Leaving of Node(s)
It is possible for some nodes to leave from the path. Considering the situation of possible leaking of
4.2.5. Compromised Node(s)
When there are some nodes compromised by adversaries, the
5. Security Analysis
5.1. Security Capabilities Analysis
Our scheme can effectively guarantee the authenticity and integrity of data transferred in the network. Once the data is modified, the receiver can detect it. And it can effectively defend bogus routing attack and sinkhole attack by data authentication and blacklist. Table 1 shows the comparison of the defending capabilities of
Defending capabilities comparison of several routing protocols for WSN.
GR: geographic Routing.
CB: cluster based.
RR: rumor routing.
DD: directed diffusion.
SDD: secure directed diffusion.
× represents that it can be attacked by it.
Because we adopt authentication combining with blacklist broadcasting, each node who receives the blacklist can judge whether the nodes around it are in the blacklist. According to the timely blacklist and authentication, nodes can effectively detect malicious nodes and behaviors, which is able to be against multiple attacks such as sinkhole attacks and wormhole attacks.
5.1.1. Defending against Altered, Replayed Routing Information
In
5.1.2. Defending against Sybil Attack
Identity fraud is central to the Sybil attack [19]. However, many compromised nodes still participate in the network for communication. It is very difficult to distinguish between the compromised node and legitimate node. Fortunately, in our protocol, because we adopt blacklist notification scheme, the malicious or abnormal behaviors can be detected by voting-based detection (
5.1.3. Defending against Selective Forwarding
In selective forwarding, after receiving the data messages from the neighbor node, the adversary does not forward all the messages. The adversary can modify the data message or inject its own data message to the subsequent nodes. In Figure 3, the adversary has been in the path of A→ B→ C. Let us consider that the data flows from A→ adversary to → B→ C. Then the adversary can drop some data message from A and then sends some others to B. B further forwards the false data message to the base station.

Defending against selective forwarding attacks.
However, in our protocol, since we adopt blacklist technique and voting-based detection scheme, thus, nodes can monitor their neighbors to observe whether messages are being forwarded correctly. The correct forwarding ratio can be used to vote for the node. Once the votes for one node are lower than the threshold, messages from the node would be unaccepted by other neighbor nodes.
5.1.4. Defending against Sinkhole Attacks
In sinkhole attacks, adversary firstly compromises one node in the network and makes the compromised node attractive to the surrounding neighbors by presenting good routing capabilities. Thus most traffic around this node is led to pass through the compromised node [20]. The goal of sinkhole attacks is to prevent the sink or base station from receiving correct data sent out from the source.
However, in
5.1.5. Defending against Wormholes Attacks
In a wormhole attack, adversaries cooperate to provide a low-latency side-channel for communication to make a false image of routing. For example, two distant malicious nodes may communicate with each other by a powerful side-channel such as a direct low-latency communication link. All the packets received at one malicious node are relayed to the other by the low-latency side-channel, where they are transmitted as if there is a malicious node very near from the original source. Thus the neighbors of these two malicious nodes may get false routing information that the nodes in that area are very close (actually they are far). Subsequently, it may disrupt the network routing.
However, in our protocol, since we adopt message authentication and blacklist scheme. All the compromised nodes can be detected in time and excluded from the network. In other words, the malicious nodes cannot be trusted as a valid intermediate forwarder. Thus the wormhole attacks can be effectively blocked.
5.1.6. Defending against DOS Attacks
A typical DOS attack is to exhaust resources such as memory or bandwidth by extremely injecting a large number of messages into the network in a very short time [21]. Commonly, in WSN, a DOS attacker possesses a powerful device, such as a laptop, so it is not difficult for the attacker to inject large amount of messages in a very short time. For example, an attacker can pretend to be some other node (node
However, in
5.1.7. Defending against Flow Suppression Attacks
Flow suppression is a variant of denial of service attack. The attacker can listen to the negative reinforcement messages and sends the negative reinforcement to the node which is delivering data at a high rate.
In Figure 4, the data flow path is A→ B→ C. When the path between A and B or B and C is congested for a time, the adversary can pretend to be node B and send a negative reinforcement to node A. When node A receives this information, it changes the data rate value. Thus a good path is suppressed for illegal negative reinforcement.

Flow suppression attacks.
However, in our protocol, since, in the message of negative reinforcement of our protocol, we also employed
5.1.8. Defending against Path Influence Attacks
Let us consider the node A as the source and node C as the base station Figure 5. If the adversary knows the

Defending against path influence attacks.
However, in our protocol, if the adversary sends an announcement to a neighbor, the receiving node will find out whether the node is a malicious one or not by the blacklist. So it is not applicable.
5.2. Detection of Malicious Node (Blacklist Technique)
As we all know, sensor nodes in sensor networks are usually deployed in hostile environments such as battlefields. Consequently a sensor node may be compromised or out of function. When an adversary has compromised certain sensor node(s), he may not launch direct attacks against the network immediately since once the misbehavior is detected, the sink may abandon these compromised nodes and put these nodes
In our work, we proposed a voting-based detection (
As the first step toward the solution to the problem, we model it into a weight-based network. Each node can vote on its neighbor nodes as the value 1 or 0. These votes can be delivered to the sink or base station. The sink collects all information (including the votes for each node in the network) provided by sensor nodes and calculates an aggregation result using the votes for each sensor node:
6. Simulation and Performance Analysis
To evaluate the feasibility of our mechanism in current
Our basic simulation network topology is a regular
Besides, we designed a voting-based detection mechanism to generate blacklist which is able to show the nodes that are malicious around them. Broadcasting blacklist has two methods, one is that sink broadcasts blacklist periodically, and another is that sink broadcasts blacklist with interests’ data broadcasting. According to the protocol situation, we adopt the latter one; thus the protocol “lightweight secure directed diffusion” has the same communication rounds with the original directed diffusion protocol.
6.1. Structure of the Simulation
The simulation follows the process and steps of the original directed diffusion. Based on the codes of directed diffusion, we modified some parts to make them able to authenticate the messages. Here we discuss the principle and details of the simulation for the
6.1.1. API for Subscription and Publishing
Since the directed diffusion adopts publishing-subscription mechanism to establish the communication among nodes, the following is the API for the publishing-subscription process:
When users subscribe one set of particular attributes and send out the request for data needed, we define them as data receiver (sinks). Since the sensors sense the data and send the data back, we define them as source. Subscriber and publisher both employ the naming mechanism based on attribute. The data diffusion algorithm guarantees the data transfers from source to sink on an efficient way.
6.1.2. Naming Mechanism
6.1.3. The Algorithm of Secure Directed Diffusion
Publishing-subscribing model provides us with the standard interface for coding the applications for

Interaction between sink and source in several diffusion algorithms.
In two-phase pull diffusion, receivers (sink) create one interests set with special attribute. Every node who receives the interest caches it and forwards it to the neighbors and establishes the gradient relation with the neighbors. The gradient can guide the data transmission direction and speed. The intermediate node receives and forwards the interests to the neighbor nodes. The data sent out in the first time by the source is called exploratory data; the exploratory data is flooded to all the neighbors along the gradients. After the sink receives the first exploratory data, it chooses one path and sends out the positive reinforcement message. Therefore, all the subsequent data will be transfered on the reinforced path.
In one-phase pull diffusion, sink is passive while the source is active; the data is flooded to the sink from the source. It also needs to establish the gradient like the two-phase pull diffusion.
In one-phase push diffusion, when the source receives the interest, it obeys the first-come-best-path. It is different from the previous algorithms since there is no exploratory data and there is no reinforcement message.
We choose two-phase pull diffusion as the rule of following the original design of directed diffusion.
6.1.4. Components of the Simulation
In our simulation, several key components work together to achieve one objective. The process and relations among the components are shown in Figure 7.

The sequence graph showing how the components handle the messages.
6.2. Performance
Table 2 shows the communication and computation comparison of
Comparison with original directed diffusion scheme.
Configuration of NS2 simulator.
We adopt one-way sequence number generation algorithm to generate one-way hash key chain with relative small storage overhead and computation overhead. In our simulation, we use 30 bytes data as original interest test data since the default packet size is 30 bytes. A

Average delay of each node with 5% packets loss rate.
And with

Average delay of each node with 10% packets loss rate.
6.3. Storage Performance of OWH
Since a single
The method of generating and storing a long
Another important factor is the length of an
When the size of the OWH is 222, it requires about 15.18 ms on average to generate an

Time expense for generation of one-way hash chain.
6.4. Comparison with Other Secure Protocols
We compare our scheme with other 2 secure routing protocols STEF [26] and IPD [27] in node energy consumption and detection ratios for captured nodes. The initial energy of a node is set to be 2J.
We mainly compare the overhead by time of energy consumption. From the experiments, we can find out that all energy of the nodes of IPD and STEF is consumed at time of 512 seconds and 423 seconds, while the whole energy of the nodes of our scheme remains exhausting until 662 seconds, as shown in Figure 11.

Node energy consumption.
The detection of captured nodes represents the effectiveness of the secure protocol to some extent. We found that commonly the capture ratio of nodes is higher; the detection of captured nodes would be lower since more captured nodes would lure others together. We set the biggest value of the capture ratio of nodes to be 0.5. From the experiment, we can find out that there is no big difference when the capture ratio of nodes is less than 0.1. However, when the capture ratio is bigger than 0.1, our scheme has better detection ratio than IPD and STEF, as shown in Figure 12.

Detection ratio of captured nodes.
7. Conclusion
We propose a lightweight secure routing scheme in data fusion for wireless sensor networks which provides authenticity and integrity in the routing process with relative low overhead. The security performance of the scheme is analyzed in the paper. Besides, a simulation was run and the result shows that the performance is acceptable for wireless sensor networks.
