Selective Authentication Based Geographic Opportun
Selective Authentication Based Geographic Opportun
net/publication/331512411
CITATIONS READS
2 3,254
4 authors, including:
Chen Lyu
University of Canterbury
13 PUBLICATIONS 82 CITATIONS
SEE PROFILE
All content following this page was uploaded by Chen Lyu on 28 March 2019.
Date of publication xxxx 00, 0000, date of current version xxxx 00, 0000.
Digital Object Identifier 10.1109/ACCESS.2017.DOI
ABSTRACT Wireless Sensor Networks (WSNs) have been widely used as the communication system in
the Internet of Things (IoT). In addition to the services provided by WSNs, many IoT-based applications
require reliable data delivery over unstable wireless links. To guarantee reliable data delivery, existing
works exploit geographic opportunistic routing with multiple candidate forwarders in WSNs. However,
these approaches suffer from serious Denial of Service (DoS) attacks, where a large number of invalid
data are deliberately delivered to receivers to disrupt the normal operations of WSNs. In this paper, we
propose a selective authentication based geographic opportunistic routing (SelGOR) to defend against the
DoS attacks, meeting the requirements of authenticity and reliability in WSNs. By analyzing statistic
state information (SSI) of wireless links, SelGOR leverages an SSI-based trust model to improve the
efficiency of data delivery. Unlike previous opportunistic routing protocols, SelGOR ensures data integrity
by developing an entropy-based selective authentication algorithm, and is able to isolate DoS attackers
and reduce the computational cost. Specifically, we design a distributed cooperative verification scheme to
accelerate the isolation of attackers. This scheme also makes SelGOR avoid duplicate data transmission
and redundant signature verification resulting from opportunistic routing. Extensive simulations show that
SelGOR provides reliable and authentic data delivery, while it only consumes 50% of the computational
cost compared to other related solutions.
INDEX TERMS Internet of Things, opportunistic routing, DoS attacks, selective authentication
I. INTRODUCTION sensor nodes collect the patient’s physical data and then
IRELESS sensor networks (WSNs) have been de- deliver them to the doctor. Based on the collected data, the
W veloped in the Internet of Things (IoT) and play
an important role to provide a wide range of applications
doctor is aware of the physiological status of the patient, and
is able to make a suitable diagnosis.
through sensors, such as smart home, traffic management, The above application requires WSNs to provide reliable
smart grids and environment monitoring [1], [2]. A wireless data delivery, which is regarded as the critical factor for the
sensor network contains some receivers/sinks and a number success of diagnosis. However, based on the varying and
of distributed sensor nodes which collaboratively collect and shared wireless mediums, WSNs are susceptible to link fail-
transmit data to perform a variety of missions. Built upon ures due to signal interference or signal fading, which may
WSNs, providing reliable data delivery is usually expected significantly decrease the quality of service [4], [5]. There-
for IoT-based applications. One example of such applications fore, supporting reliable data delivery becomes a challenging
is smart healthcare, which is used for the purpose of mon- problem in WSNs. To address this issue, many multi-path
itoring, tracking or treating patients [3]. In this application, routing strategies [6]–[8] have been proposed to improve the
VOLUME x, 2019 1
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2019.2902843, IEEE Access
C. Lyu et al.: Selective Authentication based Geographic Opportunistic Routing in WSNs for IoT against DoS Attacks
reliability of data delivery in WSNs. However, maintaining the transmission time of data packets. Hence, restoring the
a multi-path route for a data flow has a high communication priorities of candidate forwarders to achieve the integrity and
cost for the instability of wireless channels. Moreover, since reliability of data should be our main design goal. Third, du-
data packets are transmitted over multiple paths to receivers, plicate transmission of invalid data or redundant verification
more transmission contentions and signal interferences are may be incurred by the opportunistic routing. For example, if
introduced leading to additional transmission failures in the the first candidate drops one invalid packet after the process
network. of verification, the second candidate cannot certain whether
Recently, an efficient approach to meet the requirement the data packet is dropped for being invalid or link failure.
of data reliability is exploiting (geographic) opportunistic It may skip the process of verification and then proceed to
routing which does not determine the routing path before data deliver the invalid data packet. Alternatively, it may perform
transmission [9]–[12]. With the broadcast and shared nature the same process of verification and then drop it. Therefore,
of the wireless channel, it allows packet transmission to be a scheme of sharing the verification information between
overheard by multiple sensor nodes. Instead of one singer for- candidates should be designed to minimize the incurred
warder in traditional routing, multiple candidate forwarders overhead.
are selected in the opportunistic routing, which are ordered In this paper, we propose a selective authentication based
based on the priorities defined by the sender of the packet. geographic opportunistic routing (SelGOR) to defend against
Therefore, the packet transmission is not disrupted as long the DoS attacks in WSNs. SelGOR aims at ensuring the au-
as one candidate in the forwarder set successfully relays thenticity and reliability of data packets for IoT-based appli-
it. Compared with multi-path routing, opportunistic routing cations. To improve the efficiency of data delivery, SelGOR
has better performance because no additional transmission analyzes statistic state information (SSI) of wireless links,
contentions or signal interferences exist between candidates. and builds an SSI-based trust model for the construction of a
As one of the traditional routing protocols, geographic trust-based geographic opportunistic routing. In addition, in
routing is an attractive choice with regard to dynamic wire- contrast to existing opportunistic routing, SelGOR leverages
less links, since it does not need to establish and maintain an entropy-based selective authentication algorithm to ensure
paths from source nodes to sinks [13]. Therefore, the combi- data integrity. Our selection authentication algorithm is per-
nation of geographic routing and opportunistic routing has formed based on the signatures with high entropy (unknown
been referred to as geographic opportunistic routing [14]– state) or low entropy (certain state), and is able to reduce
[16]. Existing geographic opportunistic routing approaches the computational cost of the sensor node. Especially, we
can achieve high reliability over wireless links (e.g., [16]). design a cooperative verification scheme to combine the
However, they suffer from serious Denial of Service (DoS) opportunistic routing with selective authentication algorithm,
attacks. Malicious attackers may deliberately send a large which includes “verification notice” and “warning push”.
number of invalid data with illegitimate signatures to sinks, The mechanism of verification notice is utilized to restore the
aiming to waste the network resources and disrupt the normal priorities of candidate forwarders in opportunistic routing.
operations of WSNs [17]. In particular, opportunistic routing The mechanism of warning push is employed to share the
aggravates DoS attacks that invalid data can be reliably deliv- verification information of invalid signatures between candi-
ered to receivers with multiple candidate forwarders, which dates, which could also accelerate the isolation of attackers.
will be validated by our theoretical analysis and experiment According to warning push, candidate forwarders are allowed
results in the latter part of this paper. To defend against such to cancel duplicate data transmission or redundant signature
attacks, we need a security authentication scheme, which can verification. The extensive comparative evaluation shows
guarantee that data packets are sent from legitimate sensor that Our SelGOR could block 80% of invalid data with a
nodes, and they are not sourced or modified by attackers low communication overhead, while it saves 50% of com-
during transmissions. However, this opens plenty of new putational resources and 50%-70% of bandwidth resources
issues. compared to other schemes.
First, involving an existing digital signature scheme for To the best of our knowledge, our work is the first attempt
authentication may tremendously increase the computational for an efficient and reliable data delivery protocol while
cost of a sensor node and extend the delay of data delivery. explicitly maintains the desired authentic data in WSNs. The
Sensor nodes are typically computational and energy con- main contributions of this work are summarized as follows:
strained. Prior work has shown that verifying one ECDSA • We design an SSI-based trust model which is exploited
signature needs about 1.62 seconds on MICA2 and MICAz as the basis of constructing a trust-based geographic
motes [18]. Verifying the digital signature of every incoming opportunistic routing to improve the reliability of data
data packet on a sensor node would fast exhaust its resource. delivery.
Therefore, a new lightweight authentication mechanism to • We identify the DoS attacks pose serious security threats
isolate DoS attackers is mandatory for WSNs. Second, ver- to the opportunistic routing in WSNs. Subsequently,
ification of data packets may break down the priorities of an entropy-based selective authentication algorithm is
candidate forwarders defined by the opportunistic routing, introduced to isolate the DoS attackers with low com-
since the verification delay is generally much greater than putational cost.
2 VOLUME x, 2019
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2019.2902843, IEEE Access
C. Lyu et al.: Selective Authentication based Geographic Opportunistic Routing in WSNs for IoT against DoS Attacks
•A distributed cooperative verification scheme is exclu- address black hole attacks on opportunistic routing in the
sively proposed to cooperate the selective authentica- wireless mesh networks, where nodes deliberately drop the
tion algorithm with the opportunistic routing, while it data packet that they are supposed to transmit. To defend
also significantly reduces the number of transmission against such attacks, they make use of Markov chain to estab-
of invalid data and the number of signature verification lish a packet salvaging model for the opportunistic routing.
incurred by the opportunistic routing. Zhang et al. [24] propose a framework for the opportunistic
• Theoretical analysis and empirical validations are done routing to provide both privacy preserving and security pro-
to show our SelGOR effectively defends against the tection for delay/disruption-tolerant networks. The security
DoS attacks. It is fairly reliable even over unstable and privacy are realized according to anonymous routing,
wireless links, and low-cost in terms of computational the confidentiality of the routing metric and key agreement
and communication resources. for data communication. SGOR [25] is a geographic op-
The rest of this paper is organized as follows. Section II portunistic routing which is proposed to cope with a wide
describes the related work. Section III discusses our network of attacks in WSNs. Thus, a location verification algorithm
and security model. The protocol SelGOR is presented in is designed on received signal strength [26] to address the
Section IV. The effectiveness analysis of SelGOR against location spoofing attack. To response to black hole attacks in
DoS attacks is shown in Section V. The performance eval- the routing, SGOR utilizes an ambient-sensitive trust model
uation is provided in Section VI. At last, we conclude our to construct the routing metric for the opportunistic routing.
paper and outline the future work in Section VII. These discussed solutions provide a range of improvements
to the security of the opportunistic routing. However, none
II. RELATED WORK of them could defend against any DoS attacks, which pose
There have been many researches on opportunistic routing serious threats to the opportunistic routing over wireless
exploiting the spatial diversity of wireless transmissions for links.
data delivery in wireless ad hoc networks [9]–[12], [19]– As to the DoS attacks, many security mechanisms have
[21]. As one branch of opportunistic routing, geographic been investigated in the field of Internet [27], Vehicular
opportunistic routing which makes use of the geographic Ad Hoc Networks [28], Cyber-Physical Systems [29], cloud
location to choose the candidate forwarders in the neighbor computing [30] and Wireless Sensor Networks [18], [31]–
list is also widely studied in the literature [14]–[16], [22]. [34]. Due to the different objectives of attackers, there are
Sanchez-Iborra et al. [10] propose the opportunistic rout- a variety of DoS attacks in WSNs. Ning et al. [18] address
ing named JOKER in order to balance the tradeoff between the DoS attacks with respect to broadcast authentication.
multi-media service and energy consumption for mobile de- They propose a weak authentication scheme by exploiting
vices. Their JOKER uses the routing metric combining the the mechanism of message-specific puzzles to mitigate the
reliability of wireless links with the distances to receivers DoS attacks on both digital signature schemes and TESLA-
for candidate selection. To minimize the energy consumption based broadcast authentication scheme [35] in WSNs. The
and maximize the lifetime of WSNs, Luo et al. [11] opti- limitation of this scheme is that it requires relatively high
mize the candidate forwarder set based on the distances to computational cost for the packet sender. Moreover, the end-
receivers and the remaining energies of sensor nodes, and to-end delay of data packets is largely extended for solving
then use opportunistic routing for data delivery in the model the puzzles. To isolate the DoS attackers, Agah et al. [31]
of one-dimensional queue network. So et al. [12] design divide the DoS attacks into passive attacks and active attacks,
an opportunistic routing for load balance in the duty-cycled and then exploit game theory to categorize nodes according
wireless sensor networks. In their scheme, the number of to their behaviors. However, their scheme requires a central-
candidate forwarders is controlled based on the estimation ized base station to monitor the behaviors of all the sensor
of forwarder cost in order to reduce redundant data forward- nodes. Deng et al. [32] address the path-based DoS attacks,
ing caused by the opportunistic routing. Zeng et al. [14] and propose a scheme based on one-way hash chains to
propose a geographic opportunistic routing in the multi-rate defend against such attacks. However, since the routing paths
wireless networks. They study the strategies of candidate need to be determined before data transmission, their solution
selection and candidate coordination, and then design an cannot apply to the opportunistic routing. In WSNs, there are
effective metric for the opportunistic routing to achieve high some other secure schemes [33], [34] proposed to resist the
network throughput. Cheng et al. [16] address the problem DoS attacks on code dissemination protocols, which spread a
of Quality of Service (QoS) provisioning with the constraints new program image to all of the sensor nodes. Nevertheless,
of reliability and end-to-end delay in WSNs. They formulate all the above schemes do not deal with the DoS attacks on the
it as an optimization problem, and then design an efficient opportunistic routing. In this work, we attempt to address this
geographic opportunistic routing to provide QoS with low issue, and introduce the selective authentication algorithm
communication cost. with low computational cost to isolate the DoS attackers in
Although these works are on the basis of opportunistic WSNs. In order to efficiently combine the selective authen-
routing, they mostly address the issues of QoS, load balance tication algorithm with the geographic opportunistic routing,
or energy efficiency. In terms of security, Salehi et al. [23] we design a distributed cooperative verification scheme by
VOLUME x, 2019 3
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2019.2902843, IEEE Access
C. Lyu et al.: Selective Authentication based Geographic Opportunistic Routing in WSNs for IoT against DoS Attacks
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2019.2902843, IEEE Access
C. Lyu et al.: Selective Authentication based Geographic Opportunistic Routing in WSNs for IoT against DoS Attacks
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2019.2902843, IEEE Access
C. Lyu et al.: Selective Authentication based Geographic Opportunistic Routing in WSNs for IoT against DoS Attacks
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2019.2902843, IEEE Access
C. Lyu et al.: Selective Authentication based Geographic Opportunistic Routing in WSNs for IoT against DoS Attacks
Based on the routing metric, candidates in Qk are sorted Algorithm 1 Procedure of Opportunistic Routing Run by
in the descending order. The first N candidates could be Candidate Nodes.
selected in candidate forwarder set, which is denoted as Ck Input: a data packet broadcast to N candidate nodes with
(Ck ⊆ Qk ). We further optimize Ck with the scheme in [16] their priorities defined by the sender k
so that all the candidates in Ck are neighbors. We validate Output: successful and coordinated data delivery
the effectiveness of the new routing metric based on our SSI- 1: if Node i ∈ Ck then
based trust model in Section VI-B. 2: Receive the data packet;
3: Start a timer and time(i) = τ ∗Order(i), where τ is a
3) Opportunistic Routing constant and Order(i) is the priority of node i defined
After candidate selection, the source/intermediate node k is in the data packet; // Order(i) = 0, 1, · · · , N − 1
4: end if
ready to send a data packet to the sink. It first performs the se-
lective authentication algorithm (See Section IV-C) to decide // Node i is selected as the first candidate node;
5: if time(i) == 0 then
to check the data packet or not. When it skips the verification
process or the verification result is true, it broadcasts the 6: Node i becomes the next-hop sender, which is ready
data packet, which includes the list of candidates and their for data transmission;
priorities according to Ck . In the opportunistic routing, each 7: return
8: end if
candidate forwarder follows the assigned priority to forward
the data packet, as shown in Algorithm 1. // Node i is not selected as the first candidate node;
9: while time(i)! = 0 do
After receiving the data packet correctly, a candidate node
i starts a timer time(i) = τ ∗ Order(i), where τ is a con- 10: if Node i overhears that the data packet is being
stant and Order(i) is its priority defined in the data packet. transmitted by another candidate node; then
Therefore, the higher-priority node has a shorter timer. As a 11: Cancel the timer time(i) and drop the data packet;
result, the first candidate node instantly turns into the next- 12: return
hop sender. It would establish its own forwarder set, and 13: end if
14: end while
prepare for the data transmission.
According to the timers, other low-priority candidate node // The timer of node i expires
15: Node i becomes the next-hop sender, which is ready for
caches the received data packet and waits for transmission.
If it hears that the data packet is being transmitted by data transmission;
16: return
another high-priority node, it would cancel the timer and
drop the data packet. Once the timer expires, the candidate
node becomes the next-hop sender, and prepares for the data
transmission. Subsequent sensor nodes carry out the same verified with a lower probability when the sensor node knows
process until the data packet reaches the sink. more information about the forwarder. Hence, forwarder or
neighbor identification should be supported in our algorithm.
C. SELECTIVE AUTHENTICATION ALGORITHM There are many efficient schemes for neighbor identification
Before sending a data packet, each sender node signs the data (e.g., TESLA [35]), our algorithm works with all of them.
packet with its ECDSA private key in order to provide the As the measurement of uncertainty, node verification prob-
security properties of data integrity and non-repudiation in ability is exploited to achieve isolation of attackers, which
WSNs. To preserve the computational and energy resources, could be adjusted dynamically according to received invalid
relay nodes often forward data packets without verification signatures.
until the sink node checks the signatures of data packets. We denote vyx as the probability that node y verifies a data
However, such a forwarding scheme is vulnerable to DoS packet forwarded by a neighbor node x. Our goal is to update
attacks, where attackers send a large number of bogus data vyx , leading to vyx → 0 for benign x, and vyx → 1 for malicious
packets with illegal signatures to waste the network resources x. After a period of time, we want to make neighbor nodes of
and disrupt the normal operations of WSNs. Especially, a DoS attacker verify every data packet and neighbor nodes
opportunistic routing makes DoS attacks more serious that of a benign node verify nothing.
invalid data packets are reliably delivered with multiple In the neighbor list of a sensor node, each neighbor node
candidate forwarders. The scheme of checking signatures is assigned a node verification probability. For example, if
on every node can block the invalid data packets, but it node y receives the packet Mx sent by node x and the packet
immensely extends the delivery delay and is computationally Mz sent by node z, y would check Mx with the probability
expensive. vyx , and Mz with the probability vyz . These node verification
To response the challenge of designing a lightweight au- probabilities should be updated over time.
thentication scheme for opportunistic routing, we leverage To initialize the node verification probability, the sensor
a selective authentication algorithm that can fast block bo- node could set an initial value for every newly neighbor node.
gus signatures without checking all the signatures at every After the initial allocation, the value of node verification
sensor node. We observe that a received signature can be probability is able to be adjusted in many ways, such as a
VOLUME x, 2019 7
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2019.2902843, IEEE Access
C. Lyu et al.: Selective Authentication based Geographic Opportunistic Routing in WSNs for IoT against DoS Attacks
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2019.2902843, IEEE Access
C. Lyu et al.: Selective Authentication based Geographic Opportunistic Routing in WSNs for IoT against DoS Attacks
60
algorithm on the primary opportunistic routing. To isolate
40 the DoS attacker, each sensor node independently verifies the
signature based on the node verification probability. How-
20 ever, according to the rule of opportunistic routing, the data
packet can be successfully forwarded to the next hop node
0
0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 as long as one of candidates skips the process of verification.
v0
Hence, F (g, h) of the primary opportunistic routing is calcu-
(b) F varies with v0 , when h is set to 3. lated as:
FIGURE 4. The effect of authentication with g = 100.
h−1
Y N
Y −1
FOR (g, h) = g ∗ (1 − vis ), (5)
neighbors to assist the adjustment of node verification prob- s=0 i=0
ability for fast isolation. For receiving the shared verification
QN −1
information, other candidate nodes are aware of the invalid where 1 − i=0 vis indicates that the probability of verifica-
data packet. Ultimately, they directly stop the opportunistic tion skipped by at lease one candidate.
transmission and drop the data packet without extra veri- Our protocol exploits cooperative verification scheme to
fication, which significantly reduces the cost of bandwidth share the verification information between candidates. There-
resources. fore, if the first candidate finds an invalid signature, it in-
stantly sends warning push to notice other candidates. There-
V. PRELIMINARY ANALYSIS OF AUTHENTICATION fore, F (g, h) of our SelGOR is expressed as:
Since each sender signs every data packet with its private
h−1
key, the signature of the data packet ensures the properties Y
of data integrity and non-repudiation. Instead of checking FSelGOR (g, h) = g ∗ (1 − v0s ), (6)
s=0
every signature on the sensor node, we exploit the selective
authentication algorithm to reduce the computational cost in where v0s indicates the node verification probability of the
SelGOR. Here, we study the effect of selective authentication first candidate node.
algorithm, and consider a simple line model for ease of Considering that the initial node verification probability is
modeling. set to v0 for all nodes, we compare the impact of authen-
As shown in Figure 3, we assume sensor nodes are placed tication on our SelGOR with that on primary opportunistic
at location 0, d, 2d, · · · , Ld. The transmission range R is set routing in Figure 4. The analysis result shows that SelGOR
to N d. Therefore, each node has N candidate nodes for data can converge more rapidly than the primary opportunistic
forwarding. The DoS attacker is located at the origin location, routing with the selective authentication algorithm. As h
and sends an invalid signature at intervals. We consider the increases, the number of invalid signatures in Equation (6)
attacker sends a valid signature to avoid being detected at the decreases much faster than that in Equation (5), since the
beginning (i.e., g = 0), and then sends invalid signatures after mechanism of warning push accelerates the isolation process.
the first time interval (i.e., g = 1). When v0 increases, more invalid signatures are dropped at
When a candidate node i ∈ Cs receives a data packet from one hop as expected. It is also observed that sinks receive
the sender s, it verifies the signature with the verification more invalid signatures in primary opportunistic routing with
probability of vis . We denote F (g, h) as the expected number a higher N , which theoretically confirms that DoS attacks
of invalid signatures forwarded h hops from the attacker at pose serious threats to the primary opportunistic routing.
VOLUME x, 2019 9
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2019.2902843, IEEE Access
C. Lyu et al.: Selective Authentication based Geographic Opportunistic Routing in WSNs for IoT against DoS Attacks
1 .0 1 .0
0 .9 S e lG O R
0 .8 G P S R
0 .8 E Q G O R
E T E D e la y ( s )
G O R -S e l
0 .7 0 .6
P D R
0 .6
0 .4
S e lG O R
0 .5 G P S R
E Q G O R 0 .2
0 .4
G O R -S e l
0 .3 0 .0
0 .5 0 .6 0 .7 0 .8 0 .9 1 .0 0 .5 0 .6 0 .7 0 .8 0 .9 1 .0
L in k Q u a lity L in k Q u a lity
1 8 0 0 0 0 1 0 0 0 0
S e lG O R
C o n tr o l P a c k e t O v e r h e a d ( b its /s )
G P S R
T r a n s m is s io n O v e r h e a d ( b its )
1 5 0 0 0 0
E Q G O R 8 0 0 0
G O R -S e l
1 2 0 0 0 0
6 0 0 0
9 0 0 0 0
4 0 0 0
6 0 0 0 0 S e lG O R
G P S R
2 0 0 0 E Q G O R
3 0 0 0 0
G O R -S e l
0 0
0 .5 0 .6 0 .7 0 .8 0 .9 1 .0 0 .5 0 .6 0 .7 0 .8 0 .9 1 .0
L in k Q u a lity L in k Q u a lity
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2019.2902843, IEEE Access
C. Lyu et al.: Selective Authentication based Geographic Opportunistic Routing in WSNs for IoT against DoS Attacks
2 5 0 0 0 0 .2 5
S e lG O R
C o n tr o l P a c k e t O v e r h e a d ( b its /s )
v 0
= 0 .1 v 0
= 0 .3
G P S R
2 0 0 0 0 0 .2 0
P r o p o r tio n o f In v a lid p a c k e ts
E Q G O R
G O R -S e l
1 5 0 0 0 0 .1 5
1 0 0 0 0 0 .1 0
5 0 0 0 0 .0 5
0 0 .0 0
6 0 1 2 0 1 8 0 1 2 3 4
N u m b e r o f N o d e s N u m b e r o f C a n d id a te N o d e s
FIGURE 6. Control packet overhead with different number of nodes. FIGURE 7. The proportion of invalid packets under different number of
candidate nodes.
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2019.2902843, IEEE Access
C. Lyu et al.: Selective Authentication based Geographic Opportunistic Routing in WSNs for IoT against DoS Attacks
5 N o - V e r if y
packets. Therefore, the initial node verification probability
plays an important role on the proportion of invalid packets. 4
H o p c o u n t
We also find that the proportion of invalid packets does not 3
H o p c o u n t
number of candidate nodes. As the initial node verification
probability increases, the delay of data packets apparently 3
1
for data delivery. It is observed that the end-to-end delay
1 0 0 2 0 0 3 0 0
is significantly influenced by the initial node verification 6
probability. G O R -S e l
5
4
From the above results, the proportion of invalid packets
H o p c o u n t
3
would decrease with a high v0 . However, such a setting could
2
critically increase the end-to-end delay. Hence, the choice of
the initial node verification probability should be determined 1
1 0 0 2 0 0 3 0 0
by the specific requirement of IoT-based applications. 6
5 S e lG O R
4
D. THE PERFORMANCE OF AUTHENTICATION
H o p c o u n t
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2019.2902843, IEEE Access
C. Lyu et al.: Selective Authentication based Geographic Opportunistic Routing in WSNs for IoT against DoS Attacks
7 0 0 0 0
1 .0
S e lG O R
6 0 0 0 0
T r a n s m is s io n O v e r h e a d ( b its )
S e lG O R
P r o p o r tio n o f In v a lid p a c k e ts
N o - V e r ify
0 .8 N o - V e r ify V e r ify - A ll
5 0 0 0 0
V e r ify - A ll G P S R -S e l
0 .6 G P S R -S e l 4 0 0 0 0 G O R -S e l
G O R -S e l
3 0 0 0 0
0 .4
2 0 0 0 0
0 .2
1 0 0 0 0
0 .0 0
0 .1 0 .2 0 .3 0 .4 0 .5 0 .6 0 .7 0 .8 0 .9 1 .0 0 .1 0 .2 0 .3 0 .4 0 .5 0 .6 0 .7 0 .8 0 .9 1 .0
A tta c k R a te A tta c k R a te
FIGURE 10. Authentication: the proportion of invalid packets under different FIGURE 12. Authentication: the transmission overhead of invalid data packets
attack rates. under different attack rates.
6
S e lG O R
uses one path for data delivery is sensitive to the attack N o - V e r ify
H o p C o u n t o f In v a lid P a c k e ts
5 V e r ify - A ll
rate. In terms of the proportion of invalid data packets, both
G P S R -S e l
our SelGOR and GOR-Sel do not vary much as the attack G O R -S e l
4
rate increases, since opportunistic routing exploits multiple
candidate forwarders leading to more stable data delivery. 3
Figure 11 shows the number of verification during the
simulation time. Since every node verifies the incoming data 2
packet, the computational cost of Verify-All is the highest
among the five schemes. By using selective authentication 1
0 .1 0 .2 0 .3 0 .4 0 .5 0 .6 0 .7 0 .8 0 .9 1 .0
algorithm, GPSR-Sel has a low number of verification. How- A tta c k R a te
ever, for the rule of opportunistic routing, GOR-Sel intro-
FIGURE 13. Authentication: the hop count of invalid data packets under
duces more than twice the number of verification of GPSR- different attack rates.
Sel. Compared with GOR-Sel, our SelGOR apparently re-
duces the number of verification by 50%, which validates of invalid data packets.
that the cooperative verification scheme could effectively Figure 13 depicts the hop count of invalid packets among
decrease the number of verification caused by opportunistic five schemes. The hop count of invalid packets of GOR-Sel
routing. It is obviously seen that SelGOR reaches the close is much high and does not vary with the attacker rate. This
performance to GOR-Sel, which indicates the high efficiency is because there are duplicate transmissions of invalid data as
of our SelGOR. illustrated in Figure 12. From the simulation result, the hop
Figure 12 plots the transmission overhead of invalid pack- count of invalid data of SelGOR is much lower than GOR-
ets. We find that GOR-Sel has more transmission overhead Sel and GPSR-Sel. It is worth noting that SelGOR efficiently
of invalid packets than GPSR-Sel. The reason is that the blocks invalid data packets at the first two hops.
transmission of the invalid data packets is continued although As a summary, SelGOR prevents more than 80% of invalid
these packets are dropped by some high-priority candidate data packets, while it consumes less than 50% of the number
after verification. Since our SelGOR employs the mechanism of verification compared to the solution of Verify-ALL, and
of warning push to share the verification result between 50% of transmission overhead compared to the solution of
candidates, it is able to maintain a low transmission overhead No-Verify. The simulation results also highlight that our
cooperative verification scheme could significantly decrease
7 0 0 the number of verification and transmission overhead raised
S e lG O R by the opportunistic routing.
6 0 0 N o - V e r ify
V e r ify - A ll
N u m b e r o f V e r ific a tio n
5 0 0 G P S R -S e l VII. CONCLUSION
G O R -S e l
4 0 0 In this paper, we designed an efficient scheme SelGOR
3 0 0 aiming to provide the properties of authenticity and reliability
of data delivery for IoT-based applications. As a trust-based
2 0 0
geographic opportunistic routing, SelGOR exploits the SSI-
1 0 0 based trust model to improve the reliability of data delivery
0 in WSNs. To defend against DoS attacks, we studied the
0 .1 0 .2 0 .3 0 .4 0 .5 0 .6 0 .7 0 .8 0 .9 1 .0
existing authentication schemes and found that they failed
A tta c k R a te
to operate for opportunistic routing due to either being un-
FIGURE 11. Authentication: the number of verifications under different attack serviceable or high computational cost in WSNs. Hence, we
rates.
VOLUME x, 2019 13
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2019.2902843, IEEE Access
C. Lyu et al.: Selective Authentication based Geographic Opportunistic Routing in WSNs for IoT against DoS Attacks
developed a lightweight selective authentication algorithm [15] S. Yang, C. Yeo, and B. Lee, “Towards reliable data delivery for highly dy-
to isolate DoS attackers with low computational cost. To namic mobile ad hoc networks," IEEE Transactions on Mobile Computing,
vol. 11, no, 1, pp. 111-124, Jan. 2012.
cooperate the selective authentication algorithm with the [16] L. Cheng, J. Niu, J. Cao, S. K. Das, and Y. Gu, “QoS aware geographic
opportunistic routing, we designed a distributed cooperative opportunistic routing in wireless sensor networks," IEEE Trans. Parallel
verification scheme, which could block the spread of invalid Distrib. Syst., vol. 25, no. 7, pp. 1864-1875, Jul. 2014.
[17] D. R. Raymond and S.F. Midkiff, “Denial-of-service in wireless sensor
data packets and reduce the number of signature verification networks: Attacks and defenses," IEEE Pervasive Computing, no.1, pp.
raised by the opportunistic routing. Extensive evaluations 74-81, 2008.
indicate that our SelGOR holds a high packet delivery rate [18] P. Ning, A. Liu, and W. Du, “Mitigating DoS attacks against broadcast
authentication in wireless sensor networks," ACM Transactions on Sensor
even over poor wireless links. With low communication Networks, vol. 4, no. 1, pp. 1-35, Jan. 2008.
cost, our SelGOR effectively blocks the DoS attackers while [19] M. Naghshvar and T. Javidi, “Opportunistic routing with congestion diver-
significantly reducing the computational cost compared to sity in wireless multi-hop networks," in Proceeding of IEEE INFOCOM,
2010.
other schemes. [20] S. Biswas and R. Morris, “ExOR: Opportunistic multi-hop routing for
From our evaluation results, our protocol runs efficiently wireless networks," ACM SIGCOMM Computer Communication Review,
vol. 35, no. 4, pp. 133-144, 2005.
with respect to the computational and communication re- [21] L. Cheng, J. Niu, Y. Gu, T. He and Q. Zhang, “Energy-efficient statis-
sources. However, the end-to-end delay could become quite tical delay guarantee for duty-cycled wireless sensor networks," in 12th
long when a high node verification probability is decided. In Annual IEEE International Conference on Sensing, Communication, and
Networking (SECON), pp. 46-54, 2015.
future work, we will formulate the problem, and study how to [22] X. Tang, J. Zhou, S. Xiong, J. Wang, and K. Zhou, “Geographic segmented
adjust the node verification probability to achieve the optimal opportunistic routing in cognitive radio ad hoc networks using network
performance of delay. Another extension of our work is to coding," IEEE Access, vol. 6, pp. 62766-62783, 2018.
[23] M. Salehi and A. Boukerche, “A novel packet salvaging model to improve
establish the behavior model of DoS attackers and investigate the security of opportunistic routing protocols," Computer Networks,
the improvement of the selective authentication algorithm. vol. 122, pp.163-178, 2017.
[24] L. Zhang, J. Song, and J. Pan, “A Privacy-preserving and secure framework
for opportunistic routing in DTNs," IEEE Transactions on Vehicular
REFERENCES Technology, vol. 65, no. 9, pp. 7684-7697, Sept. 2016.
[1] L Atzori, A Iera, and G Morabito, “The Internet of Things: A survey," [25] C. Lyu, D. Gu, X. Zhang, S. Sun, Y. Zhang, and A. Pande, “SGOR: Secure
Computer Networks, vol. 54, no. 15, pp. 2787-2805, Oct. 2010. and scalable geographic opportunistic routing with received signal strength
[2] J. Gubbi, R. Buyya, S. Marusic, and M.Palaniswami, “Internet of Things in WSNs," Computer Communications, vol. 59, pp. 37-51, Mar. 2015.
(IoT): A vision, architectural elements, and future directions," Future [26] Y. Sheng, K. Tan, G. Chen, D. Kotz, and A. Campbell, “Detecting 802.11
generation computer systems, vol. 29, no. 7, pp. 1645-1660, 2013. mac layer spoofing using received signal strength," in Proceedings of
[3] L. D. Xu, W. He, and S. Li, “Internet of Things in industries: A survey," IEEE INFOCOM, pp. 1768-1776, 2008.
IEEE Transactions on Industrial Informatics, vol. 10, no. 4, pp. 2233- [27] S. Khanna, S. S. Venkatesh, O. Fatemieh, F. Khan, and C. A. Gunter,
2243, Nov. 2014. “Adaptive selective verification," in IEEE INFOCOM 2008 - The 27th
Conference on Computer Communications, Phoenix, AZ, pp. 529-537,
[4] R. H. Weber, “Internet of Things-New security and privacy challenges,"
2008.
Computer Law & Security Review, vol. 26, no. 1, pp. 23-30, Jan. 2010.
[28] C. Sun, J. Liu, X. Xu, and J. Ma, “A privacy-preserving mutual authenti-
[5] J. N. Al-Karaki and A. E. Kamal, “Routing techniques in wireless sensor cation resisting DoS attacks in vanets," IEEE Access, vol. 5, pp. 24012-
networks: A survey," IEEE Wireless Communications, vol. 11, no. 6, pp. 24022, 2017.
6-28, Dec. 2004. [29] M. Krotofil, A. A. Crdenas, B. Manning, and J. n Larsen, “CPS: driving
[6] E. Felemban, C. G. Lee, and E. Ekici, “MMSPEED: Multipath multi-speed cyber-physical systems to unsafe operating conditions by timing DoS
protocol for qos guarantee of reliability and timeliness in wireless sensor attacks on sensor signals," in Proceedings of the 30th Annual Computer
networks," IEEE Transactions on Mobile Computing, vol. 5, no. 6, pp. Security Applications Conference (ACSAC ’14), ACM, New York, NY,
738-754, Jun. 2006. USA, pp. 146-155, 2014.
[7] S. Li, R. K. Neelisetti, C. Liu, and A. Lim, “ Efficient multi-path protocol [30] A. Chonka, Y. Xiang, W. Zhou, and A. Bonti, “Cloud security defence
for wireless sensor networks," International Journal of Wireless and to protect cloud computing against HTTP-DoS and XML-DoS attacks,"
Mobile Networks, vol. 2, no. 1, pp. 110-130, 2010. Journal of Network and Computer Applications, vol.34, no.4, pp.1097-
[8] X. Huang and Y. Fang, “Multiconstrained qos multipath routing in wireless 1107, 2011.
sensor networks," Wireless Networks, vol. 14, no. 4, pp. 465-478, 2008. [31] A. Agah and Sajal K. Das, “Preventing DoS attacks in wireless sensor
[9] G. Schaefer , F. Ingelrest, M. Vetterli, “Potentials of opportunistic routing networks: A repeated game theory approach," International Journal of
in energy-constrained wireless sensor networks," in Proceedings of the 6th Network Security,vol.5, no.2, pp.145-153, Sep. 2007.
European Conference on Wireless Sensor Networks, February 11-13, 2009, [32] J. Deng, R. Han, and S. Mishra, “Defending against path-based DoS
Cork, Ireland. attacks in wireless sensor networks," in Proceedings of the 3rd ACM
[10] R. Sanchez-Iborra and M. Cano, “JOKER: A novel opportunistic routing workshop on Security of ad hoc and sensor networks, pp. 89-96, 2005.
protocol," ," IEEE Journal on Selected Areas in Communications, vol. 34, [33] S. Hyun, P. Ning, A. Liu, and W. Du, “Seluge: Secure and DoS-resistant
no. 5, pp.1690-1703, May 2016. code dissemination in wireless sensor networks," in Processing of IEEE
[11] J. Luo, J. Hu, D. Wu, and R. Li, “Opportunistic routing algorithm for relay IPSN, pp. 445-456, 2008.
node selection in wireless sensor networks," IEEE Trans. Ind. Informat., [34] D. He, C. Chen, S. Chan, and J. Bu, “DiCode: DoS-resistant and dis-
vol. 11, no. 1, pp. 112-121, Feb. 2015. tributed code dissemination in wireless sensor networks," IEEE Trans-
[12] J. So and H. Byun, “Load-balanced opportunistic routing for duty-cycled actions on Wireless Communications, vol. 11, no. 5, pp. 1946-1956, May
wireless sensor networks," IEEE Transactions on Mobile Computing, vol. 2012.
16, no. 7, pp. 1940-1955, Jul. 2017. [35] A. Perrig, R. Canetti, D. Song, and J. D. Tygar, “Efficient and secure source
[13] B. Karp and H. T. Kung, “GPSR: greedy perimeter stateless routing for authentication for multicast," in Proceedings of NDSS , pp. 35–46, 2001.
wireless networks, " in Proceedings of the Annual International Confer- [36] A. Perrig, J. Stankovic, and D. Wagner, “Security in wireless sensor
ence on Mobile Computing and Networking (MobiCom’00), pp. 243-254, networks," Commun. ACM, vol. 47, no. 6 pp.53-57, Jun. 2004.
Boston, Mass, USA, August 2000. [37] N. Ristanovic, P. Papadimitratos, G. Theodorakopoulos, J. Hubaux, and J.
[14] K. Zeng, Z. Yang, and W. Lou, “Location-aided opportunistic forwarding Le Boudec, “Adaptive message authentication for multi-hop networks," in
in multirate and multihop wireless networks," IEEE Trans. Vehicular 2011 Eighth International Conference on Wireless On-Demand Network
Technology, vol. 58, no. 6, pp. 3032-3040, Jul. 2009. Systems and Services, Bardonecchia, pp. 96-103, 2011.
14 VOLUME x, 2019
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2019.2902843, IEEE Access
C. Lyu et al.: Selective Authentication based Geographic Opportunistic Routing in WSNs for IoT against DoS Attacks
VOLUME x, 2019 15
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
View publication stats http://www.ieee.org/publications_standards/publications/rights/index.html for more information.