Barrier Penetration Routing Against Wireless Spy Sensors

Kazuya Sakai, Min Te Sun, Wei Shinn Ku, Jie Wu

Research output: Contribution to journalArticlepeer-review

Abstract

We consider a potential communication problem in national security, where wireless spy sensors with eavesdropping capability are strategically deployed around an area of interest. For counterintelligence, achieving secure communication by penetrating such a spy barrier is of great importance. In this paper, we first formulate the problem of barrier penetration routing against spy barriers consisting of strategically deployed wireless sensors. We point out that existing multi-path avoidance routing protocols cannot efficiently counteract collusion attacks, where connected adversaries collaborate with each other to compromise data packets. We propose a barrier penetration routing (BPR) protocol to securely penetrate the barrier of adversaries. In the protocol, a set of physically distanced paths are identified based on distance vectors as well as network-wide flooding. Then, each data packet encoded by xor coding is routed via a different path. Unlike existing avoidance routing, the proposed scheme does not rely on the assumption that the adversary's locations are known. The simulation results demonstrate that the proposed BPR outperforms the baseline protocol as well as existing routing protocols in terms of secure delivery rate.

Original languageEnglish
Pages (from-to)4634-4647
Number of pages14
JournalIEEE Transactions on Mobile Computing
Volume23
Issue number5
DOIs
StatePublished - 1 May 2024

Keywords

  • Barrier penetration routing
  • avoidance routing
  • wireless sensor networks

Fingerprint

Dive into the research topics of 'Barrier Penetration Routing Against Wireless Spy Sensors'. Together they form a unique fingerprint.

Cite this