Abstract
We consider a potential communication problem in national security, where wireless spy sensors with eavesdropping capability are strategically deployed around an area of interest. For counterintelligence, achieving secure communication by penetrating such a spy barrier is of great importance. In this paper, we first formulate the problem of barrier penetration routing against spy barriers consisting of strategically deployed wireless sensors. We point out that existing multi-path avoidance routing protocols cannot efficiently counteract collusion attacks, where connected adversaries collaborate with each other to compromise data packets. We propose a barrier penetration routing (BPR) protocol to securely penetrate the barrier of adversaries. In the protocol, a set of physically distanced paths are identified based on distance vectors as well as network-wide flooding. Then, each data packet encoded by xor coding is routed via a different path. Unlike existing avoidance routing, the proposed scheme does not rely on the assumption that the adversary's locations are known. The simulation results demonstrate that the proposed BPR outperforms the baseline protocol as well as existing routing protocols in terms of secure delivery rate.
| Original language | English |
|---|---|
| Pages (from-to) | 4634-4647 |
| Number of pages | 14 |
| Journal | IEEE Transactions on Mobile Computing |
| Volume | 23 |
| Issue number | 5 |
| DOIs | |
| State | Published - 1 May 2024 |
Keywords
- Barrier penetration routing
- avoidance routing
- wireless sensor networks
Fingerprint
Dive into the research topics of 'Barrier Penetration Routing Against Wireless Spy Sensors'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver