Open Access Open Access  Restricted Access Subscription or Fee Access

Randomized Multipath Routing for Overwhelming Attacks in Wireless Sensor Networks

R. Thenmozhi, Dr.S. Govindarajan, F. EzhilMaryArasi


A Wireless Sensor Network (WSN) consists of spatially distributed autonomous sensors to cooperatively monitor physical or environmental conditions. Providing end-to-end data security in wireless sensor network (WSN) is a non-trivial task. In addition to the large number and severe resource constraint of sensor nodes, a particular challenge comes from potential insider attacks due to possible node compromise, since a WSN is usually deployed in unattended/hostile environments. Compromised node and denial of service are two key attacks in Wireless Sensor Network (WSN). Here, we study the data delivery mechanisms to overcome these attacks with high probability of circumventing black holes. Classic multipath routing approaches are vulnerable to such attacks, mainly due to their deterministic nature. Once the adversary acquires the routing algorithm, it can compute the same routes known to the source and make all information sent over these routes vulnerable to its attacks. In this paper, we develop mechanisms that generate randomized multipath routes. Under our designs, the routes taken by the “shares” of different packets change over time. So even if the routing algorithm becomes known to the adversary, the adversary still cannot pinpoint the routes traversed by each packet. Besides randomness, the generated routes are also highly dispersive and energy efficient, making them quite capable of circumventing black holes.


Black Holes, Randomized Multipath Routes, Secure Data Collection, Wireless Sensor Network.

Full Text:



A. Shamir, “How to Share A Secret,” Commun. ACM, vol. 22, no. 11, 1979, pp. 612–13.

Z. Ye, V. Krishnamurthy, and S.K. Tripathi, “A Framework for Reliable Routing in Mobile Ad Hoc Networks,” Proc. IEEE INFOCOM, vol. 1, pp. 270-280, Mar. 2003.

B. Vaidya, J.Y. Pyun, J.A. Park, and S.J. Han, “Secure Multipath Routing Scheme for Mobile Ad Hoc Network,” Proc. IEEE Int’l Symp. Dependable, Autonomic and Secure Computing, pp. 163-171, 2007.

T. Claveirole, M.D. de Amorim, M. Abdalla, and Y. Viniotis, “Securing Wireless Sensor Networks Against Aggregator Compromises,” IEEE Comm. Magazine, vol. 46, no. 4, pp. 134-141, Apr.2008.

P.C. Lee, V. Misra, and D. Rubenstein, “Distributed Algorithms for Secure Multipath Routing,” Proc. IEEE INFOCOM, pp. 1952-1963, Mar. 2005.

P.C. Lee, V.Misra, and D. Rubenstein, “Distributed Algorithms for Secure Multipath Routing in Attack-Resistant Networks,” IEEE/ACM Trans. Networking, vol. 15, no. 6, pp. 1490-1501, Dec. 2007.

M.K. Marina and S.R. Das, “On-Demand Multipath Distance Vector Routing in Ad Hoc Networks,” Proc. IEEE Int’l Conf.Network Protocols (ICNP), pp. 14-23, Nov. 2001.

Ganesan, D.; Govindan, R.; Shenker, S.; Estrin, D. Highly-resilient, Energy-Efficient Multipath Routing in Wireless Sensor Networks. ACM Mobile Computing and Communications Review, (MC2R) 2001, pp. 11-25.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.