Title: SUMP: a secure unicast messaging protocol for wireless ad hoc sensor networks

Authors: Jeff Janies, Chin-Tser Huang, Nathan L. Johnson, Theodor Richardson

Addresses: Department of Computer Science and Engineering, University of South Carolina, Columbia, SC, USA. ' Department of Computer Science and Engineering, University of South Carolina, Columbia, SC, USA. ' Department of Computer Science and Engineering, University of South Carolina, Columbia, SC, USA. ' Department of Computer Science and Engineering, University of South Carolina, Columbia, SC, USA

Abstract: Most wireless ad hoc sensor networks are susceptible to routing level attacks, in which an adversary masquerades as a legitimate node to convince neighbouring nodes that it is the |logical| next hop or is on a |better| path for forwarding packets and arbitrarily drops the packets forwarded by neighbouring nodes. In this paper, we propose a Secure Unicast Messaging Protocol (SUMP) for wireless ad hoc sensor networks to mitigate the threat of routing level attacks. SUMP groups nodes into levels based on hop count to provide hop-by-hop group authentication using Merkle hash trees. This method allows for varied levels of security in accordance with a node|s hop count from the base station and secure, directed unicast communications from the base station to individual nodes. Unlike other such protocols the parent information maintained by a node running SUMP is securely provided by the base station and thus mitigates the threat of the adversary convincing a node to forward through a non-existent path.

Keywords: sensor networks; security protocols; Merkle hash tree; authenticated routing; wireless networks; unicast messaging protocol; ad hoc networks; routing level attacks; group authentication.

DOI: 10.1504/IJSNET.2007.014359

International Journal of Sensor Networks, 2007 Vol.2 No.5/6, pp.358 - 367

Published online: 03 Jul 2007 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article