Secure Routing in Wireless Sensor Networks: Attacks and

is the only effective solution for secure routing in sensor networks. We make five main .... tract all key material, data, and code stored on that node. While.
347KB taille 9 téléchargements 308 vues
!"#$%" &'$()*+ )* ,)%"-".. !"*.'% /"(0'%1.2 3((4#1. 4*5 6'$*("%7"4.$%". 68%). 94%-': ;4 ': 64-):'%*)4 4( ?"%1"-"> #14%-':@540 A#.BC"%1"-">B"5$ Abstract— We consider routing security in wireless sensor networks. Many sensor network routing protocols have been proposed, but none of them have been designed with security as a goal. We propose security goals for routing in sensor networks, show how attacks against ad-hoc and peer-to-peer networks can be adapted into powerful attacks against sensor networks, introduce two classes of novel attacks against sensor networks — sinkholes and HELLO floods, and analyze the security of all the major sensor network routing protocols. We describe crippling attacks against all of them and suggest countermeasures and design considerations. This is the first such analysis of secure routing in sensor networks.

DB D /E&F;=6EDF/ F$% :'#$. ). '* %'$()*+ ."#$%)(> )* 0)%"-".. ."*.'% *"(0'%1.B 6$%%"*( G%'G'.4-. :'% %'$()*+ G%'('#'-. )* ."*.'% *"(0'%1. 'G()7)H" :'% (8" -)7)("5 #4G4C)-)()". ': (8" *'5". 4*5 (8" 4GG-)#4()'* .G"#)# *4($%" ': (8" *"(0'%1.@ C$( 5' *'( #'*.)5"% ."#$%)(>B 3-(8'$+8 (8"." G%'('#'-. 84 4. 4 +'4-@ 0" :""- )( ). )7G'%(4*( (' 4*4->H" (8")% ."#$%)(> G%'G"%()".B ,8"* (8" 5":"*5"% 84. (8" -)4C)-)()". ': )*."#$%" 0)%"-".. #'77$*)#4()'*@ -)7)("5 *'5" #4G4C)-)()".@ 4*5 G'..)C-" )*.)5"% (8%"4(.@ 4*5 (8" 45 %"J$)%"5 (' +$4%4*("" 7"..4+" 4B K"..4+" )*I ("+%)(>@ 4$(8"*()#)(>@ 4*5 #'*5"*()4-)(> 4%" 84*5-"5 4( 4 8)+8"% -4>"% C> 4* "*5I('I"*5 ."#$%)(> 7"#84*).7 .$#8 4. !!L '% !!MB N*5I('I"*5 ."#$%)(> ). G'..)C-" )* 7'%" #'* 7$.( C" 5".)+*"5 0)(8 (8). )* 7)*5B A. Our contributions ," G%"."*( #%)GG-)*+ 4((4#1. 4+4)*.( 4-- (8" 74O'% %'$()*+ G%'('#'-. :'% ."*.'% *"(0'%1.B ?"#4$." (8"." G%'('#'-. 84 4. 4 +'4-@ )( ). $*.$%G%).)*+

(8"> 4%" 4-- )*."#$%"B L'0" 4 ."*.'% *"(0'%1 %'$()*+ G%'('#'- #4* C" 745" ."#$%" C> )*#'%G'%4()*+ ."#$%)(> 7"#84*).7. 4:("% 5".)+* 84. #'7G-"("5B F$% 4.."%()'* ). (84( ."*.'% *"(0'%1 %'$()*+ G%'('#'-. 7$.( C" 5".)+*"5 0)(8 ."#$%)(> )* 7)*5@ 4*5 (8). ). (8" '*-> "::"#() 4*4->.). ': 4-- (8" 74O'% %'$()*+ G%'('#'-. 4*5 "*"%+> #'*."% %"4.'*4C-" ."#$%)(> +'4-.B ," 5).#$.. #'$*("%7"4.$%". 4*5 5".)+* #'*.)5"%4()'*. :'% ."#$%" %'$()*+ G%'('#'-. )* ."*.'% *"(0'%1.B DDB ?369V&F=/; ," $." (8" ("%7 sensor network (' %":"% (' 4 8"("%'+"*"'$. .>.("7 #'7C)*)*+ ()*> ."*.'%. 4*5 4#($4('%. 0)(8 +"*"%4-I G$%G'." #'7G$()*+ "-"7"*(.B !"*.'% *"(0'%1. 74> #'*.).( ': 8$*5%"5. '% (8'$.4*5. ': -'0IG'0"%@ -'0I#'.( *'5".@ G'..)C-> 7'C)-" C$( 7'%" -)1"-> 4( P"5 -'#4()'*.@ 5"G-'>"5 "* 74.." (' 7'*)('% 4*5 4::"#( (8" "* 0" 845 G%" 74)*("*4*#" Y!\3/@ V3W@ 6N6@ 3WN63Z W)+B QB

Relevant attacks ?'+$. %'$()*+ )*:'%74()'*@ ."-"#()C)-@ 0'%78'-".@ HELLO ''5. ?'+$. %'$()*+ )*:'%74()'*@ ."-"#()C)-@ 0'%78'-".@ HELLO ''5. ?'+$. %'$()*+ )*:'%74()'*@ ."-"#()C)-@ HELLO ''5.

!$774%> ': 4((4#1. 4+4)*.( G%'G'."5 ."*.'% *"(0'%1. %'$()*+ G%'('#'-.B

': )*.(%$#()'* 7"7'%>@ ] 9? ': &3K :'% 54(4@ 4*5 aQU 9? ': 4.8 7"7'%>B E8" 6\= #'*.$7". aBa 73 Y4( ` G)#4--> 74*> '%5"%. ': 74+*)($5" 7'%" G'0"%:$- (84* ."*.'% *'5".B E8"> 7)+8( 84@ 4*5 .('%4+"@ 36 G'0"%@ 4*5 8)+8 C4*50)5(8 -)*1. :'% #'77$*)#4()'* 47'*+.( (8"7."- ."#'*5@ :%'7 *'5". 4C-" (' .4().:> 4 J$"%>B ," %":"% (' .$#8 4 .(%"47 4. 4 data flow 4*5 (' (8" *'5". ."*5)*+ (8" 54(4 4. sourcesB D* '%5"% (' %"5$#" (8" ('(4- *$7C"% ': 7"..4+". ."*( 4*5 (8$. .4 C" G%'#".."5 4( '*" ': 74*> G'..)C-" aggregation pointsB 3*

4++%"+4()'* G')*( #'--"#(. ."*.'% %"45)*+. :%'7 .$%%'$*5)*+ *'5". 4*5 :'%04%5. 4 .)*+-" 7"..4+" %"G%"."*()*+ 4* 4++%"+4(" ': (8" @ ): 0" 04*( ."*.'% *"(0'%1. (' -4.( :'% >"4%.@ )( ). #%$#)4- (84( (8"> %$* 4( 4%'$*5 4 Qd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`T@ 4*5 4. 4 #'*."J$"*#"@ 4*> 7"..4+" "PG4*.)'* #4$."5 C> ."#$%)(> 7"#84*).7. #'7". 4( .)+*)#4*( #'.(B \'0"% ). (8" .#4%#".( %".'$%#" ': 4--2 "4#8 7)--)47G #'*.$7"5 ). '*" 7)--)47G #-'."% (' 5"4(8@ 4*5 4. 4 %".$-(@ *"4%-> " ). #%)()#4-B ,)(8 ."*.'% *"(0'%1. C")*+ "* %".G'*."@ 0)(8 (8" 4(("*54*( -4#1 ': G8>.)#4- ."#$%)(> :'% 8$*5%"5. ': "PG'."5 5"GI )#4--> .$GG'%( %'$()*+ C"(0""* 4*> G4)% ': *'5". S]T@ SaT@ ScT@ SiT@ 08"%"4. ."*.'% *"(0'%1. 84 4-- *")+8C'%)*+ *'5". '% $*)#4.( 7"..4+". )*("*5"5 :'% 4 '*-> .)*+-" *")+8C'% `B /'5". )* 45I8'# *"(0'%1. 84 ). (8" 7'.( G%"..)*+B 3:("% 5"G-'>I 7"*(@ 74*> ."*.'% *"(0'%1. 4%" 5".)+*"5 (' C" $*4(("*5"5 :'% -'*+ G"%)'5. 4*5 C4(("%> %"#84%+)*+ '% %"G-4#"7"*( 74> C" )*:"4.)C-" '% )7G'..)C-"B /'5". )* ."*.'% *"(0'%1. ':("* "P8)C)( (%$.( %"-4()'*.8)G. C">'*5 (8'." (84( 4%" (>G)#4--> :'$*5 )* 45I8'# *"(0'%1.B /")+8C'%)*+ *'5". )* ."*.'% *"(0'%1. ':("* 0)(*".. (8" .47" '% #'%%"-4("5 "* 4*5 C4*50)5(8 4%" 04.("5B E' G%$*" (8"." %"5$*54*( 7"..4+". (' %"5$#" (%4:# 4*5 .4 )..$". )* 45I8'# *"(0'%1. 4%" .)7)-4% (' (8'." )* ."*.'% *"(0'%1. 4*5 84 S^T@ SQ_T@ SQQT@ SQUT@ SQ`T@ SQ]T@ SQaT@ SQcTB \$C-)# 1"> #%>G('+%4G8> ). ('' "PG"*.) G%'('#'-. :'% ."*.'%. *"(0'%1. 7$.( %"-> "P#-$.)7I 7"(%)# 1"> #%>G('+%4G8> 84 -"4.(@ 4((4#1"%. #4* "4 4 :"0 74-)#)'$. *'5". 0)(8 .)7)-4% 84%504%" #4G4C)-)()". 4. (8" -"+)()74(" *'5".B E8" 4((4#1"% 74> #'7" $G'* (8"." 74-)#)'$. *'5". C> G$%#84.)*+ (8"7 ."G4%4("->@ '% C> k($%*)*+l 4 :"0 -"+)()74(" *'5". C> #4G($%)*+ (8"7 4*5 G8>.)#4--> '.("7B 3-.'@ )* .'7" #4.". #'--$5)*+ *'5". 7)+8( 84 (' $."ZB ," 5' *'( 4..$7" ."*.'% *'5". 4%" (47G"% %".).(4*(B ," 4..$7" (84( ): 4* 45 (' #4$." #'--).)'*. C> -" :%"J$"*#> 8'GG)*+ '% .G%"45 .G"#(%$7 #'77$*)#4()'* SUaT@ 4*5 K36 -4>"% 4((4#1. #4* C" 4--" ."#$%" G."$5'I%4*5'7 *$7C"% +"*"%4('% SUiTB D( ). G'..)C-" :'% 45.)#4- 4*5 K36 -4>"%. 4*> :$%(8"%B B. Trust Requirements !)*#" C4." .(4()'*. )*("%:4#" 4 ."*.'% *"(0'%1 (' (8" '$(.)5" 0'%-5@ (8" #'7G%'7)." ': 4 .)+*)#4*( *$7C"% ': (8"7 #4* %"*5"% (8" "*()%" *"(0'%1 $."-"..B W'% (8). %"4.'* 0" 4..$7" (84( C4." .(4()'*. 4%" trustworthy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hreat Models 3* )7G'%(4*( 5).()*#()'* #4* C" 745" C"(0""* mote-class attackers 4*5 laptop-class attackersB D* (8" :'%7"% #4."@ (8" 4((4#1"% 84. 4##".. (' 4 :"0 ."*.'% *'5". 0)(8 .)7)-4% #4G4C)-)()". (' '$% '0*@ C$( *'( 7$#8 7'%" (84* (8).B D* #'*(%4.(@ 4 -4G('GI#-4.. 4((4#1"% 74> 84 84 G'0"%@ 4 7'%" #4G4C-" 6\=@ 4 8)+8IG'0"% %45)' (%4*.7)(("%@ '% 4 ."*.)() C" 7'$*("5 :%'7 ")(8"% #'7G%'7)."5 ."*.'% *'5". %$**)*+ 74-)#)'$. #'5" '% 45@ )*("+%)(>@ 4$(8"*()#)(>@ 4*5 4 ': 4-- 7"..4+". )* (8" G%"."*#" ': %".'$%#":$- 45 7"..4+" 4. 0"-- 4. (8" )5"*()(> ': (8" ."*5"%B 35@ 4*5 #'*5"*()4-)(> 4%" $.$4--> 4#8)" *'% 5".)%4C-" :'% (8" #'*("*(. ': (8" 7"..4+" YC">'*5 (8" *"#"..4%> 8"45"%.Z (' C" 4 #4.".@ (8" 5'7)*4*( (%4:# G4(("%* )* ."*.'% *"(0'%1. ). 74*>I('I '*"@ 0)(8 74*> ."*.'% *'5". *""5)*+ (' #'77$*)#4(" ."*.'% %"45)*+. '% *"(0'%1 " ":#)"*( 74**"%B !)*#" )*I *"(0'%1 G%'#"..)*+ %"J$)%". )*("%7"5)4(" *'5". (' 4##"..@ 7'5):>@ 4*5 G'..)C-> .$GG%".. (8" #'*("*(. ': 7"..4+".@ )( ). 8)+8-> $*-)1"-> (84( "*5I('I"*5 ."#$%)(> 7"#84*).7. C"(0""* 4 ."*.'% *'5" 4*5 4 C4." .(4()'* #4* C" $."5 (' +$4%4*("" )*("+%)(>@ 4$(8"*()#)(>@ 4*5 #'*5"*()4-)(> ': .$#8 7"..4+". ] B D* (8" G%"."*#" ': '$(.)5"% 45"% ."#$%)(> 7"#84*).7. #4* +$4%4*("" )*("+%)(>@ 4$(8"*()#)(>@ 4*5 #'*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hDB 3EE369! F/ !N/!F& /NE,F&9 &F=ED/V K4*> ."*.'% *"(0'%1 %'$()*+ G%'('#'-. 4%" J$)(" .)7G-"@ 4*5 :'% (8). %"4.'* 4%" .'7"()7". .$.#"G()C-" (' 4((4#1. :%'7 (8" -)("%4($%" '* %'$()*+ )* 45I8'# *"(0'%1.B K'.( *"(0'%1 -4>"% 4((4#1. 4+4)*.( ."*.'% *"(0'%1. :4-- )*(' '*" ': (8" :'--'0)*+ #4("+'%)".2 !G'':"5@ 4-("%"5@ '% %"G-4>"5 %'$()*+ )*:'%74()'* !"-"#()C)- 4((4#1. ,'%78'-". HELLO ''5 4((4#1. 3#1*'0-"5+"7"*( .G''*+ D* (8" 5".#%)G()'*. C"-'0@ *'(" (8" 5)::"%"*#" C"(0""* 4((4#1. (84( (%> (' 74*)G$-4(" $."% 54(4 5)%"#(-> 4*5 4((4#1. (84( (%> (' 4::"#( (8" $*5"%->)*+ %'$()*+ ('G'-'+>B ," .(4%( 0)(8 .'7" +"*"%4- 5).#$..)'* ': (8"." (>G". ': 4((4#1.m )* !"#()'* hDD@ 0" .8'0 8'0 (8"." 4((4#1. 74> C" 4GG-)"5 (' #'7G%'7)." %'$()*+ G%'('#'-. (84( 84 #4* C" $."5 (' G%'("#( (' :'%04%5 #"%(4)* 7"..4+". 4*5 .)7G-> 5%'G (8"7@ "*.$%)*+ 7"..4+". 4:("% 4++%"+4()'* 84. C""* #'7G-"("5B (84( (8"> 4%" *'( G%'G4+4("5 4*> :$%(8"%B 3 .)7G-" :'%7 ':

(8). 4((4#1 ). 08"* 4 74-)#)'$. *'5" C"84 :'%04%5. G4#1"(.B 3* 45 7'.( "::"#() C'%5"% '* )7G'..)C-" a B E8$.@ 0" C"-)" -4$*#8)*+ 4 ."-"#() :'--'0 (8" G4(8 ': -"4.( %".).(4*#" 4*5 4(("7G( (' )*#-$5" 8"%."-: '* (8" 4#($4- G4(8 ': (8" 54(4 '0B D* (8" *"P( (0' ."#()'*.@ 0" 5).#$.. .)*18'-" 4((4#1. 4*5 (8" !>C)4((4#1@ (0' 7"#84*).7. C> 08)#8 4* 45X. +'4- ). (' -$%" *"4%-> 4-- (8" (%4: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hDINB ;$" (' ")(8"% (8" %"4- '% )74+)*"5 8)+8 J$4-)(> %'$(" (8%'$+8 (8" #'7G%'7)."5 *'5"@ )( ). -)1"-> "4#8 *")+8C'%)*+ *'5" ': (8" 45@ (8" 45 8'GG)*+ '% .G%"45 .G"#(%$7 #'77$*)#4()'*@ :'% "P47G-"B

)* (8" (4%+"("5 4%"4 '0. (8%'$+8 4 #'7G%'7)."5 *'5"@ 4* 45I .$GG%".. '% 7'5):> G4#1"(. '%)+)*4()*+ :%'7 4*> *'5" )* (8" 4%"4B D( .8'$-5 C" *'("5 (84( (8" %"4.'* ."*.'% *"(0'%1. 4%" G4%()#$-4%-> .$.#"G()C-" (' .)*18'-" 4((4#1. ). 5$" (' (8")% .G"#)4-)H"5 #'77$*)#4()'* G4(("%*B !)*#" 4-- G4#1"(. .84%" (8" .47" $-()74(" 5".()*4()'* Y)* *"(0'%1. 0)(8 '*-> '*" C4." .(4()'*Z@ 4 #'7G%'7)."5 *'5" *""5. '*-> (' G%' %'$(" (' (8" C4." .(4()'* )* '%5"% (' )*$"*#" 4 G'("*()4--> -4%+" *$7C"% ': *'5".B D. The Sybil attack D* 4 !>C)- 4((4#1 SUT@ 4 .)*+-" *'5" G%"."*(. 7$-()G-" )5"*()()". (' '(8"% *'5". )* (8" *"(0'%1B E8" !>C)- 4((4#1 #4* .)+*)#4*(-> %"5$#" (8" "::"#() G%"."*()*+ 7$-()G-" )5"*()()".B !>C)- 4((4#1. 4-.' G'." 4 .)+*)#4*( (8%"4( (' +"'+%4G8)# %'$()*+ G%'('#'-.B M'#4()'* 404%" %'$()*+ ':("* %"J$)%". *'5". (' "P#84*+" #''%5)*4(" )*:'%74()'* 0)(8 (8")% *")+8C'%. (' ":#)"*(-> %'$(" +"'+%4G8)#4--> 455%".."5 G4#1"(.B D( ). '*-> %"4.'*4C-" (' "PG"#( 4 *'5" (' 4##"G( C$( 4 .)*+-" ."( ': #''%5)*4(". :%'7 "4#8 ': )(. *")+8C'%.@ C$( C> $.)*+ (8" !>C)4((4#1 4* 45 )* (' (8" 4((4#1"%B 3* 45 #'$-5 #'* G%' -".. 4((%4#() 4-04>. C" (8" #4." 08"* (8" "*5G')*( ': (8" 0'%78'-" ). %"-4() (84* (8'." G4#1"(. ."*( C"(0""* (8" .47" G4)% ': *'5". ' ): )( #4* #4$." 4 *'5". (' %"#") %"-4>)*+ G4#1"(. C"(0""* (8" (0' ': (8"7B ,'%78'-" 4((4#1. 0'$-5 -)1"-> C" $."5 )* #'7C)*4()'* 0)(8 ."-"#() 0'$-5 C" ."*5)*+ G4#1"(. )*(' 'C-) 5'". *'( *"#"..4%)-> *""5 (' C" 4C-" (' #'*.(%$#( -"+)()74(" (%4:# )* '%5"% (' $." (8" HELLO ''5 4((4#1B !8" #4* .)7G-> %"IC%'45#4.( '@ C%'45#4.( 0'%78'-".B /'("2 kW-''5)*+l ). $.$4--> $."5 (' 5"*'(" (8" (8" "G)5"7)#I -)1" G%'G4+4()'* ': 4 7"..4+" (' " #4* .G'': -)*1 -4>"% 4#1*'0-I "5+7"*(. :'% k'B 3%()#)4--> %")*:'%#)*+ 4 0"41 '% 5"45 -)*1 ). 4

W)+B ]B 3 %"G%"."*(4()F! C"4#'*)*+ 0)(8 4 .)*+-" C4." .(4()'*B

.$C(-" 04> ': 74*)G$-4()*+ .$#8 4 .#8"7"B !)*#" G4#1"(. ."*( 4-'*+ 0"41 '% 5"45 -)*1. 4%" -'.(@ 4* 45 7'$*( 4 ."-"#() "*#'$%4+)*+ (8" (4%+"( *'5" (' (%4*.7)( G4#1"(. '* (8'." -)*1.B hDDB 3EE369! F/ !\N6DWD6 !N/!F& /NE,F&9 \&FEF6FM!

3-- ': (8" G%'G'."5 ."*.'% *"(0'%1 %'$()*+ G%'('#'-. 4%" 8)+8-> .$.#"G()C-" (' 4((4#1B 35 (8" G%'G'."5 ."*.'% *"(0'%1 %'$()*+ G%'('#'-. 4*5 8)+8-)+8( (8" %"-" %"4#8 (8" C4." .(4()'*ZB Attacks: E8" E)*>F! C"4#'*)*+ G%'('#'- ). 8)+8-> .$.#"G()C-" (' 4((4#1B !)*#" %'$()*+ $G54(". 4%" *'( 4$(8"*()#4("5@ )( ). G'..)C-" :'% 4*> *'5" (' #-4)7 (' C" 4 C4." .(4()'* 4*5 C"#'7" (8" 5".()*4()'* ': 4-- (%4:# )* (8" *"(0'%1 Y."" W)+$%" aZB 3$(8"*()#4("5 %'$()*+ $G54(". 0)-- G%" :%'7 #-4)7)*+ (' C" 4 C4." .(4()'*@ C$( 4 G'0"%:$- -4G('GI #-4.. 45 0%"41 84)*+@ '% .$GG%"..)*+ G4#1"(. )* 4 G4%()#$-4% 4%"4 #4* 5' .' C> 7'$*()*+ 4 #'7I C)*"5 0'%78'-"[.)*18'-" 4((4#1B E8" 45 4%" '$( ': *'%74- %45)' %4*+" :%'7 (8" 45 7'("I#-4.. 45 #4* 5"("%7)*" (84( *'5" 3 4*5 *'5" ? 4%" 0)(8)* %45)' %4*+" ': "4#8 '(8"%B 3* 45 )* (8" G%'('#'- 4*5 %"C%'45#4.(. (8" %'$()*+ $G54(" )* (8" (4%+"("5 4%"4B !)*#" (8" k0'%78'-"5l %'$()*+ $G54(" 0)-- -)1"-> %"4#8 (8" (4%+"("5 4%"4 #'*.)5"%4C-> :4.("% (84* )( *'%74--> 0'$-5 84 *'5" (' 74%1 (8" 45 (8"%" "P).(. 4 .)7G-" "P("*.)'* (' %"#' C> $.)*+ -)*1 -4>"% 4#1*'0-"5+"7"*(.Z 84. :"0 'G()'*. .8'%( ': ''5)*+ " 74%1"5 4. )(. G4%"*( 4. 0"--B

;)%"#("5 5)::$.)'* S``T ). 4 54(4I#"*(%)# %'$()*+ 4-+'%)(87 :'% 5%40)*+ )*:'%74()'* '$( ': 4 ."*.'% *"(0'%1B ?4." .(4()'*. ''5 )*("%".(. :'% *47"5 54(4@ ."(()*+ $G +%45)"*(. 0)(8)* (8" *"(0'%1 5".)+*"5 (' 5%40 " .G"#):> 4 -'0 %4(" ': 54(4 '0@ C$( '*#" 4 C4." .(4()'* .(4%(. %"#") $*()- )( %"4#8". (8" *'5". +"*"%4()*+ (8" ")*+ (8" )*("%".( 0)-- *'0 C" ."*( (' C'(8 (8" 45 #4* )*$"*#" (8" G4(8 (41"* C> 4 54(4 '0 C> .G''*+ G'.)() C"#4$." ': 8"% 4%()#)4--> .(%'*+ G'.)() G%' %")*:'%#"5 5$" (8" 8)+8 J$4-)(> .G'':"5 4*5 %"4- 54(4 " (' (8" C4." .(4()'* (84( '%)+)*4--> 45 $.)*+ (8" 4C' 4 '0 ': " #4* +4)* :$-- #'*(%'- ': (8" '0B !8" #4* 7'5):> 4*5 ."-"#() (' C" +"*"%4("5B D*("%".(. 45 (8" C4." .(4()'* 4%" ."*( (8%'$+8 (8" 0'%78'-" 4*5 %"C%'45#4.( C> *'5" ?B /'5" ? (8"* 4((%4#(. 54(4 '0. C> .G''*+ .(%'*+ G'.)()C)- 4((4#1 4+4)*.( 8"% *")+8C'%.B 3 *")+8C'% 0)-- C" #'* C> %")*:'%#)*+ )(. *"P( 7'.( G%":"%%"5 *")+8C'% *'( '* (8" G%)74%> '0 08"* )* :4#( (8). *")+8C'% ). 4* 4-("%*4(" )5"*()(> ': (8" 45 \"%)7"("% !(4("-".. &'$()*+ YV\!&Z S`cT -" :'%04%5)*+ 4( "4#8 8'G@ %'$()*+ "4#8 G4#1"( (' (8" *")+8C'% #-'.".( (' (8" 5".()*4()'*B ,8"* 8'-". 4%" "*#'$*("%"5 08"%" +%""5> :'%04%5)*+ ). )7G'..)C-"@ V\!& %"#' C'(8 %"74)*)*+ "*"%+> 4*5 5).(4*#" :%'7 (8" (4%+"(B D* (8). 04>@ (8" %".G'*.)C)-)(> :'% %'$()*+ 4 '0 ). 7'%" "B Attacks: M'#4()'* )*:'%74()'* #4* C" 7).%"G%"."*("5B &"+4%5I -".. ': 4* 45 45. 45 4. 0"--B ,)(8'$( ('' 7$#8 455)()'*4- "::'%(@ 4* 45 7'$*()*+ 4 !>C)4((4#1B 3. 5"G)#("5 )* W)+$%" ^@ 4* 45 74P)7)H". 8"% #84*#". :'% G-4#)*+ 8"%."-: '* (8" G4(8 ': 4*> *"4%C> 54(4 '0B F*#" '* (84( G4(8@ (8" 45 )* W)+$%" b 4*5 '0 ': G4#1"(. :%'7 (' -'#4()'* Y`@QZB 3..$7" (8" 74P)7$7 %45)' %4*+" ). '*" $*)(B D: 4* ). 4( 45 (84( )( 5'". *'( %"J$)%" *'5". (' 74)*(4)* "PG-)#)( G4(8 )*:'%74()'* '% " #'*.(%$#()*+ 4 #'.( "-5 .(4%()*+ 4( (8" C4." .(4()'*B E8" C4." .(4()'* 84. #'.( H"%'B N@ -4("*#>@ -'..@ "(#B B N 7$-()G-" %"#")08"%" )* (8" *"(0'%1B E8" 'G()7)H4()'* 5".#%)C"5 4C' (%4*.7)(()*+ 4* 45 " 8)+8 G'0"%B L'0" 4*5 4 +-'C4--> 1*'0* 5".)%"5 G"%#"*(4+" ': #-$.("%I 8"45.B N4#8 *'5" "-"#()*+ )(."-: 4. 4 #-$.("%I8"45 C%'45#4.(. 4* 45 ." 4. )(. #-$.("%I8"45B E8" 45 :'%04%5 (8'." 54(4 (%4*.7)..)'*. (84( 4#($4--> %"4#8 8"%@ 08)-" (8" %".( ': (8" *"(0'%1 ). "::"#() #4* $." (8" .47" ("#8*)J$" (' 7'$*( 4 ."-"#() .74-- #-$.("% ': *'5". 4*5 45 "@ )( #%"4(". 4* 4+"*( (84( G%'G4+4(". )* 4 .)7)-4% 04>B 3 %'$("

:%'7 4 C4." .(4()'* (' 4 .'$%#" ). ".(4C-).8"5 08"* 4 J$"%> 4+"*( 4%%) 84*5-)*+ 4+"*(.B 3* 45 '% " 4+"*(.@ )B"B@ C> ."*5)*+ '$( 7$-()G-" #'G)". ': 4 %"#") C" *'*I'C)*+ '* (8'." *'5". (' :'%04%5 " )*#-$5)*+ (8). -).( )* "4#8 '$(+')*+ 4+"*(@ (8" 45 :'%04%5 ""5 )* 84%5 (' %"4#8 4%"4. 4*5 C" 7"4*( (' %$* $*4(("*5"5 '* -'*+ G"%)'5. ': ()7"B D( 74> C" 5):#$-( (' %"G-4#" (8" C4(("%)". '* "*"%+>I5"G-"("5 *'5". '% " G4)% ': *'5". )* 45O4#"*( +%)5 .J$4%". 4%" 4C-" (' #'7I 7$*)#4("B /'5". 4%" )* '*" ': (8%"" .(4(".2 sleeping@ discovery@ 4*5 activeB 3#() '% (' 4**'$*#" (8")% )*("*()'* (' C"#'7" '*"@ "4#8 *'5" 5"-4>. )(. 4**'$*#"7"*( ': C"#'7)*+ 4 #''%5)I *4('% C> 4 %4*5'7)H"5 C4#1'::B ,8)-" )* (8" C4#1':: .(4+"@ )( #'*()*$". (' -).("* :'% 455)()'*4- HELLO 7"..4+". 4*5 #''%5)*4('% 4**'$*#"7"*(.B D: 4( (8" "*5 ': (8" C4#1':: .(4+"@ (8" #''%5)*4('% "-)+)C)-)(> #'*5)()'* .()-- 8'-5.@ (8" #4*5)54(" *'5" 4**'$*#". )(. )*("*()'* (' C"#'7" 4 #''%5)*4('%B E8" %4*5'7)H"5 C4#1':: ). 4 :$*#()'* ': utility 4*5 %"74)*)*+ "*"%+>B Utility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''5 4((4#1 .)7)-4% (' (84( '*" 5".#%)C"5 4+4)*.( V3WB 3WN63 4--'0. "4#8 *'5" (' .-""G :'% %4*5'7)H"5 G"%)'5. C4."5 '* (8" *$7C"% ': Y' $.)*+ (8" !>C)- 4*5 HELLO ''5 4((4#1 (' )*4(" (8" *$7C"% ': G"%#") ': '$(.)5"% 4((4#1. 4+4)*.( ."*.'% *"(0'%1 %'$()*+ G%'('#'-. #4* C" G%" .)7G-" -)*1 -4>"% "*I #%>G()'* 4*5 4$(8"*()#4()'* $.)*+ 4 +-'C4--> .84%"5 1">B E8" !>C)- 4((4#1 ). *' -'*+"% %"-" -)*1 -4>"% "*I #%>G()'* 4*5 4$(8"*()#4()'* 7"#84*).7. 4%" 0'%78'-" 4((4#1. 4*5 HELLO ''5 4((4#1.B 3-(8'$+8 4* 45F! C"4#'*)*+ 5".#%)C"5 )* !"#I ()'* hDDI3 )--$.(%4(" (8"." ("#8*)J$".@ 4*5 -)*1 -4>"% ."#$%)(> 7"#84*).7. #4* 5' *'(8)*+ (' G%"G()'* 74> 741" .'7" ."-"#()"% ."#$%)(> 7"#84*).7. $.)*+ 4 +-'C4--> .84%"5 1"> 4%" #'7G-"("-> )*"::"#() " #%>G('+%4G8>@ C$( +"*"%4()*+ 4*5 4*5 ".(4C-).8 4 .84%"5 1">B 3 G4)% ': *")+8C'%)*+ *'5". #4* $." (8" %".$-()*+ 1"> (' )7G-"7"*( 4* 4$(8"*()#4("5@ "*#%>G("5 -)*1 C"(0""* (8"7B D* '%5"% (' G%" *'5" "P#"G( (8")% #4* .()-- $." 4 0'%78'-" (' #%"4(" 4* 4%()#)4- -)*1 C"(0""* (0' *'5". (' #'* (8" C)5)%"#()'*4-)(> ': 4 -)*1 C":'%" (41)*+ 7"4*)*+:$4#()'* C4."5 '* 4 7"..4+" %"#") 84. 4 G'0"%:$- (%4*.7)(("% C"#4$." (8" G%'('#' $." 4 G%) (' #'*.(%$#( 4 %'$()*+ ('G'-'+> C"#4$." (8). )*:'%74()'* ). 84%5 (' @ 8'0"F! C"4#'*)*+ '% 5)%"#("5 5)::$.)'*@ .)*18'-". 4%" "4.> (' #%"4(" C"#4$." (8"%" ). *' )*:'%74()'* :'% 4 5":"*5"% (' ()+8( ()7" .>*#8%'*)H4()'* 4*5 ). (8$. )*:"4.)C-" :'% 7'.( ."*.'% *"(0'%1.B ?"#4$." )( ). "P(%"7"-> 5):#$-( (' %"(%'( "P).()*+ G%'('#'-. 0)(8 5":"*.". 4+4)*.( (8"." 4((4#1.@ (8" C".( .'-$()'* ). (' #4%":$--> 5".)+* %'$()*+ G%'('#'-. 08)#8 4 ). 0"--I.(%$#($%"5 '% #'*(%'--"5@ +-'C4- 1*'0-"5+" #4* C" -" %".(%)#()*+ (8" .(%$#($%" ': (8" ('G'-'+> #4* "-)7)*4(" (8" %"J$)%"7"*( :'% *'5". (' 45 *'5" #4* "4.)-> 5"%) -'#4()'* %4(8"% (84* C> 4* )5"*()"%B F. Selective forwarding N ': )*#-$5)*+ )(."-: '* 4 54(4 '0 (' -4$*#8 4 ."-"#() -'#4("5 *"4% (8" .'$%#" '% 4 C4." .(4()'*B K$-()G4(8 %'$()*+ #4* C" $."5 (' #'$*("% (8"." (>G". ': G4(8. ."-"#() G%' :%'7 4 ."( ': G'..)C-" #4*5)54(". #4* :$%(8"% %"5$#" (8" #84*#". ': 4* 45 C4." .(4()'*B E8). %"J$)%". .'7" -"2 .)*#" ""( " G%'('#'-. %"J$)%" *'5". (' C%'45#4.( HELLO 7"..4+". (' (8")% *")+8C'%.B E8"." 7"..4+". .8'$-5 C" 4$(8"*()#4("5 4*5 )7G'..)C-" (' .G'':B \%'G'.4-. :'% 4$(8"*()#4("5 C%'45#4.( )*("*5"5 :'% $." )* 4 7'%" #'* .>77"(%)# 1"> #%>G('+%4G8> 4*5 %"J$)%". 7)*)74- G4#1"( ' *"#"..4%> :'% 4$(8"*()#4("5 C%'45#4.( 4*5 ''5)*+ C> $.)*+ 5"-4>"5 1"> 5).#-'.$%" 4*5 '*"I04> 1"> #84)*. #'*.(%$#("5 0)(8 4 G$C-)#->

#'7G$(4C-" #%>G('+%4G8)#4--> ."#$%" 84.8 :$*#()'*B &"G-4> ). G%"*#8%'*)H4()'*B W-''5)*+ S]iT #4* C" 4 %'C$.( 7"4*. :'% )*:'%74()'* 5).I ."7)*4()'* )* 8'.()-" "* (' G%" *'5" )* (8" *"(0'%1B E8" 5'0*.)5". ': ''5)*+ )*#-$5" 8)+8 7"..4+)*+ 4*5 #'%%".G'*5)*+ "*"%+> #'.(.@ 4. 0"-- 4. G'("*()4- -'..". #4$."5 C> #'--).)'*.B !\D/ S]^T 4*5 +'..)G)*+ 4-+'%)(87. S]]T 4%" ("#8*)J$". (' %"5$#" (8" 7"..4+)*+ #'.(. 4*5 #'--).)'*. 08)#8 .()-- 4#8)" %'(4()*+ ."( ': k *"(0'%1B 3:("% 4 ."( ': ': "*5I('I"*5 ."#$%)(> 7"#84I *).7. *"#"..)(4(". #4%":$- G%'('#'- 5".)+* 4. 0"--B oDB 369/F,MN;VKN/E! ," +%4(":$--> 4#1*'0-"5+" ;3&\3 /N!E #'*(%4#( W``cQaI _QI6IQ^ba :'% .$GG'%()*+ (8). 0'%1B & NWN&N/6N! SQT gBI6B L$@ 3B \"%%)+@ 4*5 ;B ?B p'8*.'*@ k,'%78'-" 5"("#()'* )* 0)%"-".. 45 8'# *"(0'%1.@l ;"G4%(7"*( ': 6'7G$("% !#)"*#"@ &)#" =*).("7 4%#8)("#($%" 5)%"#()'*. :'% *"(0'%1"5 ."*.'%.@l )* Proceedings of ACM ASPLOS IX@ /' 454G()"%@ k35I8'# '*I5"74*5 5).(4*#" )* 7'C)-" 45 8'# *"(0'%1.@l )* Proceedings of the ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC 2001)@ U__QB SQQT pB 9'*+@ \B q"%:'.@ LB M$'@ !B M$@ 4*5 MB q84*+@ k\%'@ :4)%*"..@ 4*5 %'C$.(*".. )* 7'C)-" 45 8'# *"(0'%1.@l )* Proceedings of the Tenth Euromicro Workshop on Parallel, Distributed and Network-based ProcessingB 64*4%> D.-4*5.@ !G4)*2 DNNN 6'7G$("% !'#)"(>@ p4*$4%> U__U@ GGB ]_`R]Q_B SU`T 3B \"%%)+@ &B !H"0#H>1@ hB ,"*@ ;B 6$--"%@ 4*5 pB E>+4%@ k!\D/!2 !"#$%)(> G%'('#'-. :'% ."*.'% *"(0'%1.@l )* Proceedings of Mobile Networking and Computing 2001@ U__QB SU]T 3B ;"7"%.@ !B !8"*1"%@ hB ?84%+4 ': .G%"45 .G"#(%$7 #'77$*)#4()'*. I 4 ($('%)4-@l IEEE Transactions on Communications@ Qb^UB SUcT /B 3C%47.'*@ kE8" 3MFL3 .>.("7 I 4*'(8"% 4-("%*4() DNNN E6F! 4*5 36K !DVF\!@ QbbbB SUbT 3B ?4*"%O"4@ k3 (4P'*'7> ': 5).G"%.)(> %'$()*+ .#8"7". :'% :4$-( ('-"%4*( %"4-I()7" #84**"-.@l )* Proceedings of ECMAST@ I)*:'%7"5 "*"%+> #'*."%I":#)"*( #''%5)*4()'* 4-+'%)(87 :'% ('G'-'+> 74)*("*4*#" )* 45 8'# 0)%"-".. *"(0'%1.@l ACM Wireless Networks Journal@ I":#)"*( 7$-()G4(8 %'$()*+ )* 0)%"-".. ."*.'% *"(0'%1.@l Mobile Computing and Communications Review@ )* 0)%"-".. ."*.'% *"(0'%1.@l )* 1st International Workshop on Parallel and Distributed Computing Issues in Wireless Networks and Mobile Computing@ U__QB

S]UT !B M)*5."> 4*5 6B &4+84