DENIAL OF SERVICE RESILIENCE IN ADHOC SENSOR NETWORKS WITH CUSTOM DEFINED FIREWALL



Similar documents
Vampire Attack Detecting and Preventing in Wireless Sensor Network

SECURE ROUTING PROTOCOL IN SENSOR NETWORK FOR VAMPIRE ATTACK

Security in Ad Hoc Network

Security for Ad Hoc Networks. Hang Zhao

Ariadne A Secure On-Demand Routing Protocol for Ad-Hoc Networks

Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Review of Prevention techniques for Denial of Service Attacks in Wireless Sensor Network

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem

SECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS)

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

A New Proof-of-Concept Protocol to Prevent Vampire Attacks in Wireless Ad Hoc Sensor

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET

LIST OF FIGURES. Figure No. Caption Page No.

Secured Data Transmissions In Manet Using Neighbor Position Verfication Protocol

Preventing Resource Exhaustion Attacks in Ad Hoc Networks

Security and Privacy Issues in Wireless Ad Hoc, Mesh, and Sensor Networks

A Review of Secure Ad-hoc Routing

How To Write A Transport Layer Protocol For Wireless Networks

Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol

Tema 5.- Seguridad. Problemas Soluciones

Securing Ad Hoc Wireless Networks Against Data Injection Attacks Using Firewalls

III. Our Proposal ASOP ROUTING ALGORITHM. A.Position Management

Routing Protocols Security in Ah Hoc Networks

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks

Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks

A Security Architecture for. Wireless Sensor Networks Environmental

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Ashok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram.

IJMIE Volume 2, Issue 7 ISSN:

Denial of Service in Sensor Networks

All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices

A Review Paper on Preventing DDOS Attack and Black Hole Attack with MANETs Protocols

EFS: Enhanced FACES Protocol for Secure Routing In MANET

CHAPTER 1 INTRODUCTION

PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK

Evaluating the performance of secure routing protocols in Mobile Ad-hoc Networks

A Catechistic Method for Traffic Pattern Discovery in MANET

Wireless Sensor Networks Chapter 14: Security in WSNs

About the Authors Preface Acknowledgements List of Acronyms

Security Scheme for Distributed DoS in Mobile Ad Hoc Networks

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

Securing MANET Using Diffie Hellman Digital Signature Scheme

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION

Modified AODV protocol for prevention of Denial of service attacks in wireless Ad hoc networks

International Journal of Advanced Research in Computer Science and Software Engineering

Comparison of Various Passive Distributed Denial of Service Attack in Mobile Adhoc Networks

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257

Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network

Security Threats in Mobile Ad Hoc Networks

An Implementation of Secure Wireless Network for Avoiding Black hole Attack

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS

ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen


Robust Security Solution to Countermeasure of Malicious Nodes for the Security of MANET

Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks

A REVIEW: MOBILE AD-HOC NETWORK PROTOCOLS AND SECURITY ISSUES

The Coremelt Attack. Ahren Studer and Adrian Perrig. We ve Come to Rely on the Internet

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

Intelligent Agents for Routing on Mobile Ad-Hoc Networks

10CS64: COMPUTER NETWORKS - II

NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks

SPINS: Security Protocols for Sensor Networks

Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu

Keywords- manet, routing protocols, aodv, olsr, grp,data drop parameter.

TOPOLOGIES NETWORK SECURITY SERVICES

Routing Security in Ad Hoc Wireless Networks 1

Robust Routing in Wireless Ad Hoc Networks

Comparative Study of Performance Evaluation for Mobile Ad hoc networks using a proxy node

Intrusion Detection for Mobile Ad Hoc Networks

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS

DENIAL OF SERVICE IN WIRELESS SENSOR NETWORKS: ISSUES AND CHALLENGES

Study of Network Characteristics Incorporating Different Routing Protocols

Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol

Secure Unicast Position-based Routing Protocols for Ad-Hoc Networks

Prediction of DDoS Attack Scheme

Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks

Kaur et al., International Journal of Advanced Engineering Technology E-ISSN

Performance Comparison of AODV, DSDV, DSR and TORA Routing Protocols in MANETs

A UBIQUITOUS PROTOCOL FOR ADDRESS DYNAMICALLY AUTO CONFIGURATION FOR MOBILE AD HOC NETWORKS

Keywords: DSDV and AODV Protocol

How To Protect Your Network From A Ddos Attack On A Network With Pip (Ipo) And Pipi (Ipnet) From A Network Attack On An Ip Address Or Ip Address (Ipa) On A Router Or Ipa

Transcription:

DENIAL OF SERVICE RESILIENCE IN ADHOC SENSOR NETWORKS WITH CUSTOM DEFINED FIREWALL E.Renuga M.E Computer and Communication II year Cape Institute of Technology Levengipuram,Tirunelveli district. cell:+91890 3543515 A.Jegatheesan Asst.Prof IT Cape institute of Technology, Levingipuram, India Cell: +91 8015552900 Abstract:- Network firewalls act because the 1st line of defense against unwanted and malicious traffic targeting net servers. Predicting the general firewall performance is crucial to network Security engineers and designers in assessing the effectiveness and resiliency of network firewalls against DDoS (Distributed Denial of Service) attacks as those normally launched by today s Botnets. during this paper, we have a tendency to gift associate analytical queuing model supported the embedded Mark off chain to review and analyze the performance of rule-based firewalls once subjected to traditional traffic flows moreover as DoS attack flows targeting totally different rule positions. We have a tendency to derive equations for key options and performance measures of engineering and style significance. These options and measures embody turnout, packet loss, packet delay, and firewall s processor utilization. Additionally we have a tendency to verify and validate our analytical model exploitation simulation and real experimental measurements. Index Terms Denial of service, Ad hoc networks, Wireless networks, Sensor networks I.INTRODUCTION AD hoc wireless detector networks (WSNs) promise exciting new applications inside the within future, such as ubiquitous on-demand computing power, continuous property, and instantly transportable communication for military and initial responders. Such networks already monitor environmental conditions, industrial plant accomplishment, and team preparation, to call a couple of applications. As WSNs become a lot of crucial to the everyday functioning of individuals an organizations, and convenience faults become less tolerable-lack of convenience will create the difference between business as was common and lost productivity, power failure, environmental trouble, and even lost lives; thus high convenience of these networks may be an important property, and will hold even below malicious conditions. Due to their unintentional organization, wireless unintentional networks are notably liable to denial of service (DOS) attacks and an excellent deal of analysis has been done to boost survivability. While these schemes will stop attacks on the short term availability of a network, they are doing not location attacks that have an effect on long availability the most permanent denial of service attack is to thoroughly expend nodes batteries. this can be associate case of a resource depletion attack with battery power because the resource of interest. during this paper, we take into account however routing protocols, even those designed to be secure, absence protection from these attacks, that we tend to decision Vampire attacks, since they drain out the life from networks nodes. These attacks area unit distinct from antecedently studied DOS, reduction of quality (ROQ), and routing infrastructure attacks as they are doing not disrupt immediate convenience, but rather work over time to thoroughly disable a network. where as a number of the individual attacks area unit easy, and power debilitating and resource exhaustion attacks are mentioned before previous work has been principally confined to alternative levels of the protocol stack, e.g., medium access management (MAC) or function layers, and to our information there's little discussion, and no thorough analysis or decline of routing-layer resource exhaustion attacks. Vampire attacks aren't protocol-specific, in this they are doing not accept style properties or implementation faults of particular routing protocols, however rather deed general properties of protocol categories like link-state, distance vector, source routing, and geological and beacon vector routing. Neither these attacks settle for flooding the network with large amounts of knowledge, but rather try to transmit as little or no data as potential to understand the foremost necessary energy drain, preventing a rate limiting answer. Vampires use protocoldocile messages, these attacks unit of measurement very hard 1716

to detect and forestall. Offering this paper makes 3 primary contributions. Battery depletion attacks, insider adversary, tend to tend to switch associate existing sensor network routing protocol to demonstrably bound the damage from disembodied spirit attacks throughout packet forwarding II.RELATED WORK We do not imply the power drain only Denial of service resilience in adhoc network uses TCP, UDP protocol and main difficulty in it is dos attack will not be solved completely. Provably secure on demand source routing in mobile ad hoc networks mainly focus on security but there are time delay is the main drawback in it. Securing adhoc routing protocols Another attack that may be thought of as path based mostly is that the wormhole attack. It permits two non neighboring malicious nodes with either a physical or virtual personal affiliation to emulate a neighbor relation-ship, even in secure routing systems. These links aren't made visible to alternative network members, however is utilized by the colluding nodes to in camera exchange messages. Similar tricks is contend victimization directional antennas. These attacks deny service by disturbing returning routes that traverse the hole, and will have artificially low associated price metrics. While the authors propose a defense against hole and directional antenna attacks, their resolution comes at a high price and isn't continually applicable. First, one flavor of Packet Leashes depends on tightly synchronal clocks, that aren't employed in most off- the-shelf devices. Second, the authors believe that packet travel time dominates time interval, which cannot becorne go in fashionable wireless networks, notably low- power wireless sensing element networks. the packet domestically. This consumes the energy of nodes that would not have had to method the initial packet, with the expected further honest energy expenditure. Malicious attack is antecedently mentioned attack it called spurious route discovery it occur in each stateful and stateless protocol. The AODV Routing protocol uses AN on-demand approach for locating routes, that is, a route is established only it's needed by a supply node for transmission knowledge packets. It employs destination sequence numbers to spot the foremost recent path. the main distinction between AODV and Dynamic supply Routing (DSR) stems out from the very fact that DSR uses supply routing during which a knowledge packet carries the entire path to be traversed. However, in AODV, the supply node and also the intermediate nodes store the next-hop data resembling every flow for knowledge packet transmission. There are following attacks which occur commonly in all types of protocols. III.STATELESS AND STATEFULL PROTOCOL ATTACKS There are two attacks occur in stateless protocol. Carousel attack: In this attack a packet was send with a route and the packet will travel through the path many times this will consume more energy. Energy loss will occur due to this attack. The next attack is stretch attack in this attack the path between the source and destination will be extended and many other nodes will be included in the packet forwarding approach. Due to this energy drain and time delay will occur.the packet will not reach the destination within the required time. These are the attacks in stateless protocol. Directional antenna attack have very little management over packet progress once forwarding selections are created independently by every node, however they will still waste energy by restarting a packet in numerous components of the network. Using a directional antenna enemy will deposit a packet in arbitrary components of the network, whereas conjointly forwarding 1. WORMHOLE: Fig 1: Tree form of nodes passing messages The hollow attack is one amongst the foremost powerful given here since it involves the cooperation between 2 malicious nodes that participate within the network. One offender, e.g. node A, captures routing traffic at one purpose of the network and tunnels them to a different purpose within the network, to node B, as an example, that shares a non-public communication link with A. Node B then by selection injects tunneled traffic back to the network. The property of the nodes that have established routes over the hollow link is totally underneath the management of the 2 colluding attackers. the answer to the hollow attack is packet leashes. 1717

2. BLACKMAIL: This attack has relevancy against routing protocols that use mechanisms for the identification of malicious nodes and propagate messages that attempt to blacklist the wrongdoer. Associate degree assailant might fabricate such reportage messages and take a look at to isolate legitimate nodes from the network. The protection property of nonrepudiation will sway be helpful in such cases since it binds a node to the messages it generated. 3. RUSHING ATTACK: Rushing attack is that ends up in denial-of-service once used against all previous on-demand unexpected network routing protocols. For instance, DSR, AODV, and secure protocols supported them, like Ariadne, ARAN, and SAODV, are unable to find routes longer than 2 hops once subject to the current attack. develop dashing Attack hindrance (RAP), a generic defense against the dashing attack for on-demand protocols that may be applied to any existing on-demand routing protocol to permit that protocol to resist the dashing attack. of overhead, we can expect the gain to be worthy in malicious environments. This protocol uses a reactive approach that eliminates the necessity to sporadically flood the network with table update messages that square measure needed during a table-driven approach. During a reactive (on-demand) approach like this, a route is established only if it's needed and therefore the necessity to seek out routes to any or all alternative nodes within the network PRN by the table-driven approach is eliminated. Utilize the route cache data with efficiency to scale back the management overhead.stretch attack is more difficult to prevent. Loose supply Routing is associate degree scientific discipline choice which may be used for address translation. LSR is additionally accustomed implement quality in scientific discipline networks. Loose supply routing uses a supply routing choice in scientific discipline to record the set of routers a packet should visit. The destination of the packet is replaced with future router the packet should visit. By setting the forwarding agent (FA) to at least one of the routers that the packet should visit, LSR is reminiscent of tunneling. 4. DENIAL OF SERVICE ATTACKS: Denial of service attacks aim at the complete disruption of the routing operate and so the complete operation of the sudden network. Specific instances of denial of service attacks embrace the routing table overflow and conjointly the sleep deprivation torture. In academic degree passing routing table overflow attack the malicious node floods the network with bastard route creation packets so on consume the resources of the collaborating nodes and disrupt the institution of legal routes. The sleep deprivation torture attack aims at the consumption of batteries of a particular node by perpetually keeping it engaged in routing decisions. 5. BLACK HOLE: In a region attack a malicious node injects false route replies to the route requests it receives, advertising itself as having the shortest path to a destination. These pretend replies will be fancied to divert network traffic through the malicious node for eavesdropping, or just to draw in all traffic to that so as to perform a denial of service attack by dropping the received packets. 6. PASSIVE LISTENING AND TRAFFIC ANALYSIS: The unwelcome person may passively gather exposed routing data. Such associate attack cannot impact the operation of routing protocol; however it's a breach of user trust to routing the protocol. Thus, sensitive routing data ought to be protected. However, the confidentiality of user knowledge isn't the responsibility of routing protocol. IV.PLGP The carousel attacks are often prevented entirely by having forwarding nodes check supply paths for loops. While this adds further forwarding logic and therefore a lot Fig 2: Topology Discovery using AODV Topology discovery, the method of discovering and mapping network devices and links, is significant for a network s potency. With the arrival of Virtual Infrastructure and mobile computing, current networks typically alter dynamically, and automatic topology discovery is important for observance network state, to spot bottlenecks and failures, and to confirm optimum network potency. 1718

Discovery ways acting at Layer three find and establish devices, their roles and attributes. These approaches include SNMP discovery The SNMP manager computer code (present within the discovery tool), queries the SNMPenabled devices within the network (which would be almost each device in your network!) The devices and therefore the manager then exchange MIB (Management data Base) information. Supported these SNMP queries and replies, the manager then builds up the network map, complete with details on device location, role and attributes Active probes during this approach, the invention tool sends out light-weight executables (the probe packets) through the network. The probe scans the network, and transmits device-related information back to the invention tool through a secure communication. Route Analytics This methodology uses protocols like OSPF and EIRGP to map networks PLGP differs from alternative protocols in this packets ways square measure more finite by a tree, forwarding packets on the shortest route through the tree that's allowed by the topology. Since the tree implicitly mirrors the topology (two nodes have identical parent if and provided that they're physical neighbors, and 2 nodes sharing an root have a network path to every other), and since each node holds the same copy of the address tree, each node will verify the best next logical hop. However that price scales below collusion among multiple malicious nodes. When comparing with PLGP with CDF at the starting attack was in the high level after the time increases the attack level will decrease gradually. When comparing the performance of a network which have custom define firewall will be more secure than PLGP if the packet which should be transferred in the network should match with the rules of CDF. V.PERFORMANCE OF CDF We gift a finite queuing model to represent the behavior and study the performance of a rule based mostly network firewall. Incoming packets carrying requests make the firewall and acquire queued for process in multiple stages. the primary stage involves performing arts data-link and network layer functionalities, and after the firewall rule base programme is activated to method incoming packets. Network firewalls act because the 1st line of defense in protective network and server resources from unauthorized Access and malicious attacks. Firewalls square measure usually deployed at the sting of the network or at the entry purpose of a personal network. Incoming and outgoing net traffic is inspected by network firewalls. supported a group of rules, firewalls will enable or block incoming or outgoing traffic. To manage this, network firewalls have a rule-based engine that interrogates incoming packets consecutive rule by rule till a match is found. Initially as timer starts the attack performed on the node is constant. Once the proposed scheme starts detecting the malicious IP sending malicious packets the malicious users are blocked. Thereby the malicious users count drop and therefore the attack ratio also drops as time increases. The decline is not uniform as the malicious users count varies non-uniformly. This is depicted in the graph as a line that is not linear. 1719

VI.SECURING THE INVENTION SECTION Without totally finding the matter of malicious topology discovery, we are able to still mitigate it by forcing synchronous discovery and ignoring discovery messages throughout the intervening periods. This will cause some nodes being separated from the network for an amount of your time, and is essentially a style of rate limiting. Though we tend to rejected rate limiting before, it's acceptable here since discovery ought to consume a tiny low fraction of period of time compared to packet forwarding. We are able to enforce rate limits during a variety of how, such as neighbor strangulation or unidirectional hash chains. We can conjointly optimize discovery algorithms to reduce our window of vulnerability. If a network survives the high-risk discovery amount, it's unlikely to suffer serious injury from Vampires throughout traditional packet forwarding. While PLGPa isn't liable to lamia attacks during the forwarding section, we tend to cannot create a similar claim concerning discovery. However, we are able to provide some intuition as to the way to additional modify PLGPa to sure injury from malicious discovery. (The price of that sure in apply remains associate degree open drawback.) the most important issue is that malicious nodes will use directional antennas to masquerade neighbors to any or all nodes within the network, and thus look like a cluster of size one, with that alternative teams can attempt to preferentially merge. Merge requests are composed of the requested cluster s ID additionally as all the group members IDs and the receiving node can flood this request to alternative cluster members. Even assumptive teams generate signed tokens that price no energy to verify, a lamia would be able to flood its cluster with each cluster descriptor it is aware of, and use its aerial to pay attention to broadcasts outside their neighbor vary, relaying merge requests from entirely honest teams. Since every lamia can begin as a bunch of one, alternative teams can issue combine requests, which the Vampire will deny. In PLGP, denials are solely allowed if another merge is current, thus if we tend to modify the reject message to incorporate the ID of the cluster with that the merge is current (and a signature for no repudiation), these messages will be unbroken and replayed at the top of the topology discovery amount, detective work and removing nodes who incorrectly deny combine requests. Therefore, Vampires reject legitimate merge requests at their own peril. Any group containing a lamia will be created to serially be part of with a group composed solely of every lamia within the network (all of them would got to advertise themselves as neighbors of every group). Even totally honest teams will be fooled victimization directional antennas: Vampires might maintain the illusion that it's a neighbor of a given cluster. Since be part of events need multiparty computation and are flooded throughout the cluster, this makes for a reasonably effective attack. PLGP already provides for the invention of such deception upon termination of topology discovery: a node United Nations agency may be a member of multiple teams are going to be detected once those teams be part of (and all teams are certain to merge by the top of the protocol). Since PLGP offers the possibility to sight active Vampires once the network converges, consecutive discovery periods become safer. Often this can be aforementioned of alternative protocols, wherever malicious behavior throughout discovery might go unobserved, or a minimum of uncorrected. However, the bound we are able to place on malicious discovery injury in PLGP a remains unknown. Moreover, if we are able to conclude that a single malicious node causes an element of k energy increase during discovery (and is then expelled), it's not clear VII.CONCLUSION We have not offered a completely satisfactory resolution for evil spirit attacks throughout the topology discovery part, however instructed some intuition concerning harm limitations attainable with more modifications to PLGP a. Derivation of injury bounds and defenses for topology discovery, additionally as handling Manet, is left for future work. ACKNOWLEDGMENTS: We would like to thank our college CAPE institute of Technology, our guide A.JEGATHEESAN and other faculty members for their continuous support and for their helpful comments on the earlier drafts of this paper. REFERENCES: [1] Eugene Y.Vasserman, Nicholas Hopper, Vampire attacks:draining life from wireless ad-hoc sensornetworks.2011. [2] Imad Aad, Jean-Pierre Hubaux, and Edward W.Knightly, Denial of service resilience in ad hoc networks, mobicom,2004. [3] Gergely Acs, Levente Buttyan, and Istvan Vajda, Provably secure on demand source routing in mobile ad hoc networks, IEEE Transactions on mobile computing 05(2006),no.11. [4] Tuomas Aura, Dos-resistant authentication with client puzzles, International workshop on security protocols, 2001. [5] Daniel Bernstein and Peter Schwabe, New AES soft are speed records, INDOCRYPT, 2008. 1720

[6] INSENS: Intrusion-tolerant routing for wireless sensor networks, Computer Communications 29 (2006), no. 2. [7] Daniele Raffo, C edric Adjih, Thomas Clausen, and Paul M uhlethaler, An advanced signature system for OLSR, SASN, 2004. [8] John R. Douceur, The Sybil attack, International workshop on peer-topeer systems, 2002. [9] Computing, Lakshminarayanan Subramanian, Randy H. Katz, Volker Roth, Scott Shenker, and Ion Seliable broadcast in unknown fixed-identity networks, Annual ACM SIGACT-SIGOPS symposium on principles of distributed 2005. [10] Yih-Chun Hu, Adrian Perrig, and David B. Johnson, Ariadne: A secure on-demand routing protocol for ad hoc networks, MobiCom, 2002 [20] R.L. Rivest, A. Shamir, and L. Adleman, A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, Comm. ACM, vol. 21, no. 2, pp. 120-126, 1978. [21] V. Rodoplu and T.H. Meng, Minimum Energy Mobile Wireless Networks, IEEE J. Selected Areas in Comm., vol. 17, no. 8, pp. 1333-1344, Aug. 1999. [22] A. Saxena and B. Soh, One-Way Signature Chaining: A New Paradigm for Group Cryptosystems, Int l J. Information and Computer Security, vol. 2, no. 3, pp. 268-296, 2008. [23] M. Scott, N. Costigan, and W. Abdulwahab, Implementing Cryptographic Pairings on Smartcards, Proc. Eighth Int l Conf.Cryptographic Hardware and Embedded Systems (CHES), 2006. [11] Bryan Parno, Mark Luk, Evan Gaustad, and Adrian Perrig, Secure sensor network routing: A clean-slate approach, Co NEXT, 2006. [12] John R. Douceur, The Sybil attack, International workshop on peer-to peer systems, 2002. [13] Thomas H. Clausen and Philippe Jacquet, Optimized link state routing protocol (OLSR), 2003. [14] Charles E. Perkins and Pravin Bhagwat, Highly dynamic desination sequenced distance-vector routing (DSDV) for mobile computers, Conference on communications architectures, protocols and applications, 1994 [15] Packet leashes: A defense against wormhole attacks in wireless ad hoc networks, INFOCOM, 2000 [16] Rodrigo Fonseca, Sylvia Ratnasamy, Jerry Zhao, Cheng T. Ee, David Culler, Scott Shenker, and Ion Stoica, Beacon vector routing: Scalable point -to-point routing in wireless sensor nets, NSDI, 2005 [17] Brad Karp and H.T. Kung, GPSR: Greedy perimeter stateless routing for wireless networks, MobiCom, 2000 [18] D.R. Raymond and S.F. Midkiff, Denial-of- Service in Wireless Sensor Networks: Attacks and Defenses, IEEE Pervasive Computing, vol. 7, no. 1, pp. 74-81, Jan.-Mar. 2008. [19] J. Rexford, J. Wang, Z. Xiao, and Y. Zhang, BGP Routing Stability of Popular Destinations, Proc. Second ACM SIGCOMM Workshop. Internet Measurement (IMW), 2002. 1721