A Power-Preserving Broadcast Protocol for WSNs With DoS Resistance

Similar documents
The Impact of Clustering on the Average Path Length in Wireless Sensor Networks

GATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS. Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani

Improved Performance of Mobile Adhoc Network through Efficient Broadcasting Technique

Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks

On Reducing Broadcast Redundancy in Ad Hoc Wireless Networks

An Approximation Algorithm for Connected Dominating Set in Ad Hoc Networks

A Localized Algorithm for Reducing the Size of Dominating Set in Mobile Ad Hoc Networks

Fountain Codes with XOR of Encoded Packets for Broadcasting and source independent backbone in Multi-hop Networks using Network Coding

Reliable and Efficient Broadcasting in Asymmetric Mobile Ad Hoc Networks Using Minimized Forward Node List Algorithm

A Reliable Broadcast Algorithm with Selected Acknowledgements in Mobile Ad Hoc Networks

Performance of New Broadcast Forwarding Criteria in MANET

CONSTRUCTION AND EVALUATION OF MESHES BASED ON SHORTEST PATH TREE VS. STEINER TREE FOR MULTICAST ROUTING IN MOBILE AD HOC NETWORKS

AN IMPROVED APPROACH IN FLOODING WITH PACKET REACHABILITY IN FSR (FISHEYE STATE ROUTING) PROTOCOL USING MANET

Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks

Power Aware Metrics for Wireless Sensor Networks

' INRIA Rocquencourt, Domaine de Voluceau

A Dominating Sets and Target Radius Based Localized Activity Scheduling and Minimum Energy Broadcast Protocol for Ad Hoc and Sensor Networks.

Xiao Chen* and Jian Shen

Novel Cluster Based Routing Protocol in Wireless Sensor Networks

Modified Ultra Smart Counter Based Broadcast Using Neighborhood Information in MANETS

Algorithms for minimum m-connected k-tuple dominating set problem

Probabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS

Hop Count Aware Broadcast Algorithm with Random Assessment Delay Extension for Wireless Sensor Networks

The Impact of the Number of Nodes, Speed of Nodes, Speed of Network and the Network Space to the Number of Nodes keeps Alive

Localized Broadcasting in Mobile Ad Hoc Networks Using Neighbor Designation

Connected Point Coverage in Wireless Sensor Networks using Robust Spanning Trees

Efficient Broadcast Algorithms To Reduce number of transmission Based on Probability Scheme

End-To-End Delay Optimization in Wireless Sensor Network (WSN)

Fig. 2: Architecture of sensor node

Chord-based Key Establishment Schemes for Sensor Networks

Randomized Algorithms for Approximating a Connected Dominating Set in Wireless Sensor Networks

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions

Algorithms for Minimum m-connected k-dominating Set Problem

Rheinisch-Westfälische Technische Hochschule Aachen Lehrstuhl für Informatik IV Prof. Dr. rer. nat. Otto Spaniol

CASER Protocol Using DCFN Mechanism in Wireless Sensor Network

Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach

2013, IJARCSSE All Rights Reserved Page 85

Genetic-Algorithm-Based Construction of Load-Balanced CDSs in Wireless Sensor Networks

Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET

XCast: Interactive, Movable, Personalized Broadcasts (on Demand) for Local Life Interfaces

A SURVEY OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS

Dropping The Transmission Rate Using Distributed Broadcasting Algorithm In Wireless Ad-hoc Network

A Power-Aware Routing Protocol Using Multi-Route Transmission for Mobile Ad Hoc Networks

Variable Power Broadcasting in Ad Hoc Networks

Transmit and Receive Power Optimization for Source-Initiated Broadcast in Wireless-Relay Sensor Networks

Energy-Efficient Algorithm for Broadcasting in Ad Hoc Wireless Sensor Networks

AMRIS: A Multicast Protocol for Ad hoc Wireless Networks

Energy Efficient Routing of Wireless Sensor Networks Using Virtual Backbone and life time Maximization of Nodes

ViTAMin: A Virtual Backbone Tree Algorithm for Minimal Energy Consumption in Wireless Sensor Network Routing

Distributed Data Aggregation Scheduling in Wireless Sensor Networks

Outline. Introduction. Outline. Introduction (Cont.) Introduction (Cont.)

Rumor Routing Algorithm

Defending Against Resource Depletion Attacks in Wireless Sensor Networks

Chapter 8: Energy Conservation. MANETs. Prof. Yuh-Shyan Chen Department t of Computer Science and Information Engineering

Stochastic Flooding Broadcast Protocols in Mobile Wireless Networks

Approximating Node-Weighted Multicast Trees in Wireless Ad-Hoc Networks

Evaluation of Cartesian-based Routing Metrics for Wireless Sensor Networks

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL

Model and Algorithms for the Density, Coverage and Connectivity Control Problem in Flat WSNs

OLSR-R^3: Optimised link state routing with reactive route recovery

Dynamic Traffic Congestion Control Scheme in MANET with Cooperative Communication

IN WIRELESS SENSOR NETWORKS

Performance Of OLSR Routing Protocol Under Different Route Refresh Intervals In Ad Hoc Networks

A METHOD FOR DETECTING FALSE POSITIVE AND FALSE NEGATIVE ATTACKS USING SIMULATION MODELS IN STATISTICAL EN- ROUTE FILTERING BASED WSNS

Constructing weakly connected dominating set for secure clustering in distributed sensor network

An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol

CHAPTER 4 IMPACT OF ROUTING ATTACKS IN LOCATION BASED ROUTING PROTOCOL

Energy Optimized Routing Algorithm in Multi-sink Wireless Sensor Networks

Performance Evaluation Of Ad-Hoc On Demand Routing Protocol (AODV) Using NS-3 Simulator

A CLASSIFICATION FRAMEWORK FOR SCHEDULING ALGORITHMS IN WIRELESS MESH NETWORKS Lav Upadhyay 1, Himanshu Nagar 2, Dharmveer Singh Rajpoot 3

Event Driven Routing Protocols For Wireless Sensor Networks

Multi-Metric Energy Efficient Routing in Mobile Ad-Hoc Networks

Sabareesan M, Srinivasan S*,John Deva Prasanna D S

DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK

Implementation and simulation of OLSR protocol with QoS in Ad Hoc Networks

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network

A Simple Sink Mobility Support Algorithm for Routing Protocols in Wireless Sensor Networks

PERFORMANCE EVALUATION OF TOPOLOGY CONTROL ALGORITHMS FOR WIRELESS SENSOR NETWORKS

MOBILITY REACTIVE FRAMEWORK AND ADAPTING TRANSMISSION RATE FOR COMMUNICATION IN ZIGBEE WIRELESS NETWORKS

Implementation of Near Optimal Algorithm for Integrated Cellular and Ad-Hoc Multicast (ICAM)

On minimum m-connected k-dominating set problem in unit disc graphs

Improved Self-Pruning for Broadcasting in Ad Hoc Wireless Networks

A COMPARITIVE STUDY ON COST AWARE SECURE ROUTING (CASER) PROTOCOL WITH SLEEP WAKE STATE ROUTING PROTOCOL (SWSR)

Software Defined Network Routing in Wireless Sensor Network

ENERGY BASED AODV ROUTING PROTOCOL FOR WIRELESS MESH NETWORK

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

Pervasive and Mobile Computing. Improved sensor network lifetime with multiple mobile sinks

Zonal Rumor Routing for. Wireless Sensor Networks

A NEW DENSITY BASED PROBABILISTIC COUNTER SCHEME FOR SOLVING BROADCAST STORM IN MOBILE AD HOC NETWORKS

A Proposed Paper on Joint Priority Based Approach for Scheduling and Congestion Control in Multipath Multi-hop WSN

On Distributed Algorithms for Maximizing the Network Lifetime in Wireless Sensor Networks

Performance Evaluation in MANET by Using NCPR Scheme with Cluster Technique

Efficient Directional Network Backbone Construction in Mobile Ad Hoc Networks

ANALYZE AND EVALUATE THE IMPLEMENTATION OF CDS ALGORITHMS USING THE MOBILE AGENT.. 1 RAFAT AHMED ALHANANI, 2 JAAFAR ABOUCHABAKA, 3 RAFALIA NAJAT

ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS

On-Demand Multicast Routing Protocol with Multipoint Relay (ODMRP-MPR) in Mobile Ad-Hoc Network

A Comparison of OLSR and OSPF-MDR for Large-Scale Airborne Mobile Ad-Hoc Networks

Dominating Set & Clustering Based Network Coverage for Huge Wireless Sensor Networks

Keywords Minimum Spanning Tree, Mobile Adhoc Network (MANET), Multicast, Overhead, Scalability, Spanning Tree.

Contending Against Energy Debilitating Attacks in Wireless Ad Hoc Sensor Networks

Transcription:

In Proceedings of 17th International IEEE Conference on Computer Communications and Networks, August 28, pp. 1-6 A Power-Preserving Broadcast Protocol for WSNs With DoS Resistance Chien-Chun Ni, Tien-Ruey Hsiang National Taiwan University of Science and Technology Taipei, Taiwan 16 Email: (m951566, trhsiang)@mail.ntust.edu.tw J. D. Tygar University of California, Berkeley Berkeley, CA 9472 Email: tygar@cs.berkeley.edu Abstract Broadcast presents a special challenge for Wireless Sensor Networks (WSNs). In some situation such as time synchronization or building routing path, broadcasting messages must be securely transmitted to all nodes, but this process is subject to attack by adversaries. For example, an adversary may try to waste the battery power of intermediate nodes by forcing a compromised node to repeatedly rebroadcast, thus causing a Denial-of-Service (DoS) attack. One way to solve this problem is use only part of the nodes in the network as the intermediate nodes, limiting the effects of the attack. In this paper, we propose a novel broadcast protocol: BrOadcast Power Preserving (BOPP). In BOPP, a packet reception reliability metric of each network component is discovered. This reliability score gives the packet reception rate of each communication edge in the network. With the scoring metric, BOPP can judge the network reliability from time to time and adapt the network to provide maximum reliability while minimizing the energy cost. This enables the network to resist DoS attacks. Index Terms broadcasting, dominating set, sensor networks, routing protocols. I. INTRODUCTION This paper gives a protocol for assignment of resources in wireless sensor networks (WSNs). We give a broadcast protocol (BOPP, BrOadcast Power Preserving protocol) that involves some, but not all, intermediate nodes to achieve broadcast while balancing these two properties: reaching a large number of nodes with high probability; and using few resources, in terms of broadcasting packets (which requires and consumes power). To achieve this tradeoff, we measure the reliability of internode direct communication, then use a greedy algorithm to select a subset of those nodes, and broadcast using the chosen subset as intermediate repeater nodes. We contrast our system with a flooding approach (involving all nodes) and with multipoint relays [1] and show that our system has substantially better results. A Wireless Sensor Network (WSN) typically is a set of sensor nodes and base stations. A wireless sensor node often contain a low-cost processor, small amount of memory, limited battery power, limited wireless radio range, and appropriate built-in sensors for sensing the environment. These networks can be used to collect information in harsh environments. Security issues need special attention in wireless sensor networks because of the strict hardware limitation. The limited radio range and battery power means that power for transmission is a scarce resource. Denial-of-Service (DoS) attacks are a particular concern. If an adversary can cause a node to repeatedly broadcast messages [2], he can successfully drain power from that node. Worse, these messages will be rebroadcast by other intermediate nodes, draining their power. We need a broadcast protocol with a limited number of relay nodes to reduce the effect of DoS attacks. The simplest broadcast method is flooding: every node in the network retransmits the first copy of every message it receives. This method is simple to implement and gives robust coverage of nodes. However, it uses a large amount of power. To increase the network lifetime, the most common solution is to choose a subset of nodes as relay nodes. One common method is to calculate the Connected Dominating Set (CDS), or a Multipoint Relay Set (MPR) (these are discussed in the next section). Unfortunately, calculating a connected dominating set and finding a multipoint relay set with minimal size are both NP-hard [1], so only approximate solutions can be calculated. Unstable wireless signals subject to collisions, buffer overflows, and packet latencies may prevent broadcast messages from reaching all nodes. If there is only one route from the source node to the destination node, packet loss results in non-delivery of messages. Multi-path routing can alleviate the effect of packet loss. In this paper we introduce a novel broadcasting protocol that can reduce the effect of packet loss in the network and decrease the size of the relay set. This protocol uses a reliability metric to compute a set of relaying nodes. By using smaller sets, network reliability is maintained. II. PRELIMINARIES Various methods have been proposed for WSN broadcast. In [3], broadcasting protocols are categorized into four families: simple flooding, probability based methods, area based methods and neighbor knowledge methods. In simple flooding, each node immediately rebroadcasts the first instance of every packet [4]. The probability based method in [5] is similar to flooding, except that each node rebroadcasts with a certain 978-1-4244-239-3/8/$25. 28 IEEE 1

7 3 7 9 1 4 (a) CDS: Before (b) CDS: After Fig. 1. An example of Connected Dominating Set (CDS). Fig. 1(a) shows every node as a relay node. Fig. 1(b) shows the CDS as the relay set; it needs only 3 nodes to transmit messages to the whole network. probability. In area based methods [5], nodes are assumed to have a common transmission range. A node rebroadcasts only when reaching sufficient new coverage area. In neighbor knowledge methods [1, 6], the relay set is chosen using knowledge of each node s neighbor or child set. Using neighbor knowledge to choose rebroadcasting nodes is a problem related to finding a connected dominating set (CDS): for a connected graph G(V, E) where V is the vertex set and E is the edge set, a subset R V is called a connected dominating set if R is connected and any vertex in V is either in R or is adjacent to a node in R. Fig. 1 shows a CDS. If we let the minimal CDS be the relay set in broadcast, the transmission cost of broadcast will also be minimized. It is known that the problem of finding the smallest dominating set in a weighted graph is NP-hard [7]. Therefore, we must use an approximation algorithm for the minimal CDS problem. In [6, 8, 9], distributed algorithms are proposed to construct the dominating sets in the sensor network. Qayyum et al. proposed multipoint relays (MPR) [1, 1] to reduce the size of relay sets. This method requires nodes have the knowledge of the network topology within a 2-hop radius. The nodes include the 1-hop neighbors in a greedy fashion to be the MPR that can reach the largest 2-hop neighborhood, until every node in the network can be reached by the MPR. Fig. 2. Suppose node 1 is the base station. The MBR relay set is {2,3,4}; first consider 1-hop neighbors, choose node 2 to cover node 4 and node 5, then choose node 3 to cover node 6, and then choose node 4 to cover node 7. However, the minimal relay set is actually {2,4} or {3,4}. 7 The protocol is improved in [11]. In [12] a tree based data collection scheme (TBDCS) is proposed using vertex covers to choose covering nodes. Both MPR and TBDCS use neighbor knowledge based on the child set to decide the relay set. The links between the siblings are ignored. The ignored siblings problem is shown in Fig. 2. To help address the ignored siblings problem, we can consider both the messages from parent nodes and from neighbor nodes. If a node has more broadcasting nodes near it, it has a higher probability of receiving the message and is more resilient to packet loss. When multiple nodes broadcast in a compact region, the broadcast packets might interfere with each other and cause packet lost. These effects have been actually observed in Berkeley motes running broadcast; a number of instances are documented by Perrig and Tygar [13, 14]. Using part of the nodes in the network to be the relay node can decrease the node number within this compact region, also reduce the interference effects. III. BROADCAST PROTOCOL As mentioned earlier, multi-path routing reduces message loss. In multi-hop wireless networks, two nodes communicate over a (multi-hop) routing path. Let the packet reception rate be the weight of each edge. We can compute each node s packet reception rate. Using this data we can find a relay subset to broadcast messages to the whole network. Below we propose a novel, robust broadcast protocol that balances packet reception reliability and the size of relay sets. A. Network Definition A wireless sensor network is represented by a graph G = (V, E) where V is the set of nodes, and E V 2 is the edge set that gives available communication links between nodes. If an edge (u, v) belongs to E, then u and v can communicate to each other, and the packet reception rate of edge (u, v) is p(u, v). 2

Fig. 3. A example of a network with parallel routing paths a c d and a b d from a to d. Every solid link between nodes is weighted with the packet reception rate between these two nodes. Fig. 4. An example of network communication where node a is the base station. There are multiple paths from node a to node f. For all x V, hop(x) is defined to be the shortest distance to the base station. With this definition, node x s parent set, child set, and neighbor set are defined as follows: P arent(x) = {a V hop(a) = hop(x) 1, (a, x) E} Child(x) = {a V hop(a) = hop(x) + 1, (a, x) E} Nbr(x) = {a V hop(a) = hop(x), (a, x) E} B. Node Reliability Score In wireless communication some messages are lost during broadcast. If messages are redundantly routed over multiple paths then reliability increases. Given the packet reception rate r along every edge, we can compute the node s reliability score. For every pair of nodes m and n that may communicate, we define the reliability score s(n) as the packet reception rate of the node n. If there is only one path, s(n) = r(m, n) s(m) where s(m) is the score for node m. If there are multiple paths from parents, the score of the nodes in the parallel case can be defined as follows: s(n) = 1 x P arent(n) h d (1 s(x) r(x, n)) Suppose node a denotes the base station and there exist two routing paths a b d and a c d, both of them capable broadcast the message to node d, as illustrated in Fig. 3. The reliability score of node d is s(d) = 1 (1 s(b) r(b, d))(1 s(c) r(c, d)). This method can only handle the score with the shortest path to each node. In real network communications, the routing path of the broadcasting messages which transmitted with shortest paths are only parts of transmission. Fig. 4 shows one example. From the base station node a to node f, there are various paths such as a b c f, a c b e f, or a c f. Here is an approximation: for every route from node a to node b, we only consider the path length within hop(b) + 1. We use two scores to describe hop(b) + 1 and hop(b). We denote the score that holds the shortest path (that is, hop(b)) as s d (b); we denote the route s combined scores with length hop(b) + 1 as s c (b, x), x Nbr(b). Then we can approximate the score s(b) = 1 (1 s d (b)) (1 s c (b, x)) x Nbr(b) For the node b in Fig. 4, the routes under consideration are a b and a c b. To compute the score of every node, we need to compute the score recursively. In Fig. 4, we first consider the scores of the set Child(a) = {b, c, d}. For node b, hence Similarly, we get s d (b) = s(a) r(a, b) s c (b, c) = s d (c) r(c, b) s(b) = 1 (1 s d (b))(1 s c (b, c)) s(c) = 1 (1 s d (c))(1 s c (c, b))(1 s c (c, d)) s(d) = 1 (1 s d (d))(1 s c (d, c)) For node f, P arent(f) is greater than one, which means that there are multiple paths from parents, so the score s c is s c (f) = 1 (1 s(b) r(b, f))(1 s(c) r(c, f)) The combined score is s c (f) = s(e) r(f, e) The remaining scores of every node is computed in a similar way. Fig. 5 shows a graph where nodes in the network are labeled with reliability scores, and the nodes with the same hop grouped in common shaded areas. C. The Scoring Metric And The Broadcast Relay Set We use the sum of all the scores of nodes to be a metric for the network, and we define the maximal metric score to be the score when every node in the network is a relay node (simple flooding). We use a greedy algorithm to minimize the size of the relay set. Define sum(n, U) to be the sum of all the nodes reliability scores, where R is the relay set and U = N \R is the node set containing nodes not relaying messages. The scoring metric of the network SM(N, U) is SM(N, U) = sum(n, U) sum(n, {φ}) 1%. 3

.785.758 6.915.978.992.987.948.985.947.947.973.779.988.947.951.975.951.951.947.76.954.76 Fig. 5. A network graph where the nodes with the same hop count are grouped in colored bands. When U is empty, every node in the network is in the relay set, and SM(N, U) = 1%. As we remove nodes from the relay set, the score SM decreases. To prevent the network from being disconnected, SM becomes zero if there exists a node in the network whose reliability score is zero. We use a greedy algorithm to choose U. At each step, the algorithm chooses a node to join U causing the smallest drop in SM. We do not drop below a threshold value. This acts as a parameter of broadcast reliability. To maximize the life of the wireless sensor network, when the energy of a node drops below a threshold the node sends an alert to the base station. The low battery node is removed from the relay set and the relay set is rebuilt. Number of realy nodes 5 4 3 2 1 5 1 15 2 25 3 35 4 45 5 MPR relay node BOPP relay node (stable) BOPP relay node (unstable) Pure flooding Fig. 6. A comparison of the average relay node set number required by pure flooding, MPR, and BOPP taken over 1 randomly generated stable networks (that is networks where neighboring node probability rate was set randomly, uniformly between 8% and 1%). We also show the average relay node set number required by BOPP taken over 1 randomly generated unstable networks (that is, networks where the neighboring node probability rate was set randomly, uniformly between 2% and 1%). The lower number of relay nodes, the lower amount of energy consumption. Delivery ratio (%) 85 8 75 7 65 6 55 5 45 4 5 1 15 2 25 3 35 4 45 5 MPR probability BOPP probability (Min) BOPP probability IV. EVALUATION A. Simulation Setup In this section, we describe an experiment comparing BOPP and MPR in terms of the average size of the relay node set and the broadcast packet delivery rate. Our simulation randomly generated a network with sensor nodes within a two dimensional area of 4 4 units. Each node had a fixed transmission range of 1 units. To generate a network of fairly even distribution, no two nodes were allowed to be within 5 units of each other. The communication links between nodes have different packet delivery probabilities. We only considered connected networks. The simulation considered both stable and unstable networks. In stable networks, the packet reception rate was randomly, uniformly set between 8% to 1%. In unstable networks, the rate was randomly, uniformly set between 2% to 1%. BOPP and MPR were tested on 1 stable networks and 1 unstable networks. The results were obtained by averaging the 1 simulations for both stable and unstable networks. Fig. 7. A comparison of the average packet delivery rates associated with MPR and BOPP taken over 1 randomly generated, stable networks. Delivery Ratio (%) 35 3 25 2 15 1 5 5 1 15 2 25 3 35 4 45 5 MPR probability BOPP probability (Min) BOPP probability Fig. 8. A comparison of the average packet delivery rates associated with MPR and BOPP taken over 1 randomly generated, unstable networks. 4

Improvement (%) 16 14 12 1 8 6 4 2 1 2 3 4 5 Unstable network Stable network V. CONCLUSIONS We proposed a new broadcast algorithm providing maximum reliability while minimizing the energy cost. Compared with MPR, BOPP uses fewer relay nodes and provides the desired packet delivery rate. We also show that BOPP provides better performance in larger unstable networks, and the simulation result shows that BOPP saves more energy and is more resilient to DoS attacks. In future work, we will try to find out a lightweight method replacing the greedy algorithm to choose the relay nodes. In a longer presentation of this work, we will present a full analysis of our algorithm. We also plan to investigate nodes dynamically joining and leaving networks in the future. Fig. 9. Energy costs are reduced in BOPP, compared to MPR in both stable and unstable networks. B. Simulation Result Fig. 6 shows the simulation result for MPR and pure flooding in stable networks, and BOPP in both stable and unstable networks. BOPP needs about 1% fewer nodes than MPR. Since most of the energy consumption in WSNs comes from radio communication, the smaller the number of required relay nodes, the lower the amount of energy consumed. Fig. 7 and 8 compare MPR and BOPP in terms of packet delivery rates in both stable and unstable networks respectively. In Fig. 7 and Fig. 8, there are two BOPP curves: one shows the delivery rate when BOPP is used with the same number of relay nodes as MPR; the other shows the rate when a minimal number of relay nodes are used in BOPP. When the same number of relay nodes is used by both MPR and BOPP, then BOPP has about 1% higher packet delivery rate than MPR, in both stable and unstable networks. Compared with MPR, the simulation results of both stable and unstable networks show that BOPP requires about 1% fewer relay nodes while maintaining the same delivery rate. Since BOPP offers the desired packet delivery rate, we can also compare BOPP and MPR in terms of energy efficiency. Here we compare the energy efficiency of packet delivery rate that every relay node can provide. In our simulation, BOPP provided at least 5% improvement in energy consumption in stable networks (Fig. 9). As the network scales up, the improvement becomes greater and greater. For unstable networks, BOPP presented about a 1% energy improvement. C. Resistance Against Denial-of-Service Attack Denial-of-Service (DoS) attacks can be a serious problem for wireless sensor networks. If an adversary can flood a wireless sensor networks with messages, he can rapidly drain battery resources. Compared with a flooding protocol in which all of the nodes rebroadcast messages, BOPP use only 45% of resources. This provides resistance against DoS attacks. See Fig. 6. ACKNOWLEDGMENT This effort was partially supported by the International Collaboration for Advancing Security Technology (icast) and Taiwan Information Security Center (TWISC) projects, sponsored by National Science Council under the grants NSC 96-3114-P-1-2-Y and NSC96-2219-E-9-13 respectively. This work was also supported in part by TRUST (Team for Research in Ubiquitous Secure Technology), which receives support from the National Science Foundation (NSF award number CCF-424422) and the following organizations: AFOSR (#FA955-6-1-244), BT, Cisco, ESCHER, HP, IBM, Intel, Microsoft, ORNL, Pirelli, Qualcomm, Sun, Symantec, Telecom Italia, and United Technologies. REFERENCES [1] A. Qayyum, L. Viennot, and A. Laouiti, Multipoint relaying for flooding broadcast messages in mobile wireless networks, HICSS 2: Proceedings of the 35th Annual Hawaii International Conference on System Sciences (HICSS 2), vol. 9, pp. 298 37, 22. [2] A. D. Wood and J. A. Stankovic, Denial of service in sensor networks, Computer, vol. 35, no. 1, pp. 54 62, 22. [3] B. Williams and T. Camp, Comparison of broadcasting techniques for mobile ad hoc networks, MobiHoc 2: Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 194 25, 22. [4] C. Ho, K. Obraczka, G. Tsudik, and K. Viswanath, Flooding for reliable multicast in multi-hop ad hoc networks, DIALM 99: Proceedings of the 3rd International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications, pp. 64 71, 1999. [5] S.-Y. Ni, Y.-C. Tseng, Y.-S. Chen, and J.-P. Sheu, The broadcast storm problem in a mobile ad hoc network, MobiCom 99: Proceedings of the 5th Annual ACM/IEEE International Conference on Mobile Computing and Networking, pp. 151 162, 1999. [6] I. Stojmenovic, M. Seddigh, and J. Zunic, Dominating sets and neighbor elimination-based broadcasting algorithms in wireless networks, IEEE Transactions on Parallel Distributed Systems, vol. 13, no. 1, pp. 14 25, 22. [7] S. Guha and S. Khuller, Approximation algorithms for connected dominating sets, European Symposium on Algorithms, pp. 179 193, 1996. [8] J. Wu and H. Li, On calculating connected dominating set for efficient routing in ad hoc wireless networks, DIALM 99: Proceedings of the 3rd International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications, pp. 7 14, 1999. [9] M. Min, H. Du, X. Jia, X. Jia, C. X. Huang, S. C.-H. Huang, and W. Wu, Improving construction for connected dominating set with steiner tree in wireless sensor networks, Journal of Global Optimization, vol. 35, no. 1, pp. 111 119, 26. [1] C. Adjih, P. Jacquet, and L. Viennot, Computing connected dominated sets with multipoint relays, Ad Hoc and Sensor Wireless Networks, vol. 1, no. 1-2, pp. 27 39, 25. 5

[11] F. Ingelrest and D. Simplot-Ryl, Maximizing the probability of delivery of multipoint relay broadcast protocol in wireless ad hoc networks with a realistic physical layer, ArXiv Computer Science e-prints, January 27. [12] H. Li, H. Yu, and A. Liu, A tree based data collection scheme for wireless sensor network, ICNICONSMCL 6: Proceedings of the International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICNICONSMCL 6), pp. 119 123, 26. [13] A. Perrig and J. D. Tygar, Secure Broadcast Communication: In Wired and Wireless Networks. Springer, 22. [14] A. Perrig, R. Szewczyk, V. Wen, D. E. Culler, and J. D. Tygar, SPINS: security protocols for sensor networks, ACM Journal of Wireless Networks, vol. 8, no. 5, pp. 521 534, 22. 6