ISSN: ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 3, Issue 4, July 2014

Similar documents
Efficient Detection and Elimination of Vampire Attacks in Wireless Ad-Hoc Sensor Networks

Defending Against Resource Depletion Attacks in Wireless Sensor Networks

OVERCOME VAMPIRE ATTACKS PROBLEM IN WIRELESS AD-HOC SENSOR NETWORK BY USING DISTANCE VECTOR PROTOCOLS

Securing Data Packets from Vampire Attacks in Wireless Ad-Hoc Sensor Network

ComparisonofPacketDeliveryforblackholeattackinadhocnetwork. Comparison of Packet Delivery for Black Hole Attack in ad hoc Network

Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol

Technology, Andheri (w), Mumbai, India. 2 Assistant Professor, Department of Electronic & Telecommunication, Rajiv Gandhi Institute of

Security Issues In Mobile Ad hoc Network Routing Protocols

Contending Against Energy Debilitating Attacks in Wireless Ad Hoc Sensor Networks

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine

Effect of Variable Bit Rate Traffic Models on the Energy Consumption in MANET Routing Protocols

[Nitnaware *, 5(11): November 2018] ISSN DOI /zenodo Impact Factor

Detection of Wormhole Attacks in Wireless Sensor Networks

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Secure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks

Performance Comparison of DSDV, AODV, DSR, Routing protocols for MANETs

A Review of Reactive, Proactive & Hybrid Routing Protocols for Mobile Ad Hoc Network

Packet Forwarding Method by Clustering Approach to Prevent Vampire Attacks in Wireless Sensor Networks Vijimol Vincent K 1, D.

Ms A.Naveena Electronics and Telematics department, GNITS, Hyderabad, India.

Realization of Fault Tolerant Routing Protocol for Zigbee

Defending against Energy Draining attack in Wireless Ad-Hoc Sensor Networks

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14

Detection of Vampire Attack in Wireless Adhoc

VAMPIRE ATTACKS IN WIRELESS SENSOR NETWORKS: EVALUATION AND PROTECTION

Energy Depletion Attacks: Detecting and Blocking in Wireless Sensor Network

CAODV Free Blackhole Attack in Ad Hoc Networks

Performance Analysis of Aodv Protocol under Black Hole Attack

Power aware Multi-path Routing Protocol for MANETS

Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures

Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach

AODV-PA: AODV with Path Accumulation

SEAR: SECURED ENERGY-AWARE ROUTING WITH TRUSTED PAYMENT MODEL FOR WIRELESS NETWORKS

DETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM

Mitigating Superfluous Flooding of Control Packets MANET

Review on Packet Forwarding using AOMDV and LEACH Algorithm for Wireless Networks

Synchronization and Time Slot-Based Method for Vampire Attacks Detection in Wireless Sensor Networks

Security Enhanced Adaptive Acknowledgment Intrusion Detection System

AODV Routing Protocol in MANET based on Cryptographic Authentication Method

ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS

Prevention of Black Hole Attack in AODV Routing Algorithm of MANET Using Trust Based Computing

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)

Communication Layer, Attacks and Security Mechanisms of Wireless Sensor Network

Performance Evaluation of MANET through NS2 Simulation

Security Enhancement of AODV Protocol for Mobile Ad hoc Network

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Catching BlackHole Attacks in Wireless Sensor Networks

Impulse Radio Ultra Wide Band Based Mobile Adhoc Network Routing Performance Analysis

Figure 1: Ad-Hoc routing protocols.

DYNAMIC DATA ROUTING IN MANET USING POSITION BASED OPPORTUNISTIC ROUTING PROTOCOL

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

Routing Protocols in Mobile Ad-Hoc Network

A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

A Review on Black Hole Attack in MANET

Pritesh Jain Asst Professor, Department of CSE, Patel College of Science & Technology, Indore, Madhya Pradesh, India

Computation of Multiple Node Disjoint Paths

International Journal of Advance Research in Computer Science and Management Studies

Mobile Ad-hoc Networks (MANET)

Defending MANET against Blackhole Attackusing Modified AODV

Shared Key Based Jamming Mitigation in Wireless Network using Diffie Hellman Elliptic Curve Cryptography

Performance Analysis of Heterogeneous Wireless Sensor Network in Environmental Attack

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

CHAPTER 4 IMPACT OF ROUTING ATTACKS IN LOCATION BASED ROUTING PROTOCOL

A REVERSE AND ENHANCED AODV ROUTING PROTOCOL FOR MANETS

Vampire Attacks: Detection And Prevention

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol

Simulation and Performance Analysis of Throughput and Delay on Varying Time and Number of Nodes in MANET

A REVIEW PAPER ON DETECTION AND PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK

PERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH

Secure and Efficient Routing Mechanism in Mobile Ad-Hoc Networks

White Paper. Mobile Ad hoc Networking (MANET) with AODV. Revision 1.0

PERFORMANCE STUDY OF AODV ROUTING PROTOCOL IN MOBILE AD-HOC SENSOR NETWORKS

Fig. 2: Architecture of sensor node

Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1

Securing Data Packets from Vampire Attacks in Wireless Ad-hoc Sensor Network.

Mitigating Malicious Activities by Providing New Acknowledgment Approach

Survey on Attacks in Routing Protocols In Mobile Ad-Hoc Network

A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE AND IEEE

Outline. CS5984 Mobile Computing. Taxonomy of Routing Protocols AODV 1/2. Dr. Ayman Abdel-Hamid. Routing Protocols in MANETs Part I

Detection and Removal of Vampire Attack in Wireless Sensor Network

Detection and Removal of Black Hole Attack in Mobile Ad hoc Network

Implementation of AODV Protocol and Detection of Malicious Nodes in MANETs

A Secure Routing Method for Detecting False Reports and Wormhole Attacks in Wireless Sensor Networks *

Performance Evaluation of Various Routing Protocols in MANET

International Journal of Advance Engineering and Research Development

An Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks

Security in Mobile Ad-hoc Networks. Wormhole Attacks

Backward Aodv: An Answer To Connection Loss In Mobile Adhoc Network (Manet)

Estimate the Routing Protocols for Internet of Things

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL

Wormhole Attack in Wireless Ad-Hoc Networks

Optimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol Prerana A. Chaudhari 1 Vanaraj B.

Packet Estimation with CBDS Approach to secure MANET

Selective Forwarding Attacks Detection in WSNs

Routing Protocols in MANETs

Effective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report

Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN

TDMA-Based Detection of Packet Modification Attacks in Wireless Sensor Networks 1

Sybil Attack Detection and Prevention Using AODV in VANET

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol

Transcription:

Vampire Attack Detection in Wireless Sensor Network Jose Anand 1, K. Sivachandar 2 1. Associate Professor, 2. Assistant Professor Department of Electronics and Communication Engineering, K.C.G. College of Technology, Rajiv Gandhi Salai, Karapakkam, Chennai, Tamil Nadu 600097. Abstract Wireless Sensor Networks (WSNs) in today s world are the means of communication. These contain nodes that act as transmitter and receivers are prone to different attacks leading to different types of losses. The resource depletion attack that is called vampire attack drains out the energy from the nodes leaving them useless. These attacks are protocol compliant, they are easy to implement. Since they are orthogonal in nature they can easily intrude into any routing protocol. They affect the entire network causing large loss of energy. The proposed method detects the presence of vampire attack and the simulation results show the energy consumption in each case. Index Terms Wireless Sensor Network; Denial of service; Resource depletion; Routing; Energy consumption; Security. I. INTRODUCTION Sensor networks provide economically viable solutions for a wide variety of applications, including surveillance of critical infrastructure, safety monitoring, and many health-care applications [8]. As sensor networks are increasingly deployed in such security-and safety critical environments, the need for secure communication primitives is self-evident. Likewise, the development of such primitives facilitates the use of sensor networks in a wider range of applications. The central goal of this work is to ensure node-to-node message delivery, even if the sensor network is under active attack [10]. In the presence of an attacker, it is an extremely challenging task to maintain correct routing information; the attacker could inject malicious routing information or alter routing setup/update messages from legitimate nodes. Even when route setup/update messages are authenticated, compromised sensor nodes can supply incorrect routing information of their own and cripple the routing infrastructure. WSNs consist of nodes they are independent and have no infrastructure. The nodes of WSN consists of Data acquisition unit, Data transfer unit and Process unit to which power is supplied as shown in the figure 1. These nodes are used in different fields to gather information in different ways. Fig 1. Nodes of WSN Base stations are typically many orders of magnitude more powerful than sensor nodes [16]. They might have workstation or laptop class processors, memory, and storage, AC power, and high bandwidth links for communication amongst themselves. However, sensors are constrained to use lower-power, lower- bandwidth, 639

shorter-range radios, and so it is envisioned that the sensor nodes would form a multi-hop wireless network to allow sensors to communicate to the nearest base station. A base station might request a steady stream of data, such as a sensor reading every second, from nodes able to satisfy a query [12]. We refer to such a stream as a data flow and to the nodes sending the data as sources. In order to reduce the total number of messages sent and thus save energy, sensor readings from multiple nodes may be processed at one of many possible aggregation points. An aggregation point collects sensor readings from surrounding nodes and forwards a single message representing an aggregate of the values. Aggregation points [5] are typically regular sensor nodes, and their selection is not necessarily static. Aggregation points could be chosen dynamically for each query or event. Fig 2. Architecture of WSN Figure 2 shows the basic architecture of a WSN [13]. It contains number of nodes that act as routing nodes, sensing nodes and base nodes. Figure 2 shows the architecture of a WSN, where all the different types of nodes are shown. It is also possible that every node in the network functions as an aggregation point, delaying transmission of an outgoing message until a sufficient number of incoming messages have been received and aggregated. Power management in sensor networks is critical. Consequently, if we want sensor networks to last for years, it is crucial that they run at around a 1% duty cycle (or less). Similarly, since the power consumption of the radio is three orders of magnitude higher when transmitting or listening than when in sleep mode, it is crucial to keep the radio in sleep mode the overwhelming majority of the time. II. PROTOCOLS AND ASSUMPTIONS In this paper we discuss the effect of vampire attacks on Ad-hoc On Demand Vector Routing (AODV) [7]. AODV is a reactive protocol for ad-hoc and a mobile network that maintains routes only between nodes which need to communicate. The routing messages do not contain information about the entire route path, but only about the source and destination. Therefore routing messages don t not have an increasing size. It uses destination sequence numbers to specify how fresh a route is, which is used to grant loop freedom. As seen in figure 3, whenever a node needs to send a packet to a destination for which it has no fresh enough route (i.e., a valid route entry for the destination whose associated sequence number is at least as great as the ones contained in any RREQ that the node has received for that destination) it broadcasts a route request (RREQ) message to its neighbors. Each node that receives the broadcast sets up a reverse route towards the originator of the RREQ (unless it has a fresher one). When the intended destination (or an intermediate node that has a fresh enough route to the destination) receives the RREQ, it replies by sending a Route Reply (RREP). It is important to note that the only mutable information in a RREQ and in a RREP is the hop count (which is being monotonically increased at each hop). The RREP travels back to the originator of the RREQ (this time as a unicast). At each intermediate node, a route to the destination is set (again, unless the node has a fresher route than the one specified in the RREP). In the case that the RREQ is replied to by an intermediate node (and if the RREQ had set this option), the intermediate node also sends a RREP to the destination. In this way, it can be granted that the route path is being set up bidirectional. In the case that a node receives a new route (by a RREQ or by a RREP) and the node already has a route as fresh as the received one, the shortest one will be updated. If there is a subnet (a collection of nodes that are identified by a common network prefix) that does not use AODV as its routing protocol and wants to be able to exchange information with an AODV network, one of the nodes of the subnet can be selected as their network leader. The network leader is the only node of the subnet that sends forwards and processes AODV routing messages. In every RREP that the leader issues, it sets the prefix size of the subnet. 640

Fig 3. AODV protocol Optionally, a Route Reply Acknowledgment (RREP-ACK) message may be sent by the originator of the RREQ to acknowledge the receipt of the RREP. RREP-ACK message has no mutable information. In addition to these routing messages, Route Error (RERR) message are used to notify the other nodes that certain nodes are not anymore reachable due to a link breakage. When a node rebroadcasts a RERR, it only adds the unreachable destinations to which the node might forward messages. Therefore, the mutable information in a RERR is the list of unreachable destinations and the counter of unreachable destinations included in the message. Anyway, it is predictable that, at each hop, the unreachable destination list may not change or become a subset of the original one. The vampire attack disrupts the AODV protocols ability to avoid loops and choose the shortest path, AODV are prone to wormhole attacks [18] and false injection of data [9] which can be avoided by using an encryption system [9] [17] [14]. III. VAMPIRE ATTACK DETECTION There are two types of attacks in WSN, the routing depletion and resource depletion attack. The routing depletion attacks usually only affect the routing path the resource depletion attacks are the ones that attack the network features like bandwidth, power, and energy consumption. These attacks are commonly called as Vampire attacks [4]. They are called so because they drain the battery power from the nodes. These are a type of Denial of Service [2] since they affect the entire system from performing. They are difficult to be detected since they are protocol compliant and are orthogonal to them [6]. They are not protocol specific. They do not affect a single node they take their time attack one by one and disrupt the entire system. Vampire attacks can be defined as the composition and transmission of a message that cause more energy to be consumed by the network than if an honest node transmitted a message of identical size to the same destination, although using different packet headers. The strength of the attack is measured by the ratio of network energy used in the benign case to the energy used in the malicious case. Safety from Vampire attacks implies that this ratio is 1. Energy use by malicious nodes is not considered, since they can always unilaterally drain their own batteries. A. Carousel attack In this attack, an adversary composes packets with purposely introduced routing loops. It is called carousel attack, since it sends packets in circles as shown in Figure 4. It targets source routing protocols by exploiting the limited verification of message headers at forwarding nodes, allowing a single packet to repeatedly traverse the same set of nodes. On average, a random located carousel attacker in the example mentioned topology can increase the network energy consumption by a factor of 1.48±0.99. The reason for this large standard deviation is that the attack does not always increase energy usage, the length of the adversarial path is a multiple of the honest path, which is in turn, affected by the position of the adversary s position of the adversary in relation to the destination, so the adversary s position is important to the success of this attack. Figure 4 shows the network under attack where the packets are sent in loops causing more usage of energy and time. B. Stretch attack In this attack, also targeting source routing, an adversary constructs artificially long routes, potentially traversing every node in the network. It is call this the stretch attack, since it increases packet path lengths, causing packets to be processed by a number of nodes that is independent of hop count along the shortest path between the adversary and packet destination. An example is illustrated in figure 5. In the example topology, there is an increase in energy usage by as much as a factor of 10.5 per message over the honest scenario, with an average increases in energy 641

consumption of 2.67±2.49. As with the carousel attack, the reason for the large standard deviation is that the position of the adversarial node affects the strength of the attack. Not all routes can be significantly lengthened, depending on the location of the adversary. Fig 4 Carousel attack Fig 5 Stretch attack Unlike the carousel attack, where the relative positions of the source and sink are important, the stretch attack can achieve the same effectiveness independent of the attacker s network position relative to the destination, so the worst-case effect is far more likely to occur.the impact of these attacks can be further increased by combining them, increasing the number of adversarial nodes in the network, or simply sending more packets. Although in networks that do not employ authentication or only use end-to-end authentication, adversaries are free to replace routes in any overhead packets, we assume that only messages originated by adversaries may have maliciously composed routes. IV. SIMULATION RESULTS We have evaluated both the carousel and stretch attack in a randomly generated 10 node topology for carousel attack and 16 node topology for stretch attack. A single randomly selected malicious AODV agent, using ns2 [1] network simulator is evaluated. The total energy set is 10J. For the stretch attack the energy consumed by the system is 4.97960 J and for the carousel attack the power consumption is 4.625225 J. The detection of both the attacks is shown in figure 5 and 6. Fig 6 Carousel attack detection Fig 7 Stretch attack detection In figure 6 the red circle is the adversary that causes the loop. The loop causes more utilization of energy in the system. The effect of this loop increases with the increase in the number of nodes. The stretch attack is shown in figure 7 where the adversary is marked with the red circle chooses the longest path to its destination. Figure 7 shows the detection of stretch attack where the malicious node creates a loop and avoids the shortest path. Stretch attack is more difficult to mitigate. They have severe affects on the system. The energy consumption in both the cases is shown in figure 8 and figure 9. The energy calculated is given by the formula: 642

Energy consumed = ISSN: 2319-5967 E I - E F E I - Initial Energy E F - Final Energy E I The initial value in both the cases is assumed to be 10J. The simulation is done for 10ms. The data is transmission begins at 5ms and ends at 10ms. Fig 8 Energy consumption in carousel attack Fig 9 Energy consumption in stretch attack Figure 8 shows the energy consumption during a carousel attack where the x axis is taken as the Time (ms) and the y axis is taken as the Energy (J) used that is done by the formula mentioned earlier. Energy consumption is 4.97960J for every 10J. Since the initial energy is 10J the peak rises above and then gradually decreases with the transmission of data and in the presence of carousel attack. Figure 9 shows the energy consumption in stretch attack where the x axis is taken as the Time (ms) and the y axis is taken as the Energy (J) used. The energy consumption in this case is 4.625225J for every 10 J. This value increases with the increase in number of nodes. V. CONCLUSION In this paper, the routing protocol affected by vampire attack in WSN is discussed. This is a new class of resource consumption attack that use routing protocols to permanently disable ad-hoc WSNs by depleting node s battery power. Simulation results show that depending on the location of adversary, network energy expenditure during the forwarding phase increasing. The security flaws of AODV can be fixed by using RSA encryption system that will avoid the adversary from entering the system. A full solution is not yet designed and the defenses for topology discovery as well as handling mobile networks, is left for future work. REFERENCES [1] The Network Simulator- ns-2 http://www.isi.edu/nsnam/ns.2012. [2] A. Wood and J. Stankovic. Denial of Service in sensor networks. IEEE Computer, pages 54-62, Oct, 2002. [3] A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler, SPINS: Security protocols for sensor networks. Wireless Networks, vol. 8, no. 5, pp. 521 534, 2002. [4] Eugene Y. Vassermann and Nicholas Hopper Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks IEEE Trans. Mobile Computing, vol. 12, no. 2, pp. 318-332 Feb-2013. [5] B. Przydatek, D. Song, and A. Perrig. SIA:Secure information aggregation in sensor network. In ACM SenSys, Nov 2003. [6] B. Karp and H. T. Kung, GPSR: greedy perimeter stateless routing for wireless networks. In mobile Computing and Networking, 2000, pp.243-254. [7] C. Perkins and E. Royer, Ad-hoc on demand distance vector routing, in MILCOM 97 panel on Ad Hoc Networks, 1997. 643

[8] Chris Karloff and David Wager Secure Routing in Wireless Sensor Networks: Attacks and countermeasures Proc. IEEE Int l workshop sensor network protocols and applications, 2003. [9] F. Ye, H. Luo and S. Statistical En-Route Filtering of Injected False Data in Sensor Networks, IEEE Journal on Selected Areas in Communication, vol. 23, No.4, 2005, pp.839-850. [10] H. Chan and A. Perrig, Security and Privacy in Sensor Networks, Computer, vol. 36, no. 10, pp. 103-105, Oct. 2003. [11] J. R. Douceur, The Sybil Attack, in 1 st international Workshop on Peer-to-Peer Systems (IPTPS 02), March 2002. [12] J. Deng, R. Han, and S. Mishra, Maximum Lifetime Routing in Wireless Sensor Networks, IEEE/ACM Trans. Networking, vol 12. 4, pp. 609-619, Aug. 2004. [13] J.Hill, R.Szewczyk, A. Woo, S. Hollar, D. Culler, and K. Pister, System architecture directions for networked sensors, in Proceedings of ACM ASPLOS IX, November 2000. [14] L. Buttyan, et al., Statistical Wormhole Detection in Sensor Networks, Lecture Notes in Computer Science Vol. 3813, 2005, pp. 128-141. [15] L. Zhou and Z. Haas, Securing ad hoc networks, IEEE Network Magazine, vol. 13, no. 6,November/December 1999 [16] M. Tubaishat and S. Madria, Sensor Networks: An Overview, IEEE Potentials, Vol. 22, No. 2, 2003, pp. 20-23. doi:10.1109/mp.2003.1197877 [17] M. McLoone and M. Robshaw, Public Key Cryptography and RFID Tags, Proc. RSA conf. Cryptography, 2006. [18] Y.C, Hu, A.Perrig, and D.B. Johnson, Wormhole detection in wireless ad hoc networks, Department of Computer Science, Rice University, Tech. Rep TR01-384, June 2002. 644