Chapter 55 Elimination of Black Hole and False Data Injection Attacks in Wireless Sensor Networks

Similar documents
Catching BlackHole Attacks in Wireless Sensor Networks

Dynamic Cooperative Routing (DCR) in Wireless Sensor Networks

DETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM

Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN

A Scalable Secured Approach in Wireless Sensor Networks

Virtual Energy-Efficient Encryption and Keying (VEEEK) for Wireless Sensor Networks

Dynamic Energy-based Encoding and Filtering in Sensor Networks (DEEF)

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine

Hop-by-Hop Cooperative Detection of Selective Forwarding Attacks in Energy Harvesting Wireless Sensor Networks

Security Mechanisms for Selective Forwarding Attack in Wireless Sensor Networks: Review and Analysis

Energy-Efficient Security Threshold Determination Method for the Enhancement of Interleaved Hop-By-Hop Authentication

On Demand secure routing protocol resilient to Byzantine failures

Mitigating Malicious Activities by Providing New Acknowledgment Approach

Chapter 6 Route Alteration Based Congestion Avoidance Methodologies For Wireless Sensor Networks

Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures

MODELING AND SIMULATION OF THRESHOLD ANALYSIS FOR PVFS IN WIRELESS SENSOR NETWORKS

A Proposed Paper on Joint Priority Based Approach for Scheduling and Congestion Control in Multipath Multi-hop WSN

Index terms Wireless Mesh networks, Selective forwarding attacks, Route Reply Packet, Fuzzy Logic, Detection threshold.

An Efficient Scheme for Detecting Malicious Nodes in Mobile ad Hoc Networks

Shared Key Based Jamming Mitigation in Wireless Network using Diffie Hellman Elliptic Curve Cryptography

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks

Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach

Secure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks

Detection and Removal of Black Hole Attack in Mobile Ad hoc Network

A METHOD FOR DETECTING FALSE POSITIVE AND FALSE NEGATIVE ATTACKS USING SIMULATION MODELS IN STATISTICAL EN- ROUTE FILTERING BASED WSNS

CMNTS:Catching Malicious Nodes with Trust Support in Wireless Sensor Networks

Detection of Vampire Attack in Wireless Adhoc

ENSF: ENERGY-EFFICIENT NEXT-HOP SELECTION METHOD USING FUZZY LOGIC IN PROBABILISTIC VOTING-BASED FILTERING SCHEME

[Nitnaware *, 5(11): November 2018] ISSN DOI /zenodo Impact Factor

TDMA-Based Detection of Packet Modification Attacks in Wireless Sensor Networks 1

Quadratic Route Factor Estimation Technique for Routing Attack Detection in Wireless Adhoc Networks

A Secure Routing Method for Detecting False Reports and Wormhole Attacks in Wireless Sensor Networks *

CASER Protocol Using DCFN Mechanism in Wireless Sensor Network

Comparative study on dynamic key-management techniques for cluster-based sensor networks

WSN NETWORK ARCHITECTURES AND PROTOCOL STACK

Ms A.Naveena Electronics and Telematics department, GNITS, Hyderabad, India.

Sleep/Wake Aware Local Monitoring (SLAM)

Contending Against Energy Debilitating Attacks in Wireless Ad Hoc Sensor Networks

Quadratic Route Factor Estimation Technique for Routing Attack Detection in Wireless Adhoc Networks

An Energy Efficient Intrusion Detection System in MANET.

ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS

Introduction and Statement of the Problem

Security Issues In Mobile Ad hoc Network Routing Protocols

Selective Forwarding Attacks Detection in WSNs

Cryptography basedauthentication method for DoS attack Detection in Clustered Wireless Sensor Networks

CHAPTER 4 IMPACT OF ROUTING ATTACKS IN LOCATION BASED ROUTING PROTOCOL

An Agent Based Approach for Sinkhole Preventive Route formation in Mobile Network

International Journal of Scientific & Engineering Research, Volume 5, Issue 9, September ISSN

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

Introducing a Routing Protocol Based on Fuzzy Logic in Wireless Sensor Networks

Detection of Wormhole Attacks in Wireless Sensor Networks

Packet Estimation with CBDS Approach to secure MANET

Analysis and Enhancement of RPL under Packet Drop Attacks

Review on Packet Forwarding using AOMDV and LEACH Algorithm for Wireless Networks

Performance Analysis of Heterogeneous Wireless Sensor Network in Environmental Attack

A Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSN

International Journal of Advance Engineering and Research Development

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks

Defending Against Resource Depletion Attacks in Wireless Sensor Networks

Intrusion Detection System for Rushing Attack in MANETs

Energy Efficient Routing with MAX-LEACH Protocol in WSN

Defending MANET against Blackhole Attackusing Modified AODV

Secured Dynamic Source Routing Protocol for Mobile Sensor Networks

International Journal of Advance Research in Computer Science and Management Studies

Multi-metrics based Congestion Control protocol in Wireless Sensor Network

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 2, April-May, 2013 ISSN:

A REVIEW PAPER ON DETECTION AND PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK

DESIGN AND DEVELOPMENT OF MAC LAYER BASED DEFENSE ARCHITECTURE FOR ROQ ATTACKS IN WLAN

Fig. 2: Architecture of sensor node

Security in Mobile Ad-hoc Networks. Wormhole Attacks

A Survey on Clustered-Aggregation Routing Techniques in Wireless Sensor Networks

Issues of Long-Hop and Short-Hop Routing in Mobile Ad Hoc Networks: A Comprehensive Study

Wireless Network Security Spring 2014

Reliable Data Collection in Wireless Sensor Networks

CHAPTER 4 SINGLE LAYER BLACK HOLE ATTACK DETECTION

ABSTRACT I. INTRODUCTION II. PROPOSED FRAMEWORK

Wireless Network Security Spring 2015

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack

Energy Preserving Detection Model for Collaborative Black Hole Attacks in Wireless Sensor Networks

DETECTION OF COOPERATIVE BLACKHOLE ATTACK ON MULTICAST IN MANET

Performance Comparison of Energy Efficient Clustering Protocol in Heterogeneous Wireless Sensor Network

Secure and Efficient Routing Mechanism in Mobile Ad-Hoc Networks

A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS

Implementation: Detection of Blackhole Mechanism on MANET

Performance Evaluation of Various Routing Protocols in MANET

Detection of Malicious Node in Wireless Sensor Network under Byzantine Attack

Towards Securing MintRoute in Wireless Sensor Networks

LIGHTWEIGHT KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS

Impulse Radio Ultra Wide Band Based Mobile Adhoc Network Routing Performance Analysis

Mobile Agent Driven Time Synchronized Energy Efficient WSN

Presented by: Mariam Ahmed Moustafa Faculty of Engineering, Alexandria University, Egypt. 24 March 2016 RIPE NCC / MENOG 16

Black Hole Detection Scheme in WSN for Mobile Replica Node Detection and Rejection

A Robust Trust Aware Secure Intrusion Detection for MANETs

A Hybrid Intrusion Detection System Of Cluster Based Wireless Sensor Networks

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

Real-time and Reliable Video Transport Protocol (RRVTP) for Visual Wireless Sensor Networks (VSNs)

Time Synchronization in Wireless Sensor Networks: CCTS

Webpage: Volume 4, Issue VI, June 2016 ISSN

Optimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol Prerana A. Chaudhari 1 Vanaraj B.

Transcription:

Chapter 55 Elimination of Black Hole and False Data Injection Attacks in Wireless Sensor Networks R. Tanuja, M. K. Rekha, S. H. Manjula, K. R. Venugopal, S. S. Iyengar and L. M. Patnaik Abstract Wireless Sensor Networks (WSNs) are currently being used in a wide range of applications that demand high security requirements. Since sensor network is highly resource constrained, providing security becomes a challenging issue. Attacks must be detected and eliminated from the network as early as possible to enhance the rate of successful transactions. In this paper, we propose to eliminate Black Hole and False Data Injection attacks initiated by the compromised inside nodes and outside malicious nodes respectively using a new acknowledge scheme with low overhead. Simulation results show that our scheme can successfully identify and eliminate 100 % black hole nodes and ensures more than 99 % packet delivery with increased network traffic Keywords Security Sink acknowledgement Negative acknowledgement Black hole attack Packet delivery rate R. Tanuja (&) M. K. Rekha S. H. Manjula K. R. Venugopal Department of Computer Science and Engineering, University Visvesvaraya College of Engineering, Bangalore University, Bangalore, e-mail: r_tanuja@yahoo.com S. S. Iyengar Florida International University, USA L. M. Patnaik Indian Institute of Science, Bangalore, V. V. Das (ed.), Proceedings of the Third International Conference on Trends in Information, Telecommunication and Computing, Lecture Notes in Electrical Engineering 150, DOI: 10.1007/978-1-4614-3363-7_55, Ó Springer Science+Business Media New York 2013 475

476 R. Tanuja et al. 55.1 Introduction In Wireless Sensor Network the sensor nodes are usually deployed in harsh, unattended, remote areas and have limited sensing, computation and communication capabilities. The sensor networks are often exposed to various malicious attacks and the conventional defense mechanisms are not suitable because of its highly resource constrained nature. The security mechanisms should be strong enough and undoubtedly energy efficient to prevent attacks by malicious nodes to reduce the wastage of sensor resources and to provide authentication and integrity to sensed data. This paper proposes to detect and eliminate black hole attack which is a simple form of selective forwarding attack, where a malicious node may drop all the packets passing through it without forwarding to the sink node. We consider false data injection attack from outside malicious nodes i.e. where an attacker injects false data reports into the network and depletes the energy of the forwarding nodes. 55.2 Related Works Zia and Zomaya [1] have analyzed Attacks, countermeasures and threat models in different layers of WSNs. Arif et al. [2] have designed Virtual Energy-Based Encryption and Keying (VEBEK) scheme, resulting in reduced number of overhead messages thereby increasing the lifetime of WSNs. The intermediate nodes can verify the authenticity and integrity of the incoming packets using a predicted value of the key generated by the senders virtual energy, without any need for specific rekeying messages. This work does not address insider attacks and dynamic paths. Misra et al. [3] have proposed an efficient technique, BAMBi, to mitigate the adverse effects of black hole attacks in WSNs. Bysani and Turuk [4] have discussed about selective forwarding attack, its types and some mitigation schemes to defend such attacks. Kaplantzis et al. [5] have developed a centralized Intrusion Detection Scheme (IDS) based on Support Vector Machines and sliding windows. It uses only two features to detect selective forwarding and black hole attacks. Ba et al. [6] have discussed a deterministic key management scheme, DKS-LEACH, to secure LEACH protocol against malicious attacks. 55.3 Problem Definition and Algorithm Sensor Networks are deployed in harsh, unattended remote areas that are susceptible to various inside compromised node attacks (Black Hole) and outside malicious node attack (False Data Injection attacks). Node based authentication using cryptographic keys is ineffective in addressing insider attacks. The outside

55 Elimination of Black Hole and False Data Injection 477 malicious node false data injection attacks needs to be detected and eliminated. The objectives are: (i) To detect and eliminate black hole attack using a new acknowledgement scheme with low overhead. (ii) To ensure authenticity and integrity of transmitted packets by preventing false data injection by outside malicious nodes. 55.3.1 Algorithm The algorithm for detection and elimination of Black Hole and False Data Injection attack consists of six steps: (i) Keying process: This process involves dynamic key generation. When a node senses some data, it must authenticate the sensed data before transmitting to the sink node. Here we have used virtual energy-based keying process [2]. The dynamic key is generated as a function of current virtual energy of the sensor node. The key for first packet is generated as a function of initial virtual energy and initial vector of sensor node. Later keys are generated based on current virtual energy and previous key of the sensor. The dynamic key obtained from keying process is fed to RC4 algorithm to get permutation code Pc. The permutation is mapped to a set of actions to be taken on the message. Eg., Simple operations like shift, interleaving, 1 s complement etc. The resultant packet format is: {ID, {ID, TYPE, DATA, event ID}Pc}. (ii) DownStream Process: Downstream represents direction towards sink node. When a source node sense some event, it appends nodeid, type and event ID along with the sensed data and encode the whole data using virtual energybased encryption mechanism [2]. Then forward the packet along with its plaintextid to next hop and wait for a pre-defined time to receive sink acknowledgement from its downstream neighbor. It stores the event ID in its cache until it receives ACK_ SINK. (iii) Adressing False Data Injection attacks: When a forwarder node receives a packet, it authenticates the packet by performing virtual energy-based decoding and compares the plaintextid with decodedid. Malicious packets inserted by outsiders (False Data Injection attack) will be dropped immediately. The authentic packets will be forwarded to next downstream node along the path to the sink node after doing encoding operation. After forwarding, it will store the event ID and upstream nodeid in its own cache until it receives ACK SINK. This process continues up to the sink node. Table 55.1 shows the actions taking place in the downstream direction and elimination of False Data Injection. (iv) Upstream Process: Upstream refers direction towards source node. After verifying the received packet, the sink node will send an acknowledgement back to the source node through intermediate nodes. The acknowledgement, ACK SINK consists of event ID and the upstream nodeid. If a node receives

478 R. Tanuja et al. Table 55.1 Algorithm for downstream process of BHnFDIA Let t= predefined time, msg pc =message encrypted using pc, FN=Forwarder node S=source ; begin if ( node v == S and S sense some event) then msg = append (event_id, nodeid, type, sensed_data) key = DynamicKey(virtual_energy, plaintextid) pc = RC4 (key, plaintextid) msg pc = encode (msg,pc) pkt = append ( plaintextid, msg pc ) forward pkt to next hop wait(t) cache(event_id) if ( node v == FN) then receive pkt key = DynamicKey(virtual_energy, plaintextid) pc = RC4 (key, plaintextid) msgid = decode (msg,pc) x = compare(msgid,plaintextid) if (x == true) then reencode and forward pkt to next hop wait(t) cache(event_id,upstream_nodeid) else find key by decrementing virtual_energy threshold times if failed drop packet end the acknowledgement from sink within the time interval, it will compare the event ID field in ACK SINK with the one stored in its own cache. If it matches, the corresponding transmission will be considered as successful and removes the corresponding entry from its own cache and forwards ACK SINK to its upstream node. This process will continue up to the source node. (v) Adressing Communication Errors: When a packet or ACK traverses through the network, they can be lost due to some communication error. A node C will transmit a packet threshold number of times and wait for acknowledgements before considering the downstream node D as malicious. If node C fails to receive ACK SINK, the downstream node D is considered as malicious or black hole.

55 Elimination of Black Hole and False Data Injection 479 Table 55.2 Algorithm for upstream process of BHnFDIA (i) Upstream Process begin if ( node v == Sink) then verify pkt send ACK_SINK in upstream direction if ( node v == FN) then receive ACK_SINK if ( ACK_SINK event_id == cache event_id ) then remove corresponding entry form cache forward ACK_SINK in upstream direction end (ii) Elimination of BH attack Let j = 0, threshold = 5, SN = suspected node begin if ( node v == predecessor (SN) in downstream direction ) then wait for ACK_SINK till time-out if time out occurs send NACK towards S, increment j wait for ACK_SINK for next packet if j exceeds threshold then mark SN as BH redirect successive packets to another route broadcast ALERT_INFO among neighbours end (vi) Addressing Black Hole Attack: When a packet traverses from source to sink through multiple hops, if a malicious node acts as a black hole, it will drop all the incoming packets without forwarding to sink node [4]. No acknowledgement is be sent to upstream node. After timeout, the node just before the attacker in the downstream direction marks the malicious node and sends a negative acknowledgement, NACK towards the source node. The successive packets received at the node just before the black hole in the downstream direction will be re-directed using another route to the sink node. It will broadcast an ALERT INFO message to all its neighbours so that they can avoid this particular node from the routes. Table 55.2 gives the steps involved in downstream process and elimination of Black Hole attack.

480 R. Tanuja et al. Fig. 55.1 Successful delivery of packets 100 Packet Delivery Rate (in %) 95 90 85 200 pkts 300 pkts 400 pkts 500 pkts 80 0 1 2 3 4 Number of Compromised Nodes 55.4 Implementation and Performance Evaluation We evaluate the performance of our scheme by simulation using MATLAB and compare it with other existing schemes in terms of packet delivery rate and filtering efficiency. Nodes are randomly deployed into 100 9 100 m 2. All sensor nodes are assumed to have same communication ranges. The routing algorithm is deployed on unreliable MAC protocol and there may be ACK or packet drops in the network. The network also experience black holes. Outside attackers may have spoofed valid node identifier. The inside attacker may have all the valid cryptographic details of the node. Packet Delivery Rate: The packet delivery rate is calculated as the ratio between the number of packets that are sent by the source node and the number of packets that are received by the sink node. Figure 55.1 shows the results for successful packet delivery rate of our algorithm without enabling re-transmissions. As can be seen from the Fig. 55.1, packet delivery rate increases with increase in the packet count. This is because only a small threshold number of packets, say 5, need to be dropped in the process of detecting a single black hole. After dropping threshold packets, the upstream node of black hole will re-route the successive packets and informs neighbor nodes to avoid black hole through ALERT_INFO message. The downward slope is obviously due to the increase in black holes. As the number of compromised nodes increase, more packets will be dropped until all the black holes are detected. Comparison of Packet Delivery Rate: Figure 55.2 compares the packet delivery rate of BHnFDIA with previous work VEBEK schemes in the presence

55 Elimination of Black Hole and False Data Injection 481 Fig. 55.2 Comparison of packet delivery 100 Packet Delivery Rate (in %) 80 60 40 20 BHnFDIA VEBEK 0 0 1 2 3 4 Number of Compromised Nodes and absence of black holes. When there are no black holes, both schemes have almost same packet delivery rate. But when black holes are present, our scheme has 30 95 % more successful packet delivery. The energy consumption for keying process being same for both, but with ACK_SINK packet our scheme provides more security to address insider attacks As authentication is performed at every hop, malicious data inserted by outside attackers will be dropped within one hop itself. Hence the filtering efficiency is almost 100 %, irrespective of the number of malicious packets. 55.5 Conclusions In WSNs for several applications, security is a major concern. In this paper, we propose algorithm to overcome Black Hole and False Data Injection Attack (BHnFDIA) in WSNs. It provides a new acknowledgement based detection scheme which helps to simplify the elimination of black holes and guarantees successful delivery of packets to destination. Our algorithm can eliminate false data injection by outside malicious nodes. Simulation results show that our algorithm can successfully identify and eliminate 100 % black hole nodes. Since authentication is performed at every hop malicious packets are immediately removed with 100 % filtering efficiency. Our scheme ensures more than 99 % packet delivery with increased network traffic. Our future work will incorporate other insider attacks without adding much communication overheads.

482 R. Tanuja et al. References 1. Tanveer Z, Albert Z (2006) Security issues in wireless sensor networks. In: Proceedings international conference systems and networks communication (ICSNC 06), Oct 2006 2. Uluagac AS, Beyah RA, Li Y, Copeland JA (2010) VEBEK: virtual energy-based encryption and keying for wireless sensor networks. IEEE T Mobile Comput 9(7):994 1007 3. Misra S, Bhattarai K, Guoliang X (2011) BAMBi: blackhole attacks mitigation with multiple base stations in wireless sensor networks. In: Proceedings international conference communications (ICC 2011), July 2011 4. Bysani LK, Turuk AK (2011) A survey on selective forwarding attack in wireless sensor networks. In: Proceedings international conference on devices and communications (ICDe- Com), Feb 2011 5. Kaplantzis S, Shilton A, Mani N, Sekercioglu YA (2007) Detecting selective forwarding attacks in wireless sensor networks using support vector machines. In: Proceedings third international conference on intelligent sensors, sensor networks and information, pp 335 340, Dec 2007 6. Ba M, Niang I, Gueye B, Noel T (2010) A deterministic key management scheme for securing cluster-based sensor networks. In: Proceedings 2010 IEEE/IFIP international conference on embedded and ubiquitous computing, pp 422 427, Dec 2010