Selective Forwarding Attacks Detection in WSNs

Similar documents
A METHOD FOR DETECTING FALSE POSITIVE AND FALSE NEGATIVE ATTACKS USING SIMULATION MODELS IN STATISTICAL EN- ROUTE FILTERING BASED WSNS

Security Mechanisms for Selective Forwarding Attack in Wireless Sensor Networks: Review and Analysis

Security Issues In Mobile Ad hoc Network Routing Protocols

Security of Mobile Ad Hoc and Wireless Sensor Networks

Detection of Wormhole Attacks in Wireless Sensor Networks

SELECTING VOTES FOR ENERGY EFFICIENCY IN PROBABILISTIC VOTING-BASED FILTERING IN WIRELESS SENSOR NETWORKS USING FUZZY LOGIC

Performance Analysis of Heterogeneous Wireless Sensor Network in Environmental Attack

Energy and Memory Efficient Clone Detection in Wireless Sensor Networks

Index terms Wireless Mesh networks, Selective forwarding attacks, Route Reply Packet, Fuzzy Logic, Detection threshold.

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

A Secure Routing Method for Detecting False Reports and Wormhole Attacks in Wireless Sensor Networks *

A REVIEW PAPER ON DETECTION AND PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK

Outline. CS5984 Mobile Computing. Dr. Ayman Abdel-Hamid, CS5984. Wireless Sensor Networks 1/2. Wireless Sensor Networks 2/2

Communication Layer, Attacks and Security Mechanisms of Wireless Sensor Network

A Scalable Secured Approach in Wireless Sensor Networks

DETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM

Dynamic Key Ring Update Mechanism for Mobile Wireless Sensor Networks

Presented by: Mariam Ahmed Moustafa Faculty of Engineering, Alexandria University, Egypt. 24 March 2016 RIPE NCC / MENOG 16

Lecture 8 Wireless Sensor Networks: Overview

CASER Protocol Using DCFN Mechanism in Wireless Sensor Network

Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN

Energy-Efficient Security Threshold Determination Method for the Enhancement of Interleaved Hop-By-Hop Authentication

Intrusion Detection System in Wireless Sensor Networks

A NOVEL APPROACH FOR DETECTING COMPROMISED NODES IN WIRELESS SENSOR NETWORKS

Sleep/Wake Aware Local Monitoring (SLAM)

A Survey On Attacks, Challenges and Security Mechanisms In Wireless Sensor Network

Catching BlackHole Attacks in Wireless Sensor Networks

Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures

ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine

Abstract. 1. Introduction

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

MODELING AND SIMULATION OF THRESHOLD ANALYSIS FOR PVFS IN WIRELESS SENSOR NETWORKS

Link-Based Wormhole Detection in Wireless Sensor Networks

Saving Wireless Networks By Detecting, And Designing Efficient From Masquerade Attacks

An Energy Efficient Intrusion Detection System in MANET.

PEERLESS JAMMING ATTACKS AND NETWORK FORTIFICATION POLICIES IN WIRELESS SENSOR NETWORKS

Detecting Selective Forwarding Attacks in Wireless Sensor Networks

TDMA-Based Detection of Packet Modification Attacks in Wireless Sensor Networks 1

A Pigeon Agents based Analytical Model to Optimize Communication in Delay Tolerant Network

Intrusion Detection for Routing Attacks in Sensor Networks

ENSF: ENERGY-EFFICIENT NEXT-HOP SELECTION METHOD USING FUZZY LOGIC IN PROBABILISTIC VOTING-BASED FILTERING SCHEME

International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: Issue 2, Volume 2 (February 2015)

Routing Scheme in Energy efficient based Protocols for Wireless Sensor Networks

Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN

Mobile Agent Driven Time Synchronized Energy Efficient WSN

Defending Against Resource Depletion Attacks in Wireless Sensor Networks

Analysis of Worm-Hole Attack in MANET using AODV Routing Protocol

Research in the Network Management Laboratory

CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION

Regression Based Cluster Formation for Enhancement of Lifetime of WSN

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack

International Journal of Scientific & Engineering Research, Volume 5, Issue 9, September ISSN

Int. J. Advanced Networking and Applications Volume: 04 Issue: 04 Pages: (2013) ISSN :

Chapter 55 Elimination of Black Hole and False Data Injection Attacks in Wireless Sensor Networks

Maximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS

Random Key Pre-distribution Schemes using Multi-Path in Wireless Sensor Networks

New Active Caching Method to Guarantee Desired Communication Reliability in Wireless Sensor Networks

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks

E±cient Detection Of Compromised Nodes In A Wireless Sensor Network

A Distributed Cross-Layer Compromise Detection Mechanism for Wireless Sensor Networks

Wireless Sensor Networks --- Concepts and Challenges

Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs

A REVIEW ON LEACH-BASED HIERARCHICAL ROUTING PROTOCOLS IN WIRELESS SENSOR NETWORK

Evaluation of Communication Overheads in Wireless Sensor Networks

Contending Against Energy Debilitating Attacks in Wireless Ad Hoc Sensor Networks

DETECTING WORMHOLE ATTACKS IN WIRELESS SENSOR NETWORKS

Sybil Attack Detection and Prevention Using AODV in VANET

Wireless Sensor Networks --- Concepts and Challenges

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Shared Key Based Jamming Mitigation in Wireless Network using Diffie Hellman Elliptic Curve Cryptography

Packet Estimation with CBDS Approach to secure MANET

Secured Routing Protocols for Wireless & ATM Networks : An Analysis

Reservation Packet Medium Access Control for Wireless Sensor Networks

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu

Energy Efficient Routing Using Sleep Scheduling and Clustering Approach for Wireless Sensor Network

References. The vision of ambient intelligence. The missing component...

Subject: Adhoc Networks

Detection and Localization of Multiple Spoofing Attackers in Wireless Networks Using Data Mining Techniques

An Efficient Secured Scheme for Detecting Source of Packet Drop and Forgery Attack in WSN

An Introduction to Cyber-Physical Systems INF5910/INF9910

Energy Efficient Data Gathering For Throughput Maximization with Multicast Protocol In Wireless Sensor Networks

Performance Analysis of AODV under Worm Hole Attack 1 S. Rama Devi, 2 K.Mamini, 3 Y.Bhargavi 1 Assistant Professor, 1, 2, 3 Department of IT 1, 2, 3

A Novel Approach for Preventing Black-Hole Attack in MANETs Rashmi 1, Ameeta Seehra 2

AN ENHANCED SECURE ROUTING ALGORITHM AGAINST SINKHOLE ATTACK IN WIRELESS SENSOR NETWORKS

Balanced Load Sharing Protocol for Wireless Sensor Networks

International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 4, Jul-Aug 2014

Secure cell relay routing protocol for sensor networks

Detection and Removal of Vampire Attack in Wireless Sensor Network

1.1 Wireless Sensor Networks

International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET)

Review:- EN-efficient Approaches for MANETs in Rushing Attacks

Maximum Coverage Range based Sensor Node Selection Approach to Optimize in WSN

Towards Securing MintRoute in Wireless Sensor Networks

Wireless Sensor Networks: Security Issues, Challenges and Solutions

INSENS: Intrusion-tolerant routing for wireless sensor networks. By: Jing Deng, Richard Han, and Shivakant Mishra

Key establishment in sensor networks

Mitigating Malicious Activities by Providing New Acknowledgment Approach

Efficient Detection and Elimination of Vampire Attacks in Wireless Ad-Hoc Sensor Networks

Transcription:

Selective Forwarding Attacks Detection in WSNs Naser M. Alajmi and Khaled M. Elleithy Computer Science and Engineering Department, University of Bridgeport, Bridgeport, CT, USA nalajmi@my.bridgeport.edu, elleithy@my.bridgeport.edu Abstract Wireless sensor networks (WSNs) are susceptible to the most security attacks. Limited capacity of sensor nodes accounts for the security attacks on WSNs. Applications such as military surveillance, traffic surveillance, healthcare, and environmental monitoring are impacted by security attacks. Hence, researchers have created various types of detection approaches against such attacks. There are also some limitations such as reliability, energy efficiency, and scalability, which affect sensor nodes. These limitations mostly affect the security of WSNs. Selective forwarding attack is an example of an attack that is not easily detected particularly in the networks layer. In this type of attack, malicious nodes function in the same way as other nodes in the networks. However, it tries to drops the sensitive packets prior to transferring the packet to other sensor node. In this paper, we propose an approach that protects data from selective forwarding attacks. The approach keeps the data transmission moving safely between sensor nodes and at the same time detects malicious nodes. Keywords Wireless Sensor Networks (WSNs) and Selective Forwarding Attacks. Introduction Wireless sensor networks contain numerous sensors. These sensors communicate with huge numbers of small nodes by using radio links. Sensor networks consist of the source and base station. A sensor is composed of four basic units, which are sensing unit, processing, transceiver, and power 1. The task of sensor nodes is collecting the information that is needed by smart environments. These environments are for instance: home, transportation system, military, healthcare, buildings etc. The study of the Wireless Sensor Network is crucial in computer science and engineering and has an impact on the community, in economic, and industrialization. Nowadays, many distributed sensor networks can be deployed and have a self-organizing ability. Computational ability needs the sensor nodes, which are not overloaded with too many complicated functions. WSNs work in open networks with the limited resources of nodes and obstacles. Thus, they are prone to many types of attacks. The security of WSNs has been studied over the past few years. The most traditional threats include eavesdropping, nodes being compromised, interruptions, modified or injected malicious packets, compromised privacy and the denial of service attacks 2. Networks have different applications that comprise of several levels of monitoring, tracking, and controlling. Therefore, applications are employed for specific purposes. In military applications, sensor nodes include monitoring, battlefield surveillance, and object tracking. The battlefield 1

monitors utilized in military operations have prompted the development of WSNs. In medical applications, sensors assist in patient diagnosis and monitoring. Applications are deployed to monitor an area and then react when a sensitive factor is recorded 3. There are also some potential applications such as environmental monitoring, factory instrumentation and inventory tracking. Selective Forwarding Attack There are several types of attacks that exist in WSNs. Most security attacks are located in the network layer. Furthermore, a sensor node may derive benefits from multi-hop by simply refusing to route packets. It can be performed frequently with the net result. Malicious nodes will not be incapable to change or modify the message if the neighboring node marks a route 4. The Network layer receives varieties of attacks. For example, injecting the path between sensor nodes. Selective forwarding attack is one of the insider attacks. A more subtle form of this attack is when an adversary selectively forwards packets. The adversaries are able to create routing loops that attract or repel network traffic. They also can be extend or shorten source routers, generate false messages, and attempt to drop the sensitive information. The selective forwarding attack is not easy to detect particularly when compromised nodes drop packets selectively. The dropped packets come from one node or a set of nodes. A malicious node can refuse to forward the messages or drop packets randomly. For this reason, the base station may not receive the entire message 5, 6. Related Works Yu and Xiao 6 proposed an approach based on lightweight security to detect a selective forwarding attack in the environment of sensor networks. The approach utilized a multi-hop acknowledgment to launch alarms by obtaining responses from the nodes that are located in the middle of paths. Authors assumed the approach could identify malicious sensor nodes. The aim of the detection attack is to send an alarm when a malicious node is discovered, which indicates a selective forwarding attack. The authors noted that the detection accuracy of their approach exceeds 95% with an error rate of 15%. Yu and Xiao employed two detection processes in the scheme: a downstream process (the direction on the way to the base station) and an upstream process (the direction on the way to the source node). In the upstream process, a report packet is created and sent to the base station hop by hop when nodes detect a malicious node. Therefore, the base station would receive the alarm packet and forward multiple hops that are produced by the node. An acknowledgement packet and an alert packet will drain the energy during detection. The identification of suspect nodes is reported via an intermediate node. First, Xiao, Yu, and Gao 7 proposed a checkpoint-based method. In this approach, a node is randomly selected as the checkpoint to send an acknowledgement message for detecting the adversary. It is a mechanism used to identify suspect nodes in a selective forwarding attack. They have attempted to improve the technique by detecting an abnormal packet in sensor networks. They assumed that any compromised nodes could not create alert packets with the aim of maliciously prosecuting other nodes. After collecting evidence to determine whether the node is a malicious node, the source nodes determine the position of the suspect node according to the location. However, it is no 2

guarantee for reliable transmission of messages even though the adversary is positioned by acknowledgement. Tran Hoang and Eui-Nam 8 proposed an approach against selective forwarding attacks that consists of a lightweight detection mechanism. The detection is a centralized cluster, which utilized the two-hop neighborhood node information and overhearing technique. It is dependent on the broadcast nature of sensor communication and the high density of sensors. Each sensor node is provided with a detection module that is constructed on an application layer. Sensor node sets routing rules and two-hop neighbor knowledge to generate an alert packet. Hoang and Nam suggested that the two routing rules make the monitoring system more suitable. Thus, the first rule is to determine if the destination node forwards the packet along the path to the sink. It generates an alert packet with the malicious factor α to the sender/source node. The second rule governs that the monitor node waits and detects the packet that was already forwarded along the path to the sink. It verifies the two-hop neighbor knowledge to assess whether the destination node is on the right path to the sink. If not, it generates an alert packet with the malicious factor β to the sender/source node. Proposed System Figure 1. Sensor nodes during selective forwarding attacks In wireless sensor networks, several nodes transfer sensor readings to the base station in order to process data. Military bases are important in using sensor networks to explore enemy forces. Sensor nodes have limited sensing and computation. There is also communication ability. Sensors gather data when they detect abnormal movement of enemy forces such as warplanes, war tanks movement in battlefields etc. Data transmission is sent to the base station using routers. So, the attacker compromises nodes to attack the networks (figure 1). Malicious nodes reject to send the entire message. Thus, it drops the important information and keeps the remaining message to forward to the next node. Because the military applications have sensitive information, selective forwarding attacks damage the transmission message between the source and base station as well as between sensor nodes. In networks, the malicious node tries to create obstacles during the transfer of packets in the networks. These obstacles include forwarding certain messages to different paths, generating an 3

inaccurate route in the network and also, attempting to delay the transfer of packets between nodes. Therefore, selective forwarding detection approach locates a secure route during data transmission. In this section, we introduce our assumptions and detection approach. Sensor networks are susceptible to several types of attacks. Figure 2. Clusters WSNs composed of base station and sensor nodes. Sensor nodes are grouped into clusters. Each cluster has several nodes (figure2). A packet is transferred via a source node to the base station using a route. During the transmission any malicious node drop a packet, the neighbor nodes work as monitoring and detect the packet that drop by the adversary. In our approach, any node located in an intermediate is responsible to detect the malicious nodes. Figure 3. Example of Selective Forwarding Attack The selective forwarding attack in example of figure 3 may be happened between sensor nodes. Thus, node A transfers the packets to node B and then node B stops forwarding the packets to node C. As a result node B may forward packets to malicious node. Therefore, packets will not arrive to the base station. A. Assumptions The network layer in WSNs is threatened by some attacks such as wormhole, sinkhole, and many types of attacks. Wireless sensor networks are very difficult for the transmission. In order to construct a simple solution to detect the selective forwarding attack, we make assumptions for our approach detection that are suitable in the sensor networks. These assumptions are as follow: 4

Secure communication should be part of the networks. Malicious nodes should not drop any packet prior to launch the selective forwarding attack. The adversary cannot compromise a sensor node during the deployment. The authentication broadcast protocols implemented for each sensor node. B. Analysis Figure 2. Detection layers-redrawn [11] Though the network layer in WSNs is threatened by many security attacks, this paper only focuses on the selective forwarding attack. There are some disadvantages of selective forwarding attacks for instance, malicious nodes may refuse to forward certain messages or sensitive information and drop them, and also the adversary overhearing movement between nodes might be capable to simulate selective forwarding by jamming. Consequently, we design a multi layers approach, which includes three security layers. The first layer is data receiving. In this layer, the important information is filtered and stored. The information includes message fields that are beneficial on the rules processing. The second layer is rules processing. In this section, rules must be applied to the stored data before the sensor nodes deployed. The message can be rejected or refused. In addition, no rules will be applied to the message since it fails. The third layer is detection. The selective forwarding detection approach involves identifying the malicious nodes and chooses a secure route to transfer data between the source and base station. Furthermore, the multi layer approach considers reliability, energy efficiency, and scalability. It assumes that detection accuracy is high even when the radio condition is poor. C. Simulation In this section, we used NS2 simulation to estimate the performance of the multi layer detection approach. We have pointed on malicious detection rate and packet delivery ratio. In our simulation, 200 sensor nodes are deployed in an area network size 500 * 500 square meters. Hence, each node has a 35 meters transmission range and sensing range of node is 30 meters. Consequently, the communication overheads are decreased. Figure 4 shows the performance of our approach for the packet delivery ratio. Thus, the malicious nodes are appearing. During the increasing malicious nodes drop packet, our approach can achieve packet delivery ratio under the overflow of attack. Therefore, it can be accomplished up to 40% malicious nodes. The packet delivery ratio is decreased rapidly while the malicious 5

nodes increase. The effect of the malicious increase of packet delivery ratio, it takes time to defeat and take them away. The approach in figure 5 is a perfect detection rate. It is more than 98% as long as the noise error is 2-4%, and the malicious nodes are under 12%. In fact, the noise error rate increases while the detection of malicious nodes is failed. Losing packet is happened when the collision ratio and malicious nodes increased. Sometime the radio condition is poor cause the communication in WSNs. As a result, the detection rate of the malicious nodes will be impacted. We observe that our approach is more efficient when in fact the number of detection nodes increased. The probability of missed detection occurs when collision is available in the network at the time by monitoring the node attempting to send an alert packet. Figure 4. Packet delivery ratio under malicious attacks in WSN Figure 5. Detection of malicious nodes in the WSN 6

Conclusion The security of WSNs has become increasingly concerning. The use of wireless sensor networks is increasingly employed in environmental, commercial, health and military applications. The security of packets and the transmission period is fundamentally necessary in WSNs. The selective forwarding attack poses severe threats to wireless networks. In this paper, we propose an approach in detecting this type of attack in WSNs. Monitor sensor nodes detect selective forwarding attacks using neighbor nodes. Our approach is an efficient way of detecting attacks. We also take into consideration reliability, energy efficiency, and scalability. Analysis and simulation show that our approach is more effective when the numbers of detection nodes are increased. References [1] I. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, Wirelss sensor networks: A survey, Computer Networks, 38(4):393-422, 2002. [2] A. Perrig, J. Stankovic, and D. Wagner, Security in Wireless Sensor Networks, Communications of the ACM, 47(6):53 57, June 2004. [3] David Martins, and Herve Guyennet, Wireless Sensor Network Attacks and Security Mechanisms: A Short Survey, 2010 IEEE. [4] J. P. Walters, et al., "Wireless sensor network security: A survey," Security in distributed, grid, mobile, and pervasive computing, p. 367, 2007. [5] Karlof, C. and Wagner, D., Secure routing in wireless sensor networks: Attacks and countermeasures, Elsevier s Ad Hoc Network Journal, Special Issue on Sensor Network Applications and Protocols, September 2003. [6] Bo Yu and Bin Xiao, Detecting Selective Forwarding Attacks in Wireless Sensor Networks, In Parallel and Distributed Processing Symposiun, 2007. ISSNIP 2006, 20 th International, page 8 pp., 2006. [7] Bin Xiao, Bo Yu, and Chuanshan Gao, CHEMAS: Identify Suspect Nodes in Selective Forwarding Attacks, In Parallel and Distributed Processing Symposiun, 2007. [8] Tran Hoang Hai and Eui-Nam Huh, Detecting Selective Forwarding Attacks in Wireless Sensor Networks Using Two-hops Neighbor Knowledge Seventh IEEE Internation Symposium on Network Computing and Applications, 2008, pp.325-331. [9] A. da Silva, M. Martins, B. Rocha, A. Loureiro, L. Ruiz, and H. Wong, Decentralized intrusion detection in wireless sensor networks, international workshop on Quality of service & security in wireless and mobile networks, 2005. 7

Naser Alajmi Mr. Naser Alajmi is pursuing towards his Ph.D., Department of Computer Science and engineering at the University of Bridgeport, Bridgeport, CT. Naser s interests are in Wireless Sensor Network (WSN), Wireless Sensor Network Security, and Network Security Khaled Elleithy Dr. Elleithy is the Associate Vice President of Graduate Studies and Research at the University of Bridgeport. He is a professor of Computer Science and Engineering. He has research interests are in the areas of wireless sensor networks, mobile communications, network security, quantum computing, and formal approaches for design and verification. He has published more than three hundred research papers in international journals and conferences in his areas of expertise. Dr. Elleithy has more than 25 years of teaching experience. His teaching evaluations are distinguished in all the universities he joined. He supervised hundreds of senior projects, MS theses and Ph.D. dissertations. He supervised several Ph.D. students. He developed and introduced many new undergraduate/graduate courses. He also developed new teaching / research laboratories in his area of expertise. Dr. Elleithy is the editor or co-editor for 12 books by Springer. He is a member of technical program committees of many international conferences as recognition of his research qualifications. He served as a guest editor for several International Journals. He was the chairman for the International Conference on Industrial Electronics, Technology & Automation, IETA 2001, 19-21 December 2001, Cairo Egypt. Also, he is the General Chair of the 2005-2013 International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering virtual conferences. 8