TDMA-Based Detection of Packet Modification Attacks in Wireless Sensor Networks 1

Similar documents
Energy-Efficient Security Threshold Determination Method for the Enhancement of Interleaved Hop-By-Hop Authentication

Secure Data Collection for Wireless Sensor Networks

ENSF: ENERGY-EFFICIENT NEXT-HOP SELECTION METHOD USING FUZZY LOGIC IN PROBABILISTIC VOTING-BASED FILTERING SCHEME

A METHOD FOR DETECTING FALSE POSITIVE AND FALSE NEGATIVE ATTACKS USING SIMULATION MODELS IN STATISTICAL EN- ROUTE FILTERING BASED WSNS

A Fuzzy System based Approach to Extend Network Lifetime for En-Route Filtering Schemes in WSNs

SELECTING VOTES FOR ENERGY EFFICIENCY IN PROBABILISTIC VOTING-BASED FILTERING IN WIRELESS SENSOR NETWORKS USING FUZZY LOGIC

Catching BlackHole Attacks in Wireless Sensor Networks

A Secure Routing Method for Detecting False Reports and Wormhole Attacks in Wireless Sensor Networks *

Use of Symmetric And Asymmetric Cryptography in False Report Filtering in Sensor Networks

ENERGY-EFFICIENT PATH CONFIGURATION METHOD FOR DEF IN WSNS

Hop-by-Hop Cooperative Detection of Selective Forwarding Attacks in Energy Harvesting Wireless Sensor Networks

MODELING AND SIMULATION OF THRESHOLD ANALYSIS FOR PVFS IN WIRELESS SENSOR NETWORKS

An Enhanced Scheme to Defend against False-Endorsement-Based DoS Attacks in WSNs

Security Mechanisms for Selective Forwarding Attack in Wireless Sensor Networks: Review and Analysis

ENERGY-EFFICIENT TRUST SYSTEM THROUGH WATCHDOG OPTIMIZATION

E±cient Detection Of Compromised Nodes In A Wireless Sensor Network

Clustering Based Certificate Revocation Scheme for Malicious Nodes in MANET

Path Renewal Method in Filtering Based Wireless Sensor Networks

Chapter 55 Elimination of Black Hole and False Data Injection Attacks in Wireless Sensor Networks

Routing Scheme in Energy efficient based Protocols for Wireless Sensor Networks

CAODV Free Blackhole Attack in Ad Hoc Networks

Duplicate Node Detection Using Distributed Protocols (3D-NUP) in WSN

A Feedback-based Multipath Approach for Secure Data Collection in. Wireless Sensor Network.

Detection of Node Clone in Wireless Sensor Networks

Selective Forwarding Attacks Detection in WSNs

Detection and Localization of Multiple Spoofing using GADE and IDOL in WSN. U.Kavitha 1.

WIRELESS sensor networks have received a lot of attention

Detection of Node Replication Attacks in Mobile Sensor Networks Using Localized Algorithms

A New Approach for Key Forwarding Scheme in WSN Using Mobile Sink

Black Hole Detection Scheme in WSN for Mobile Replica Node Detection and Rejection

An Efficient Secured Scheme for Detecting Source of Packet Drop and Forgery Attack in WSN

Detection of Sybil Attack in Wireless Sensor Network

Node Clone Detection in Wireless Sensor Networks

Design and Implementation of TARF: A Trust Aware Routing Framework WSN s

Time Synchronization in Wireless Sensor Networks: CCTS

EFFICIENT CLONE NODE DETECTION AND ELIMINATION IN WIRELESS SENSOR NETWORKS

A Survey On Attacks, Challenges and Security Mechanisms In Wireless Sensor Network

Detecting Spam Zombies By Monitoring Outgoing Messages

Sleep/Wake Aware Local Monitoring (SLAM)

An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks

PDoS-Resilient Push Protocols for Sensor Networks

Node Clone Detection in Wireless Sensor Networks

WSN LIFETIME EXTENSION USING GA OPTIMISED FUZZY LOGIC

Sungkyunkwan University, Suwon 16419, Republic of Korea 2 College of Software Sungkyunkwan University Suwon 16419, Republic of Korea

Improved Resilience against False Data Injection Attacks using PCRE Filtering Scheme

An Energy Efficient Data Dissemination Algorithm for Wireless Sensor Networks

Source Anonymous Message Authentication and Source Privacy using ECC in Wireless Sensor Network

Effective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report

Implementing Crytoptographic Technique in Cluster Based Environment for Secure Mobile Adhoc Networks

DETECTION OF NODE CAPTURE ATTACKS IN WIRELESS SENSOR NETWORKS

Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN

Wireless Sensor Networks: Security Issues, Challenges and Solutions

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack

Sequential Hypothesis Testing Based Approach for Replica Cluster Detection in Wireless Sensor Networks

DETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM

Keywords:- Replication attack, security, wireless sensor networks, localized detection.

WAP: Wormhole Attack Prevention Algorithm in Mobile Ad Hoc Networks

Compromised nodes in wireless sensor network 1

Defending Against Resource Depletion Attacks in Wireless Sensor Networks

DISTRIBUTED HASH TABLE PROTOCOL DETECTION IN WIRELESS SENSOR NETWORKS

Trust Decision Making Scheme for Wireless Sensor Networks

Secure Routing and Transmission Protocols for Ad Hoc Networks

ISSN: ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 3, Issue 4, July 2014

A Simple Sink Mobility Support Algorithm for Routing Protocols in Wireless Sensor Networks

Presented by: Mariam Ahmed Moustafa Faculty of Engineering, Alexandria University, Egypt. 24 March 2016 RIPE NCC / MENOG 16

Random Key Pre-distribution Schemes using Multi-Path in Wireless Sensor Networks

Dynamic Energy-based Encoding and Filtering in Sensor Networks (DEEF)

Webpage: Volume 4, Issue VI, June 2016 ISSN

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks

Performance Analysis of Mobile Ad Hoc Network in the Presence of Wormhole Attack

Wireless Network Security Spring 2011

LIGHTWEIGHT KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS

Unpredictable Software-based Attestation Solution for Node Compromise Detection in Mobile WSN

QoS-Enabled Video Streaming in Wireless Sensor Networks

Abstract. 1. Introduction

ESTABLISHMENT OF SECURE COMMUNICATION IN WIRELESS SENSOR NETWORKS

CMNTS:Catching Malicious Nodes with Trust Support in Wireless Sensor Networks

Providing Transparent Security Services to Sensor Networks

CSC 774 Advanced Network Security

An Enhanced General Self-Organized Tree-Based Energy- Balance Routing Protocol (EGSTEB) for Wireless Sensor Network

Cross-Layer Optimized Architecture of MBS over Mobile WiMAX

Sybil Attack Detection in Mobile Adhoc Network

ComparisonofPacketDeliveryforblackholeattackinadhocnetwork. Comparison of Packet Delivery for Black Hole Attack in ad hoc Network

Efficient Detection and Elimination of Vampire Attacks in Wireless Ad-Hoc Sensor Networks

sensors ISSN

A NOVEL APPROACH FOR DETECTING COMPROMISED NODES IN WIRELESS SENSOR NETWORKS

Detection and Localization of Multiple Spoofing Attackers in Wireless Networks Using Data Mining Techniques

Modified Low Energy Adaptive Clustering Hierarchy for Heterogeneous Wireless Sensor Network

hash chains to provide efficient secure solutions for DSDV [7].

Performance Analysis of Heterogeneous Wireless Sensor Network in Environmental Attack

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network

Low Power and Low Latency MAC Protocol: Dynamic Control of Radio Duty Cycle

A Secure Time Synchronization Protocol for Mobile Underwater Wireless Sensor Network

INSENS: Intrusion-tolerant routing for wireless sensor networks. By: Jing Deng, Richard Han, and Shivakant Mishra

Secure cell relay routing protocol for sensor networks

Wireless Network Security Spring 2015

Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures

LHAP: A Lightweight Hop-by-Hop Authentication Protocol For Ad-Hoc Networks

Optimized Paging Cache Mappings for efficient location management Hyun Jun Lee, Myoung Chul Jung, and Jai Yong Lee

A Mobile Device Classification Mechanism for Efficient Prevention of Wireless Intrusion

Transcription:

, pp.40-46 http://dx.doi.org/10.14257/astl.2016.142.07 TDMA-Based Detection of Packet Modification Attacks in Wireless Sensor Networks 1 Hae Young Lee and Hyung-Jong Kim Department of Information Security Seoul Women s University Seoul 01797 Republic of Korea whichmeans@gmail.com Abstract. In a wireless sensor network, a few sensor nodes can be physically captured by a malicious adversary and then, by using the whole information they hold, skillfully modify some legitimate packets passing through the captured nodes. Such packet modification attacks (PMAs) could make real events on the field or control messages from the base stations (BSs) considered as false ones, so that some critical events, such as the enemy s advances, may not be reported to the BSs, or BSs may lose control of numerous nodes. In this paper, the author proposes a method of detecting PMAs in WSNs, in which each PMA can be detected and notified to the BSs through a time division multiple access based collaboration among the detecting nodes. While the proposed method does not require tamper-resistant hardware, the method guarantees that a PMA can be detected unless half of the detecting nodes are collude with the PMA. The performance of the method is reviewed with simulation results. Keywords: Wireless sensor networks, node capture, security, insider attacks, packet modification attacks 1 Introduction A wireless sensor network (WSN) is comprised of hundreds or even thousands of small sensor nodes and some base stations (BS). In many applications, these nodes are unattended by the users since they are often deployed in hostile environments, such as battlefields [1]. Thus, by capturing a few nodes, a malicious adversary could compromise the whole of the nodes secret information, such as authentication keys [2]. Note that nodes are not equipped with tamper-resistant hardware due to cost constraints [3]. Using such compromised nodes, the adversary could inject fabricated sensing reports [4-7], which are technically correct, but notify the users of nonexistent events. These fabricated reports may lead to real-word responses, such as dispatching patrols to some regions, or denial-of-service and energy depletion [7]. 1 This research was supported by the MISP (Ministry of Science, ICT & Future Planning), Korea, under the National Program for Excellence in SW (R7116-16-1018) supervised by the IITP (Institute for Information & communications Technology Promotion). (R7116-16-1018) ISSN: 2287-1233 ASTL Copyright 2016 SERSC

Another type of potential insider attacks is packet modification attacks (PMAs) [8]. In PMAs, an adversary uses some compromised nodes to skillfully modify some legitimate packets passing through the nodes, with the goal of preventing notifications of critical events to the BSs or BSs control over downstream nodes. For example, a compromised node F i shown in Fig. 1 could alter a single bit of the packet received from F i-1 and forward the altered packet to F i+1, which would result in a violation of the integrity. Thus, the packet would be dropped by a forwarding node or rejected at the destination. Single Bit Alteration P i-1 P i F i-1 F i F i+1 Integrity Violation Fig. 1. A packet modification attack (PMA) in wireless sensor network. In this paper, we propose a method of detecting PMAs based on time-division multiple-access (TDMA) in homogeneous WSNs. In the proposed method, for each forwarding node, some of its neighboring nodes are chosen as the committee nodes of the node. These committee nodes overhear every packing passing through the forwarding node, and check if a packet the node received and its copy the node has forwarded match exactly at network and higher layers. If these two packets do not match, the committee considers that the node has launched a PMA against the packet. Then, the committee nodes collaboratively generate a misbehavior report (MR), which informs the users of the PMA, and forwards the MR towards the BS. The collaboration among the nodes is performed based on TDMA. The method assumes that some of the committee nodes can be also captured by the adversary. Unless half of them are collude with the PMA, the method guarantees that an MR for the PMA is forwarded towards the BS. The performance of the method is shown with simulation results at the end of the paper. 2 Overhearing-Based Detection Mechanism (OBD) In [8], Ssu et al. proposed the overhearing-based detection mechanism (ODB) in which PMAs launched by a forwarding node can be detected in collaboration among its surrounding nodes in WSNs. For each forwarding node, some of its neighboring nodes are chosen as its committee nodes. Each of them can overhear packets from/to the forwarding node due to the broadcast nature of wireless communications. Each of the committee nodes compares packets sent to the forwarding node and those sent by Copyright 2016 SERSC 41

the forwarding node. When the forwarding node has just forwarded a packet, each of the committee nodes sends a voting message to the forwarding node. By collecting these votes, the forwarding node makes a decision: normal, a PMA, or invalid. Upon detecting a PMA, the forwarding node reports the PMA to the BS. However, OBD has some flaws: First, OBD assumes that the forwarding node is benign. However, the node could be also captured by an adversary, so that the node would not report PMAs to the user. Second, OBD makes every committee node send a vote for each packet. However, in terms of energy saving, this would be inefficient in peacetime. 3 TDMA-Based Detection of Packet Modification Attacks This section describes the proposed method in detail. 3.1 Assumptions The proposed method considers a highly-dense WSN consisting of a large number of homogeneous sensor nodes and a BS. These nodes are similar to the current generation of sensor nodes, in terms of computation and communication capabilities, and energy resources. Due to cost constraints, nodes are not equipped with tamperresistant hardware. Each node has some cryptographic keys shared only with the BS. Due to the broadcast nature of the wireless communications, packets transmitted by a node can be overheard by the surrounding nodes within the transmission range. It is assumed that a lightweight TDMA mechanism, such as [9] or [10], is employed within the network, so that the nodes clocks are synchronized locally and loosely. A malicious adversary can capture a few nodes without being detected. However, the adversary cannot capture a large number of nodes and the BS. The goal of the adversary is to interrupt the delivery of some packets passing through the captured nodes. To prevent being detected, the adversary will try to alter a very small part of each packet; such a minimal alteration would invalidate the integrity of the packet, so that the packet would be ignored at the destination. 3.2 Initial Setup For the sake of simplicity, hereafter, the basic mechanism of the proposed method is explained with a simple example shown in Fig. 2. Three forwarding nodes F i-1, F i, and F i+1 along a unidirectional routing path are considered. Once F i has received a packet P i-1 from F i-1, the node has to send P i, which is a copy of P i-1, to F i+1. Due to the broadcast nature of wireless communications, both P i-1 and P i can be overheard by its neighboring nodes that are within the transmission range. The proposed method assumes a highly-dense WSN, so that the number of the neighboring nodes may reach a dozen or more. Among them, T nodes are chosen as the committee nodes of F i, which is a predefined value. In the example, T = 5 and nodes C 1, C 2, C 3, C 4, and C 5 are chosen as the committee nodes of F i. Among the committee nodes, one is elected as the head of the committee (the committee head). 42 Copyright 2016 SERSC

P i-1 =P i? P i-1 =P i? C 1 C2 Head P i-1 P i Head s C 1 s C 2 s C 3 s C 4 s C 5 s F i-1 F i F i+1 Slot C 5 C 3 P i-1 =P i? P i-1 =P i? C 4 P i-1 =P i? Fig. 2. Initial setup and PMA detection. The clocks of the committee nodes are locally synchronized by a lightweight TDMA protocol. A single TDMA round is comprised of T + 1 TDMA slots; the first one is reserved for the committee head and the others are assigned to the committee nodes. Note that the slot assignment for a committee is a separate issue and beyond the scope. In the figure, the 2 nd, 3 rd, 4 th, 5 th, and 6 th slots are assigned to C 1, C 2, C 3, C 4, and C 5, respectively. A committee node can transmit packets only within its TDMA slot. For example, C 2 can transmit a packet only within the 3 rd slot of each TDMA round unless the node is currently the head. A PMA can be reported to the BS through the following 4 phases. 1. PMA monitoring: The committee nodes of F i can overhear any packets transmitted by F i-1 and F i, so that they can detect PMAs of F i by comparing these packets. That is, each of the nodes compares P i-1, which was transmitted by F i-1 to F i, and P i, which was done by F i to F i+1. Since Pi must be a copy of P i-1, the contents of P i-1 and that of P i must match exactly at network and higher layers (i.e., P i-1 = P i). If P i- 1 P i, the committee considers that F i has launched a PMA against P i-1. Once the committee nodes have detected a PMA of F i, each of them first prepares a draft of a misbehavior report (DMR), which typically includes its ID, the contents informing the detection of the PMA, and a MAC generated over the contents using one of its keys. Since the committee consists of T nodes, at most T DMRs can be generated. These DRMs are used in the next phase. Note that some of the committee nodes can be also captured by the adversary, and thus have colluded in the PMA. However, the proposed method is resilient against them unless they account for half or more of the committee nodes. 2. Draft broadcast: In this phase, the committee head broadcasts its DMR, DMR H, within the first slot of a TDMA round, to ask the other committee nodes for agreements on reporting the detection of the PMA. Each of them then checks if DMR H addresses the same PMA detected by it. If so, the node generates an agreement message (AM), which typically includes its ID and a MAC generated over the contents of DMRH using one of its keys. These T 1 AMs will be Copyright 2016 SERSC 43

broadcasted and collected by all the committee nodes, excluding the head, in the next phase. The committee head can be also captured by the adversary, and thus have colluded in the PMA. The captured head may not broadcast a DMR or broadcast an incorrect DMR. However, this can be simply detected by the other committee nodes. Once the head s misbehavior has been detected, the node assigned to the next valid slot of the round broadcasts its DMR, DMR i (i H). DMR i can be also checked by the remaining committee nodes. 3. Agreement broadcast: In this phase, each of the committee nodes, excluding the node who had broadcasted a legitimate DMR in the previous phase, broadcasts its AM within its slot of a TDMA round. Meanwhile, each of the committee nodes, including the head, collects these T 2 AMs, compiles a misbehavior report (MR) that typically includes its ID, the contents of the legitimate DMR, and T MACs: one from the DMR and the others from the AMs. Some of the committee nodes can be also captured by the adversary, and thus have colluded in the PMA. They may not broadcast an AM or may broadcast an incorrect AM. However, unless half or more of them are captured, the majority of the MACs would be legitimate. 4. Report forwarding: In this phase, the committee head forwards its MR, MR H, towards the BS within the first slot of a TDMA round. Since the head can be captured by the adversary, MR H is verified by the other committee nodes; each of them checks if MR H and the node s MR match exactly. If so, MR H is considered to be legitimate. But if not, or the head broadcasted nothing, the node assigned to the next valid slot of the round broadcasts its MR, DMR i (i H). Note that MR i can be also checked by the remaining committee nodes. 120 100 Proposed OBD Reported PMAs (%) 80 60 40 20 0 0 1 2 Number of captured committee nodes 44 Copyright 2016 SERSC

3000 Proposed OBD 2500 Energy consumption (J) 2000 1500 1000 500 0 0 10 20 30 40 PMA traffic rate (%) Fig. 3. (a) resilience against node capture and (b) energy efficiency. 4 Simulation Results The performance of the proposed method against PMAs has been also evaluated through simulation. For each forwarding node, 5 nodes were chosen as its committee nodes. Fig. 3(a) shows the percentage of PMAs reported to the user when, for each committee, the committee head was captured by the adversary and the number of captured committee nodes, excluding the head, is between 0 and 2. As shown in the figure, the proposed method (filled rectangles) could make every MR reported to the user unless 3 or more of the nodes in each committee were captured. But OBD (empty circles) could not report any MRs even though all the other committee nodes were benign. Fig. 3(b) shows the energy efficiency of the proposed method. As shown in the figure, the proposed method could save extra energy resources since a committee node needed not send a message to the head in peacetime. But OBD made the node send a message for each packet, which resulted in energy-inefficiency in peacetime. 5 Conclusions and Future Work In this paper, we proposed a method for the detection of PMAs in homogeneous WSNs. By using the broadcast nature of wireless communications and a lightweight TDMA mechanism, a PMA launched by a forwarding node can be detected by its committee and reported to the user. Unless half or more of the committee nodes are Copyright 2016 SERSC 45

captured by an adversary, the method guarantees that an MR informing the user of the PMA can be forwarded towards the BS. In contrast to OBD, the proposed method is resilient against captured heads and can save extra energy resources. The performance of the method was shown with the simulation results. We will investigate algorithms for committee selections with the consideration of energy efficiency and security. Also, we will do detection methods that can detect PMAs without the use of TDMA. References 1. Mi, Q., Stankovic, J.A., Stoleru, R.: Secure walking GPS: a secure localization and key distribution scheme for wireless sensor networks, ACM Conf. on Wireless Netw. Security, Mar. 2010. 2. Tague, P., Poovendran, R.: Modeling Node Capture Attacks in Wireless Sensor Networks, Annual Allerton Conf. on Comm., Control, and Comput., Sep. 2008. 3. Zhu, B., Addada, V.G.K., Setia, S., Jajodia, S., Roy, S.: Efficient Distributed Detection of Node Replication Attacks in Sensor Networks, Annual Comput. Security Applications Conf., Dec. 2007. 4. Ye, F., Luo, H., Lu, S., Zhang, L.: Statistical En-Route Filtering of Injected False Data in Sensor Networks, IEEE J. on Selected Areas in Comm., vol. 23, no. 4, pp. 839-850, 2005. 5. Yu, Z., Guan, Y.: A Dynamic En-Route Filtering Scheme for Data Reporting in Wireless Sensor Networks, IEEE/ACM Trans. on Netw., vol. 18, no. 1, pp 150-163, 2010. 6. Kim, M.S., Cho, T.H.: A Multipath En-Route Filtering Method for Dropping Reports in Sensor Networks, IEICE Trans. on Infor. and Syst., vol. E90-D, no. 12, pp. 2108-2109, 2007. 7. Krauß, C., Schneider, M., Eckert, C.: Defending against False-Endorsement-Based DoS Attacks in Wireless Sensor Networks, ACM Conf. on Wireless Netw. Security, Mar. 2008. 8. Ssu, K.F., Chou, C.H., Cheng, L.W.: Using Overhearing Technique to Detect Malicious Packet-Modifying Attacks in Wireless Sensor Networks, Comput. Comm., vol. 30, no. 11-12, pp. 2342-2352, Sep. 2007. 9. Uluagac, A.S., Beyah, R.A., Copeland, J.A.: Secure SOurce-BAsed Loose Synchronization (SOBAS) for Wireless Sensor Networks, IEEE Trans. of Parallel and Distributed Syst., vol. 24, no. 4, pp. 803-813, 2013. 10. Deng, J., Han, R., Mishra, S.: Secure and Robust Loose Time Synchronization Mechanism for Wireless Sensor Networks, The 13th USENIX Security Symp. (USENIX Security), Aug. 2004. 46 Copyright 2016 SERSC