Active Defense Strategy against Jamming Attack in Wireless Sensor Networks

Full Text (PDF, 817KB), PP.1-13

Views: 0 Downloads: 0

Author(s)

Nawfal F. Abdulqader AL-Shaihk 1,* Reza Hassanpour 1

1. Computer Engineering Department, Cankaya University, Ankara-Turkey

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2019.11.01

Received: 18 Sep. 2019 / Revised: 5 Oct. 2019 / Accepted: 28 Oct. 2019 / Published: 8 Nov. 2019

Index Terms

Wireless Sensor Networks (WSN), False Endorsement DOS (FEDOS), Denial of Service (DOS), False Node Exclusion DOS (FNEDOS), Jamming Attack

Abstract

Wireless Sensor Networks WSNs are being utilized increasingly nowadays due to their ability to collect data from stationary, moving, reachable or unreachable fields. Progressive developments in WSN techniques add efficiency, reliability and better power management possibility, but they are still vulnerable and sensitive to security threats. The most effective threat to WSN is DOS attacks, which are detectable but in many cases unpreventable yet. An authentication-based defensive approach against DOS attack combined with jamming attack that prevents transferring data between attacked nodes in a cluster and cluster head node is proposed in this study. The proposed method encompasses developing an algorithm with ability to bypass attacked path via alternative safe one under control of cluster head to mitigate the False Node Excluding DOS due to jamming attack. The proposed method has been experimentally tested against similar methods from the literature with arbitrary study cases. Our proposed algorithm shows promising results in mitigating False Node Exclusion DOS (FNEDOS) attack where a full recovery of the attacked node is achieved in case of isolated nodes, and improvement between 36% and 52% is obtained when the attack affects a group of nodes at proximity.

Cite This Paper

Nawfal F. Abdulqader AL-Shaihk, Reza Hassanpour, "Active Defense Strategy against Jamming Attack in Wireless Sensor Networks", International Journal of Computer Network and Information Security(IJCNIS), Vol.11, No.11, pp.1-13, 2019. DOI:10.5815/ijcnis.2019.11.01

Reference

[1]Alsultan, Mohammed, Kasim Oztoprak, and Reza Hassanpour. "Power aware routing protocols in wireless sensor network." IEICE Transactions on Communications 99.7 (2016): 1481-1491.
[2]Aazam, Mohammad, et al. "Cloud of Things: Integrating Internet of Things and cloud computing and the issues involved." Applied Sciences and Technology (IBCAST), 2014 11th International Bhurban Conference on. IEEE, 2014.
[3]You, Pengfei, Yuxing Peng, and Hang Gao. "Providing information services for wireless sensor networks through cloud computing." Services Computing Conference (APSCC), 2012 IEEE Asia-Pacific. IEEE, 2012.
[4]Flammini, A., and E. Sisinni. "Wireless sensor networking in the internet of things and cloud computing era." Procedia Engineering 87 (2014): 672-679.
[5]Liu, Qing, and Anfeng Liu. "On the hybrid using of unicast-broadcast in wireless sensor networks." Computers & Electrical Engineering 71 (2018): 714-732.
[6]Akyildiz, Ian F., et al. "Wireless sensor networks: a survey." Computer networks 38.4 (2002): 393-422.
[7]Prasanna, S., and Srinivasa Rao. "An overview of wireless sensor networks applications and security." International Journal of Soft Computing and Engineering (IJSCE), ISSN (2012): 2231-2307.
[8]Sharma, Sukhwinder, Rakesh Kumar Bansal, and Savina Bansal. "Issues and challenges in wireless sensor networks." Machine Intelligence and Research Advancement (ICMIRA), 2013 International Conference on. IEEE, 2013.
[9]Hari, Parli B., and Shailendra Narayan Singh. "Security issues in Wireless Sensor Networks: Current research and challenges." Advances in Computing, Communication, & Automation (ICACCA)(Spring), International Conference on. IEEE, 2016.
[10]Hergenröder, Anton, and Jens Horneber. "Facing challenges in evaluation of WSN energy efficiency with distributed energy measurements." Wireless Communications and Mobile Computing Conference (IWCMC), 2011 7th International. IEEE, 2011.
[11]Yue, Ying-Gao, and Ping He. "A comprehensive survey on the reliability of mobile wireless sensor networks: Taxonomy, challenges, and future directions." Information Fusion 44 (2018): 188-204.
[12]Messai, Mohamed-Lamine. "Classification of attacks in wireless sensor networks." arXiv preprint arXiv:1406.4516 (2014).
[13]Hari, Parli B., and Shailendra Narayan Singh. "Security issues in Wireless Sensor Networks: Current research and challenges." Advances in Computing, Communication, & Automation (ICACCA)(Spring), International Conference on. IEEE, 2016.
[14]Ahlawat, Priyanka, and Mayank Dave. "An attack model based highly secure key management scheme for wireless sensor networks." Procedia Computer Science 125 (2018): 201-207.
[15]Ioannou, Christiana, and Vasos Vassiliou. "The Impact of Network Layer Attacks in Wireless Sensor Networks." Secure Internet of Things (SIoT), 2016 International Workshop on. IEEE, 2016.
[16]Hwang, Ren Junn, and Yan Zhi Huang. "Secure Data Collection Scheme for Wireless Sensor Networks." Advanced Information Networking and Applications Workshops (WAINA), 2017 31st International Conference on. IEEE, 2017.
[17]Shahzad, Furrakh, Maruf Pasha, and Arslan Ahmad. "A Survey of Active Attacks on Wireless Sensor Networks and their Countermeasures." arXiv preprint arXiv:1702.07136 (2017).
[18]Wang, Fei, et al. "A DoS-resilient enhanced two-factor user authentication scheme in wireless sensor networks." Computing, Networking and Communications (ICNC), 2014 International Conference on. IEEE, 2014.
[19]Ouyang, Xi, et al. "A novel framework of defense system against dos attacks in wireless sensor networks." Wireless Communications, Networking and Mobile Computing (WiCOM), 2011 7th International Conference on. IEEE, 2011.
[20]Arazi, Ortal, Hairong Qi, and Derek Rose. "A public key cryptographic method for denial of service mitigation in wireless sensor networks." Sensor, Mesh and Ad Hoc Communications and Networks, 2007. SECON'07. 4th Annual IEEE Communications Society Conference on. IEEE, 2007.
[21]Gill, Khusvinder, and Shuang-Hua Yang. "A scheme for preventing denial of service attacks on wireless sensor networks." Industrial Electronics, 2009. IECON'09. 35th Annual Conference of IEEE. IEEE, 2009.
[22]Krauß, Christoph, Markus Schneider, and Claudia Eckert. "An enhanced scheme to defend against false-endorsement-based DoS attacks in WSNs." Networking and Communications, 2008. WIMOB'08. IEEE International Conference on Wireless and Mobile Computing,. IEEE, 2008.
[23]Kim, Kihong, and Jinkeun Hong. "Analysis of power consumption of S-MAC protocol according to DoS attack." New Trends in Information Science and Service Science (NISS), 2010 4th International Conference on. IEEE, 2010.
[24]Saghar, Kashif, et al. "Applying formal modelling to detect DoS attacks in wireless medium." Communication Systems Networks and Digital Signal Processing (CSNDSP), 2010 7th International Symposium on. IEEE, 2010.
[25]Ballarini, Paolo, Lynda Mokdad, and Quentin Monnet. "Modeling tools for detecting DoS attacks in WSNs." Security and Communication Networks 6.4 (2013): 420-436.
[26]Muraleedharan, Rajani, and Lisa Ann Osadciw. "Cross layer denial of service attacks in wireless sensor network using swarm intelligence." Information Sciences and Systems, 2006 40th Annual Conference on. IEEE, 2006.
[27]Gu, Qijun, and Peng Liu. "Denial of service attacks." Handbook of Computer Networks: Distributed Networks, Network Planning, Control, Management, and New Trends and Applications 3 (2007): 454-468.
[28]Kim, Mihui, Inshil Doh, and Kijoon Chae. "Denial-of-service (dos) detection through practical entropy estimation on hierarchical sensor networks." Advanced Communication Technology, 2006. ICACT 2006. The 8th International Conference. Vol. 3. IEEE, 2006.
[29]Raymond, David R., and Scott F. Midkiff. "Denial-of-service in wireless sensor networks: Attacks and defenses." IEEE Pervasive Computing 7.1 (2008).
[30]Mansouri, Djamel, et al. "Detecting DoS attacks in WSN based on clustering technique." Wireless Communications and Networking Conference (WCNC), 2013 IEEE. IEEE, 2013.
[31]Zhang, Heng, et al. "DoS attack energy management against remote state estimation." IEEE Transactions on Control of Network Systems (2016).
[32]Guechari, Malek, Lynda Mokdad, and Sovanna Tan. "Dynamic solution for detecting denial of service attacks in wireless sensor networks." Communications (ICC), 2012 IEEE International Conference on. IEEE, 2012.
[33]Monnet, Quentin, Lynda Mokdad, and Jalel Ben-Othman. "Energy-balancing method to detect denial of service attacks in wireless sensor networks." Communications (ICC), 2014 IEEE International Conference on. IEEE, 2014.
[34]Bekara, Chakib, Maryline Laurent-Maknavicius, and Kheira Bekara. "H 2 BSAP: A hop-by-hop Broadcast Source Authentication Protocol for WSN to mitigate DoS attacks." Communication Systems, 2008. ICCS 2008. 11th IEEE Singapore International Conference on. IEEE, 2008.
[35]de Biasi, Gabriel, and Luiz FM Vieira. "Taxonomy of Security Attacks in Opportunistic Networks." Opportunistic Networks: Mobility Models, Protocols, Security, and Privacy (2018): 67.
[36]Mohammadi, Shahriar, and Hossein Jadidoleslamy. "A comparison of link layer attacks on wireless sensor networks." arXiv preprint arXiv:1103.5589 (2011).
[37]Riecker, Michael, Daniel Thies, and Matthias Hollick. "Measuring the impact of denial-of-service attacks on wireless sensor networks." Local Computer Networks (LCN), 2014 IEEE 39th Conference on. IEEE, 2014.
[38]Bekara, Chakib, Maryline Laurent-Maknavicius, and Kheira Bekara. "Mitigating Resource-Draining DoS Attacks on Broadcast Source Authentication on Wireless Sensors Networks." Security Technology, 2008. SECTECH'08. International Conference on. IEEE, 2008.
[39]Almomani, Iman, and Bassam Al-Kasasbeh. "Performance analysis of LEACH protocol under Denial of Service attacks." Information and Communication Systems (ICICS), 2015 6th International Conference on. IEEE, 2015.
[40]Mokdad, Lynda, and Jalel Ben-Othman. "Performance evaluation of security routing strategies to avoid DoS attacks in WSN." Global Communications Conference (GLOBECOM), 2012 IEEE. IEEE, 2012.
[41]Mansouri, Djamel, et al. "Preventing denial of service attacks in wireless sensor networks." Communications (ICC), 2015 IEEE International Conference on. IEEE, 2015.
[42]Fouchal, Said, et al. "Recursive‐clustering‐based approach for denial of service (DoS) attacks in wireless sensors networks." International Journal of Communication Systems 28.2 (2015): 309-324.
[43]Gope, Prosanta, Jemin Lee, and Tony QS Quek. "Resilience of DoS attacks in designing anonymous user authentication protocol for wireless sensor networks." IEEE Sensors Journal 17.2 (2016): 498-503.
[44]Gill, Kashif, S-H. Yang, and Wei Wang. "Scheme for preventing low-level denial-of-service attacks on wireless sensor network-based home automation systems." IET Wireless Sensor Systems 2.4 (2012): 361-368.
[45]Jiang, Zhongqiu, Shu Yan, and Liangmin Wang. "Survivability evaluation of cluster-based wireless sensor network under DoS attacks." Wireless Communications, Networking and Mobile Computing, 2009. WiCom'09. 5th International Conference on. IEEE, 2009.