Split-Network in Wireless Sensor Network: Attack and Countermeasures

Full Text (PDF, 191KB), PP.61-67

Views: 0 Downloads: 0

Author(s)

Chunlai Du 1,* Jianshun Zhang 1 Li Ma 1

1. College of Information Engineering, North China University of Technology, Beijing, China

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2011.05.08

Received: 6 Jan. 2011 / Revised: 19 Apr. 2011 / Accepted: 5 May 2011 / Published: 8 Aug. 2011

Index Terms

Wireless Sensor Network, split-network attack, ARMA, frequency hopping, integrate

Abstract

Wireless Sensor Network usually is deployed open environment to collect some sensitive information and has special features of its own are different from traditional network, which is vulnerable to internal and external attacks. Whole network can be split up into many separate subnets which cannot communicate with each other because some vital sensor nodes are attacked. This paper proposed an effective countermeasure based on ARMA prediction model and frequency hopping to react against split-network attack. ARMA model is used to evaluate the behavior of sensor nodes. Frequency hopping makes the communication frequency of the network escape from attack frequency. Then wireless sensor network is integrated into single network from split-network. Simulation results show the proposed countermeasure significantly reduces the success rate of split-network attack and increases the lifetime of network.

Cite This Paper

Chunlai Du, Jianshun Zhang, Li Ma, "Split-Network in Wireless Sensor Network: Attack and Countermeasures", International Journal of Computer Network and Information Security(IJCNIS), vol.3, no.5, pp.61-67, 2011. DOI:10.5815/ijcnis.2011.05.08

Reference

[1]Giruka, V. C., Singhal, M., Royalty, J. and Varanasi, S. (2008), Security in wireless sensor networks. Wireless Communications and Mobile Computing, 8: 1–24. doi: 10.1002/wcm.42
[2]Kashif Kifayat, Madjid Merabti, Qi Shi and David Llewellyn-Jones, Security in Wireless Sensor Networks. Handbook of Information and Communication Security, 2010, Part E, 513-552, DOI:10.1007/978-3-642-04117-4_26
[3]Raymond,D.R.Marchany,R.C.Brownfield,M.I.Midkiff, S.F, ”Effects of Denial-of-Sleep Attacks on Wireless Sensor Network MAC Protocols”,Vehicular Technology, IEEE Transactions on On page(s): 367 – 380, Volume: 58 Issue: 1, Jan. 2009
[4]David Richard Raymond,”Denial-of-Sleep Vulnerabilities and Defenses in Wireless Sensor Network MAC Protocols”, Dissertation, Virginia Polytechnic Institute and State University, 2008
[5]Rainer Falk, Hans-Joachim Hof, "Fighting Insomnia: A Secure Wake-Up Scheme for Wireless Sensor Networks," securware, pp.191-196, 2009 Third International Conference on Emerging Security Information, Systems and Technologies, 2009
[6]MatthewPirretti,SencunZhu, N.Vijaykrishnan,Patrick McDaniel, Mahmut Kandemir and Richard Brooks, ”The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense “in International Journal of Distributed Sensor Networks, Volume 2, Issue 3 September 2006, pages 267 - 287
[7]David R. Raymond and Scott F. Midkiff, “Clustered Adaptive Rate Limiting: Defeating Denial-of-Sleep Attacks in Wireless Sensor Networks” in Military Communications Conference 2007, MILCOM, IEEE, pages -1-7.
[8]Aristides Mpitziopoulos et al..”A Survey on Jamming Attacks and Countermeasures in WSNs”, IEEE COMMUNICATIONS SURVEYS&TUTORIALS, VOL. 11, NO. 4, FOURTH QUARTER 2009
[9]Mpitziopoulos,A.and Gavalas, D.(2009),”An effective defensive node against jamming attacks in sensor networks”. Security and Communication Networks,2:145–163.doi: 10.1002/sec.81
[10]M.Strasser,C. Popper, and S. Capkun, “Efficient Uncoordinated FHSS Anti-jamming Communication,” Proceedings of the tenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, pages 207-218, 2009.
[11]Ghada Alnifie, Robert Simon,”A multi-channel defense against jamming attacks in wireless sensor networks”, Proceedings of the 3rd ACM workshop on QoS and security for wireless and mobile networks, October 22-22, 2007, Chania, Crete Island, Greece
[12]W. Xu, W. Trappe and Y. Zhang, “Channel surfing: defending wireless sensor networks from interference”, in Proc. 6th international conference on Information processing in sensor networks, New York, NY, USA, pages.499-508, 2007.
[13]W. Xu, K. Ma, W. Trappe, Y. Zhang, “Jamming sensor networks: attack and defense strategies”, IEEE Network Magazine,vol. 20, pages. 41-47,2006.
[14]WENYUAN XU, WADE TRAPPE and YANYONG ZHANG, ”Defending wireless sensor networks from radio interference through channel adaptation” in ACM Transactions on Sensor Network, Vol. 4, No. 4, Article 18, Publication date: August 2008
[15]Khusvinder Gill and Shuang-Hua Yang, “A Scheme for Preventing Denial of Service Attacks on Wireless Sensor Networks” in Industrial Electronics, 2009. IECON '09. 35th Annual Conference of IEEE, Identifier: 10.1109/IECON.2009.5415233, pages: 2603 - 2609
[16]Pelechrinis,K; Iliofotou,M; Krishnamurthy,V., “Denial of Service Attacks in Wireless Networks:The Case of Jammers”, in Communications Surveys & Tutorials of IEEE, Issue: 99, Identifier: 10.1109/SURV.2011.041110.00022, pages:1-13
[17]Raymond, D.R.; Midkiff, S.F.; “Denial-of-service in wireless sensor networks:Attacks and defenses”, Pervasive Computing, IEEE, Vol: 7 , Issue: 1, Identifier: 10.1109/MPRV.2008.6, pages: 74 – 81
[18]http://en.wikipedia.org/wiki/Linear_regression
[19]Damodar N.Gujarati, Basic Econometrics, China Renmin University Press,2005
[20]Li Baoren, Econometrics, China Machine Press,2008
[21]Tong Guangrong, ECONOMETRICS, WUHAN UNIVERSITY PRESS, 2006
[22]Mehmet Celenk, Thomas Conley, James Graham, and John Willis, “Anomaly prediction in network traffic using adaptive Wiener filtering and ARMA modeling”, 2008 IEEE International Conference on Systems, Man and Cybernetics (SMC 2008),pages:3548-3553,2008
[23]Mehmet Celenk, Thomas Conley, John Willis, James Graham,”Predictive Network Anomaly Detection and Visualization”, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 5, NO. 2, JUNE 2010