Reinforcement Swap Attack against Directed Diffusion in Wireless Sensor Networks

Full Text (PDF, 802KB), PP.13-24

Views: 0 Downloads: 0

Author(s)

Ibrahim S. I. Abuhaiba 1,* Huda B. Hubboub 1

1. Computer Engineering Department, Islamic University, Gaza, Palestine

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2013.03.02

Received: 4 Aug. 2012 / Revised: 16 Nov. 2012 / Accepted: 2 Jan. 2013 / Published: 8 Mar. 2013

Index Terms

Wireless sensor network, denial of service attack, directed diffusion, on-off attack

Abstract

In this paper, we introduce a new attack, Reinforcement Swap Attack, against Directed Diffusion based WSNs, which exploits the vulnerabilities of Directed Diffusion specifications. Its main idea is the disruption of configuration information, such as routing information to misuse route establishment along the network. Our approach is to swap Directed Diffusion reinforcement rule which means that the good route is excluded and the bad route is included. Moreover, our attack is activated and deactivated periodically to prolong its lifetime and hence brings down the target network. For the proposed attack, we present analysis, simulation, and experimental measurements. We show that the system achieves maximal damage on system performance represented by many metrics.

Cite This Paper

Ibrahim S. I. Abuhaiba, Huda B. Hubboub, "Reinforcement Swap Attack against Directed Diffusion in Wireless Sensor Networks", International Journal of Computer Network and Information Security(IJCNIS), vol.5, no.3, pp.13-24, 2013. DOI:10.5815/ijcnis.2013.03.02

Reference

[1]A. D. Wood, J. A Stankovic, "Denial of Service in Sensor Networks," IEEE Computer, vol. 35, no. 10, October 2002, pp. 54-62.
[2]C. Intanagonwiwat, R. Govindan, D. Estrin, "Directed diffusion: A scalable and robust communication paradigm for sensor networks," in Proc. 6th Annual ACM/IEEE MobiCom'00, Boston, MA, August 2000.
[3]P. Ning, K. Sun, "How to Misuse AODV: A Case Study of Insider Attacks against Mobile Ad-hoc Routing Protocols," Ad Hoc Networks, vol. 3, no. 6, pp. 795-819, Nov. 2005.
[4]VL Chee, WC Yau ,"Security analysis of TORA routing protocol," in Springer, vol. 4706, pp.975-986, August 2007.
[5]C. Karlof, D. Wagner, "Secure routing in wireless sensor networks: Attacks and countermeasures," In Proc. of the 1st IEEE International Workshop on Sensor Network Protocols and Applications, Anchorage, AK, May 11, 2003.
[6]V. R. Kumar, J. Thomas, A. Abraham, "Secure Directed Diffusion Routing Protocol for Sensor Networks using the LEAP Protocol," NATO Security through Science Series - D: Information and Communication Security, vol. 6, pp. 183-203, 2006.
[7]A. Kalambur, "Secure Routing in Wireless Sensor Networks: A study on Directed Diffusion," Available: http:// ww.cs.sjsu.edu
[8]S. Moon, T. Cho, "Intrusion Detection Scheme against Sinkhole Attacks in Directed Diffusion Based Sensor Networks," IJCSNS International Journal of Computer Science and Network Security, vol. 9, no.7, pp. 118-122, Jul. 2009.
[9]J. Kim, P. Bentley, C. Wallenta, M. Ahmed, S. Hailes, "Danger Is Ubiquitous: Detecting Malicious Activities in Sensor Networks Using the Dendritic Cell Algorithm," Proc. of 5th International Conference on Artificial Immune Systems, Oeiras, Portugal, (ICARIS), pp. 390–403, 2006.
[10]Ibrahim S. I. Abuhaiba, Huda B. Hubboub, "Swarm Flooding Attack against Directed Diffusion in Wireless Sensor Networks," International Journal of Computer Network and Information Security (IJCNIS), Vol. 4, No. 12, pp. 18-30, 2012.
[11]A. Ferrante, R. Pompei, A. Stulova, A. V. Taddeo, "A protocol for pervasive distributed computing reliability," In the Proc. of the 4th IEEE International Conference on Wireless and Mobile Computing, Networking and Communication, Avignon, France, (WiMob 2008) , Oct. 2008, pp. 574–579
[12]K. Fall, K. Varadhan, "Editors ns Notes and Documentation," The VINT Project, UC Berkeley, LBL, USC/ISI, and Xerox PARC, Nov. 1997. Available: http://www-mash.cs.berkeley.edu/ns
[13]K. Fall, K. Varadhan, "The ns Manual (formerly ns notes and documentation), the VINT project, July 2003.
[14]A. Pathan, H. Lee, C. Hong, "Security in Wireless Sensor Networks: Issues and Challenges," In Proc. of 8th Advanced Communication Technology 2006, Phoenix Park, Republic of Korea, (IEEE ICACT), vol. 2, no. 6, Feb. 2006, pp. 1048-1054.