Fighting Sinkhole Attacks in Tree-based Routing Topologies
نویسندگان
چکیده
This work focuses on: (1) understanding the impact of sinkhole attacks on treebased routing topologies in Wireless Sensor Networks (WSNs), and (2) investigating cryptography-based strategies to limit network degradation caused by these attacks. This work is particularly important as WSN protocols that construct a fixed routing topology may be significantly affected by malicious attacks. Furthermore, considering networks deployed in a difficult to access geographical region, building up resilience against such attacks rather than detection is expected to be more beneficial. We thus first provide a simulation study on the impact of malicious attacks based on a diverse set of parameters, such as the network scale and the position and number of malicious nodes. Based on this study, we propose a single but very representative metric for describing this impact. Second, we present the novel design and evaluation of two simple and resilient topology-based reconfiguration protocols that broadcasts cryptographic values. The results of our simulation study show that our reconfiguration protocols are practical and effective in improving resilience against sinkhole attacks, even in the presence of some collusion. Key-words: wireless sensor network, sinkhole attacks, resilience, tree-based routing protocols in ria -0 03 55 87 3, v er si on 1 25 J an 2 00 9 Combattre les attaques par siphon dans les protocoles de routage en arbre Résumé : Ce travail porte sur (1) l’évaluation de l’impact des attaques par siphon sur les topologies de routage à base d’arbre dans les réseaux de capteurs sans fil (WSNs), et (2) l’utilisation de stratégies à base de cryptographie pour limiter les dégradations du réseau causées par ces attaques. Ce travail est particulièrement important car les protocoles WSN basés sur des topologies statiques peuvent être sévèrement affectés par les nœuds malicieux. De plus, en considérant les réseaux déployés dans les régions difficiles d’accès, les stratégies basées sur la résistance aux attaques peuvent être beaucoup plus efficaces que celles basées sur la détection de ces attaques. Aussi, nous décrivons d’abord une étude par simulations de l’impact d’attaques selon de nombreux paramêtres, tels que la taille du réseau ou la position ou le nombre de nœuds malicieux. Nous appuyant sur cette étude, nous proposons une métrique unique pour représenter cet impact, qui capture de nombreux paramêtres. Ensuite, nous présentons deux protocoles de reconfiguration par diffusion de valeurs cryptographiques. Les simulations montrent que ces protocoles sont pratiques et efficaces pour améliorer la résistance des réseaux contre les attaques en siphons, même en présence de collusion. Mots-clés : réseau de capteurs,attaque de siphon,routage en arbre in ria -0 03 55 87 3, v er si on 1 25 J an 2 00 9 Fighting Sinkholes Attacks in WSN 3
منابع مشابه
Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks
In this paper, we present an Intrusion Detection System designed for wireless sensor networks and show how it can be configured to detect Sinkhole attacks. A Sinkhole attack forms a serious threat to sensor networks. We study in depth this attack by presenting how it can be launched in realistic networks that use the MintRoute protocol of TinyOS. MintRoute is the most widely used routing protoc...
متن کاملIntrusion Detection Scheme against Sinkhole Attacks in Directed Diffusion Based Sensor Networks
Wireless Sensor Networks (WSNs) detect and report interesting events when they occur in the target region. These networks are vulnerable to security breach due to wireless communication and lack of infrastructure. In sinkhole attacks, an attacker attracts network traffic by forging or replaying routing messages through compromised nodes. Thus attracted traffic is used for selective forwarding, ...
متن کاملAn Energy-Efficient Method for Preventing Internal Sinkhole Attacks on INSENS based WSNs using Interactive Authentications
Wireless Sensor Networks (WSNs) are composed of many sensor nodes and a base station for collecting event information from a wide local area. However, an attacker can easily intrude into a network through external nodes by exploiting characteristics of wireless communication and the limited hardware resources of sensor nodes. Specifically, an attacker can intrude into a sensor network and launc...
متن کاملSurvey of Detection of Sinkhole Attack in Wireless Sensor Network
Wireless Sensor Network (WSN) is emerging as a prevailing technology due to its wide range of applications in military and civilian domains. These networks are easily prone to security attacks. Unattended installation of sensor nodes in the environment causes many security threats in the wireless sensor networks. There are many possible attacks on sensor network such as selective forwarding, ja...
متن کاملDealing with Sinkhole Attacks in Wireless Sensor Networks
Wireless sensor networks (WSNs) consist of many small wireless sensor nodes which are capable of sensing data and sending it to base stations. WSNs face resource constraints including limitations on communication, power, memory capacity and computational power. Also, since they are frequently deployed in hostile environments and left unattended, they are vulnerable to several attacks such as si...
متن کامل