A Survey of Potential Security Issues in Existing Wireless Sensor Network Protocols

The increasing pervasiveness of wireless sensor networks (WSNs) in diverse application domains including critical infrastructure systems, sets an extremely high security bar in the design of WSN systems to exploit their full benefits, increasing trust while avoiding loss. Nevertheless, a combination of resource restrictions and the physical exposure of sensor devices inevitably cause such networks to be vulnerable to security threats, both external and internal. While several researchers have provided a set of open problems and challenges in WSN security and privacy, there is a gap in the systematic study of the security implications arising from the nature of existing communication protocols in WSNs. Therefore, we have carried out a deep-dive into the main security mechanisms and their effects on the most popular protocols and standards used in WSN deployments, i.e., IEEE 802.15.4, Berkeley media access control for low-power sensor networks, IPv6 over low-power wireless personal area networks, outing protocol for routing protocol for low-power and lossy networks (RPL), backpressure collection protocol, collection tree protocol, and constrained application protocol, where potential security threats and existing countermeasures are discussed at each layer of WSN stack. This paper culminates in a deeper analysis of network layer attacks deployed against the RPL routing protocol. We quantify the impact of individual attacks on the performance of a network using the Cooja network simulator. Finally, we discuss new research opportunities in network layer security and how to use Cooja as a benchmark for developing new defenses for WSN systems.

[1]  Reinhard German,et al.  Real-time enabled IEEE 802.15.4 sensor networks in industrial automation , 2009, 2009 IEEE International Symposium on Industrial Embedded Systems.

[2]  Levente Buttyán,et al.  VeRA - Version Number and Rank Authentication in RPL , 2011, 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems.

[3]  Soma Bandyopadhyay,et al.  LESS: Lightweight Establishment of Secure Session: A Cross-Layer Approach Using CoAP and DTLS-PSK Channel Encryption , 2015, 2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops.

[4]  Michael R. Lyu,et al.  On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Communications.

[5]  Xinyu Yang,et al.  A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications , 2017, IEEE Internet of Things Journal.

[6]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[7]  Yee Wei Law,et al.  Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols , 2005, TOSN.

[8]  Eric Rescorla,et al.  Datagram Transport Layer Security , 2006, RFC.

[9]  Alagan Anpalagan,et al.  Network Challenges for Cyber Physical Systems with Tiny Wireless Devices: A Case Study on Reliable Pipeline Condition Monitoring , 2015, Sensors.

[10]  Choong Seon Hong,et al.  Attack Model and Detection Scheme for Botnet on 6LoWPAN , 2009, APNOMS.

[11]  Radha Poovendran,et al.  Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[12]  Friedemann Mattern,et al.  From the Internet of Computers to the Internet of Things , 2010, From Active Data Management to Event-Based Systems and More.

[13]  Luigi Alfredo Grieco,et al.  Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.

[14]  Colin O'Flynn,et al.  Message Denial and Alteration on IEEE 802.15.4 Low-Power Radio Networks , 2011, 2011 4th IFIP International Conference on New Technologies, Mobility and Security.

[15]  Tian He,et al.  SIGF: a family of configurable, secure routing protocols for wireless sensor networks , 2006, SASN '06.

[16]  Bin Shen,et al.  A Study of MAC Protocols for WBANs , 2009, Sensors.

[17]  Heejo Lee,et al.  This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. INVITED PAPER Cyber–Physical Security of a Smart Grid Infrastructure , 2022 .

[18]  Hanno Wirtz,et al.  6LoWPAN fragmentation attacks and mitigation mechanisms , 2013, WiSec '13.

[19]  Bhaskar Krishnamachari,et al.  Trust-based backpressure routing in wireless sensor networks , 2015, Int. J. Sens. Networks.

[20]  HyunGon Kim,et al.  Protection Against Packet Fragmentation Attacks at 6LoWPAN Adaptation Layer , 2008, 2008 International Conference on Convergence and Hybrid Information Technology.

[21]  Dhiren Patel,et al.  A Survey on Internet of Things: Security and Privacy Issues , 2014 .

[22]  David E. Culler,et al.  Versatile low power media access for wireless sensor networks , 2004, SenSys '04.

[23]  Herbert J. Mattord,et al.  Principles of Information Security, 4th Edition , 2011 .

[24]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[25]  Mischa Dohler,et al.  A Security Framework for Routing over Low Power and Lossy Networks , 2012 .

[26]  Scott F. Midkiff,et al.  Effects of Denial-of-Sleep Attacks on Wireless Sensor Network MAC Protocols , 2009, IEEE Transactions on Vehicular Technology.

[27]  Thiemo Voigt,et al.  Routing Attacks and Countermeasures in the RPL-Based Internet of Things , 2013, Int. J. Distributed Sens. Networks.

[28]  Gregory J. Pottie,et al.  Protocols for self-organization of a wireless sensor network , 2000, IEEE Wirel. Commun..

[29]  Taeshik Shon,et al.  Wormhole attack prevention mechanism for RPL based LLN network , 2013, 2013 Fifth International Conference on Ubiquitous and Future Networks (ICUFN).

[30]  Insup Lee,et al.  Cyber-physical systems: The next computing revolution , 2010, Design Automation Conference.

[31]  Carlo Maria Medaglia,et al.  An Overview of Privacy and Security Issues in the Internet of Things , 2010 .

[32]  Remi Badonnel,et al.  Mitigation of topological inconsistency attacks in RPL-based low-power lossy networks , 2015, Int. J. Netw. Manag..

[33]  Philip Levis,et al.  Collection tree protocol , 2009, SenSys '09.

[34]  Cheng Li,et al.  Improvement of approach to detect sinkhole attacks in Wireless Sensor Networks , 2014 .

[35]  Adam Dunkels,et al.  Powertrace: Network-level Power Profiling for Low-power Wireless Networks , 2011 .

[36]  John A. Stankovic,et al.  Research Directions for the Internet of Things , 2014, IEEE Internet of Things Journal.

[37]  Elaine Shi,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[38]  Siarhei Kuryla,et al.  RPL: IPv6 Routing Protocol for Low power and Lossy Networks , 2010 .

[39]  Jonathan Loo,et al.  6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach , 2012, Int. J. Commun. Syst..

[40]  Elisa Bertino,et al.  Kinesis: a security incident response and prevention system for wireless sensor networks , 2014, SenSys.

[41]  Thiemo Voigt,et al.  SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.

[42]  Ragib Hasan,et al.  Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things , 2015, 2015 IEEE World Congress on Services.

[43]  Bhaskar Krishnamachari,et al.  Routing without routes: the backpressure collection protocol , 2010, IPSN '10.

[44]  Jorge Sá Silva,et al.  Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues , 2015, IEEE Communications Surveys & Tutorials.

[45]  Joel J. P. C. Rodrigues,et al.  A Network Access Control Framework for 6LoWPAN Networks , 2013, Sensors.

[46]  Matthias Wahlisch,et al.  Topology Authentication in RPL , 2013, 2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[47]  Lajos Hanzo,et al.  A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.

[48]  Dae-Man Han,et al.  Smart home energy management system using IEEE 802.15.4 and zigbee , 2010, IEEE Transactions on Consumer Electronics.

[49]  Jean-Philippe Vasseur,et al.  The Routing Protocol for Low-Power and Lossy Networks (RPL) Option for Carrying RPL Information in Data-Plane Datagrams , 2010, RFC.

[50]  Utz Roedig,et al.  Securing communication in 6LoWPAN with compressed IPsec , 2011, 2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS).

[51]  Kevin Weekly,et al.  Evaluating sinkhole defense techniques in RPL networks , 2012, 2012 20th IEEE International Conference on Network Protocols (ICNP).

[52]  Yong Wang,et al.  A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.

[53]  Sushil Jajodia,et al.  LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.

[54]  Remi Badonnel,et al.  Addressing DODAG inconsistency attacks in RPL networks , 2014, 2014 Global Information Infrastructure and Networking Symposium (GIIS).

[55]  Gianluca Dini,et al.  On experimentally evaluating the impact of security on IEEE 802.15.4 networks , 2011, 2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS).

[56]  Tongtong Li,et al.  A power efficient link-layer security protocol (LLSP) for wireless sensor networks , 2005, MILCOM 2005 - 2005 IEEE Military Communications Conference.

[57]  Jean-Marie Bonnin,et al.  Wireless sensor networks: a survey on recent developments and potential synergies , 2013, The Journal of Supercomputing.

[58]  Thiemo Voigt,et al.  Lithe: Lightweight Secure CoAP for the Internet of Things , 2013, IEEE Sensors Journal.

[59]  Stephen T. Kent,et al.  IP Encapsulating Security Payload (ESP) , 1995, RFC.

[60]  Yang Xiao,et al.  Security services and enhancements in the IEEE 802.15.4 wireless sensor networks , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..

[61]  Yalin E. Sagduyu,et al.  Securing the Backpressure Algorithm for Wireless Networks , 2017, IEEE Transactions on Mobile Computing.

[62]  Petr Hanacek,et al.  Simulation and Evaluation of CTP and Secure-CTP Protocols , 2010 .

[63]  Karel Heurtefeux,et al.  Enhancing RPL Resilience Against Routing Layer Insider Attacks , 2015, 2015 IEEE 29th International Conference on Advanced Information Networking and Applications.

[64]  Christoph Stasch,et al.  New Generation Sensor Web Enablement , 2011, Sensors.

[65]  Herbert J. Mattord,et al.  Principles of Information Security , 2004 .

[66]  Carsten Bormann,et al.  CoAP: An Application Protocol for Billions of Tiny Internet Nodes , 2012, IEEE Internet Computing.

[67]  Gennaro Boggia,et al.  Standardized Protocol Stack for the Internet of (Important) Things , 2013, IEEE Communications Surveys & Tutorials.