A novel agent-based approach to detect sinkhole attacks in wireless sensor networks

Nowadays, Wireless Sensor Networks (WSNs) are widely used in many areas, especially in military operations and monitoring applications. Their wireless nature makes them very attractive to attackers, so its security system plays a vital role. Due to the limitations on resources, such as energy and storage, the security mechanism of WSNs have to be considered differently from traditional networks. Over the past years researchers have encouraged the use of mobile agents as a new and smart paradigm for distributed applications to overcome the limitations of sensor nodes. In this paper a defensive mechanism will be proposed against sinkhole attacks using mobile agents. We use mobile agents to aware every node from its trusted neighbors through a three-step negotiation so they do not listen to the traffics generated by malicious nodes. We evaluate our work in terms of energy consumption, packet loss rate, throughput and agent overhead caused by mobility and communication.

[1]  Michael R. Lyu,et al.  An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks , 2007, Comput. Commun..

[2]  P. Dananjayan,et al.  Detection of Sinkhole Attacks for Mobile Nodes in Heterogeneous Sensor Networks with Mobile Sinks , 2010 .

[3]  H. Chris Tseng,et al.  Sinkhole intrusion indicators in DSR MANETs , 2004, First International Conference on Broadband Networks.

[4]  Zhang Hongli Survey on wireless sensor network security , 2011 .

[5]  Ruttikorn Varakulsiripunth,et al.  Detecting Sinkhole attacks in wireless sensor networks , 2009, 2009 ICCAS-SICE.

[6]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[7]  Yang Xiang,et al.  Comprehensive Study of Selective Forwarding Attack in Wireless Sensor Networks , 2011 .

[8]  Min Song,et al.  Intrusion detection of sinkhole attacks in large-scale wireless sensor networks , 2010, 2010 IEEE International Conference on Wireless Communications, Networking and Information Security.

[9]  Nam N. Pham,et al.  A Comparison of Wireless Sensor Network Routing Protocols on an Experimental Testbed , 2006, IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'06).

[10]  Maria Calle,et al.  MAC Protocols Used by Wireless Sensor Networks and a General Method of Performance Evaluation , 2012, Int. J. Distributed Sens. Networks.

[11]  Jaydip Sen,et al.  A Survey on Wireless Sensor Network Security , 2009, Int. J. Commun. Networks Inf. Secur..

[12]  Elizabeth M. Belding-Royer,et al.  AODV routing protocol implementation design , 2004, 24th International Conference on Distributed Computing Systems Workshops, 2004. Proceedings..

[13]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[14]  Nick Antonopoulos,et al.  Military tactics in agent-based sinkhole attack detection for wireless ad hoc networks , 2010, Comput. Commun..

[15]  Wendi B. Heinzelman,et al.  Application-specific protocol architectures for wireless networks , 2000 .

[16]  Tassos Dimitriou,et al.  Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks , 2007, ALGOSENSORS.

[17]  G. Umamaheswari,et al.  Detection of Sinkhole Attack in Wireless Sensor Networks Using Message Digest Algorithms , 2011, 2011 International Conference on Process Automation, Control and Computing.

[18]  Hairong Qi,et al.  Mobile-agent-based collaborative signal and information processing in sensor networks , 2003, Proc. IEEE.

[19]  Victor C. M. Leung,et al.  Mobile Agent Based Wireless Sensor Networks , 2006, J. Comput..

[20]  G. Mahadevan,et al.  A non cryptographic method of sink hole attack detection in wireless sensor networks , 2011, 2011 International Conference on Recent Trends in Information Technology (ICRTIT).

[21]  Yih-Chun Hu,et al.  Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.