Intrusion Detection System to Overcome a Novel Form of Replay Attack (Data Replay) in Wireless Sensor Networks

Wireless Sensor Networks (WSNs) are widely and successfully employed in various application domains. They are easily deployed to collect valuable information and monitor potential environmental phenomena. However, the special nature of WSNs as well as their severe constraints and resource limitations make them vulnerable to various types of threats. Replay attack, is one example. According to this attack, the adversary intercepts and replays several times the same (old) message leading either to missed alerts or to false alerts. Many solutions have been proposed to mitigate message replay attack. However, all these solutions are of cryptographic natures and consider only external attacks exercising a trivial scenario of replay attack. In fact, the attacker could be a lot smarter, and in this case, it replays only the data field in the message while keeping the remaining fields updated. This novel form of replay attack is much more dangerous and difficult to be detected. We call this attack variant by data replay attack. As sensor nodes may be easily captured and compromised, the worst scenario occurs if data replay attack is performed by an internal intruder. In this paper we propose an efficient intrusion detection framework to overcome data replay attack in WSNs. The proposed intrusion detection system is named DR-IDS (Data Replay Intrusion Detection System). The performance evaluations performed under NS2 simulator show that the proposed solution is sufficiently robust.

[1]  Nicolae Tapus,et al.  Authentication and Anti-replay Security Protocol for Wireless Sensor Networks , 2010, 2010 Fifth International Conference on Systems and Networks Communications.

[2]  Dhiren R. Patel,et al.  Optimizing the Replay Protection at the Link Layer Security Framework in Wireless Sensor Networks , 2012, ArXiv.

[3]  Ricardo Dahab,et al.  SecLEACH - A Random Key Distribution Solution for Securing Clustered Sensor Networks , 2006, Fifth IEEE International Symposium on Network Computing and Applications (NCA'06).

[4]  Shafiullah Khan,et al.  Intrusion Detection Systems in Wireless Sensor Networks: A Review , 2013, Int. J. Distributed Sens. Networks.

[5]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[6]  M. Luk,et al.  MiniSec: A Secure Sensor Network Communication Architecture , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.

[7]  Samira Kalantary,et al.  A survey on architectures, protocols, applications, and management in wireless sensor networks , 2014 .

[8]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[9]  Young-Koo Lee,et al.  Energy efficient hybrid intrusion detection system for wireless sensor networks , 2010, 2010 International Conference on Electronics and Information Engineering.

[10]  Saleha Mubarak AlMheiri,et al.  Data link layer security protocols in Wireless Sensor Networks: A survey , 2013, 2013 10th IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL (ICNSC).

[11]  Chang Nian Zhang,et al.  A Security Protocol for Wireless Sensor Networks , 2008, WSAN.

[12]  Seema Verma,et al.  A Comparative Study of Key Management Protocols for WSN , 2014 .

[13]  David R. Raymond,et al.  Scalable, Cluster-based Anti-replay Protection for Wireless Sensor Networks , 2007, 2007 IEEE SMC Information Assurance and Security Workshop.

[14]  Yi Zhao,et al.  A Robust and Effienct Neighborhood-Based Security Protocol for Wireless Sensor Networks , 2010, 2010 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery.

[15]  Marimuthu Palaniswami,et al.  Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..

[16]  Wayne Goodridge,et al.  Security in Wireless Sensor Networks , 2012 .

[17]  I. Mahgoub,et al.  A Secure Hierarchical Routing Protocol for Wireless Sensor Networks , 2006, 2006 10th IEEE Singapore International Conference on Communication Systems.

[18]  Yong Wang,et al.  A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.

[19]  Rung Ching Chen,et al.  An Isolation Intrusion Detection System for Hierarchical Wireless Sensor Networks , 2010, J. Networks.

[20]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[21]  Jean-Marie Bonnin,et al.  Wireless sensor networks: a survey on recent developments and potential synergies , 2013, The Journal of Supercomputing.

[22]  Teerawat Issariyakul,et al.  Introduction to Network Simulator NS2 , 2008 .

[23]  Chee-Onn Chow,et al.  A Novel Secure Key Management Module for Hierarchical Clustering Wireless Sensor Networks , 2011, 2011 Third International Conference on Computational Intelligence, Modelling & Simulation.

[24]  David A. Wagner,et al.  Security considerations for IEEE 802.15.4 networks , 2004, WiSe '04.

[25]  Azeddine Bilami,et al.  FOR WIRELESS SENSOR NETWORK , 2012 .

[26]  Jim Alves-Foss,et al.  On Preventing Replay Attacks on Security Protocols , 2002 .

[27]  Shehzad Ashraf Ch,et al.  Ensuring reliability and freshness for Data Aggregation inWireless Sensor Networks , 2011 .

[28]  Dhiren R. Patel,et al.  FlexiSec: A Configurable Link Layer Security Architecture for Wireless Sensor Networks , 2012, ArXiv.

[29]  Ulrike Meyer,et al.  SecSyWiSe: A secure time synchronization scheme in wireless sensor networks , 2009, 2009 International Conference on Ultra Modern Telecommunications & Workshops.

[30]  Souheila Bouam,et al.  Secure Routing Optimization in Hierarchical Cluster-Based Wireless Sensor Networks , 2013, Int. J. Commun. Networks Inf. Secur..