Intrusion detection of sinkhole attacks in large-scale wireless sensor networks

In wireless sensor networks, an adversary may deploy malicious nodes into the network and launch various attacks. These nodes are collectively called compromised nodes. In this paper, we first analyze the unique features of wireless sensor networks and discuss the challenges for compromised nodes detection. Then we propose a novel algorithm for detecting sinkhole attacks for large-scale wireless sensor networks. We formulate the detection problem as a change-point detection problem. Specifically, we monitor the CPU usage of each sensor node and analyze the consistency of the CPU usage. Thus, the proposed algorithm is able to differentiate between the malicious and the legitimate nodes. Extensive simulations have been conducted to verify the effectiveness of the algorithm.

[1]  Antonio Alfredo Ferreira Loureiro,et al.  Malicious node detection in wireless sensor networks , 2004, 18th International Parallel and Distributed Processing Symposium, 2004. Proceedings..

[2]  B. Brodsky,et al.  Nonparametric Methods in Change Point Problems , 1993 .

[3]  Sencun Zhu,et al.  A Chain Reaction DoS Attack on 3G Networks: Analysis and Defenses , 2009, IEEE INFOCOM 2009.

[4]  Min Song,et al.  Detecting Compromised Nodes in Wireless Sensor Networks , 2007 .

[5]  Qing Zhang,et al.  A Framework for Identifying Compromised Nodes in Sensor Networks , 2006, 2006 Securecomm and Workshops.

[6]  Sencun Zhu,et al.  Sensor node compromise detection: the location perspective , 2007, IWCMC.

[7]  Mansoor Alam,et al.  Compromised Sensor Nodes Detection: A Quantitative Approach , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.

[8]  Huirong Fu,et al.  Intrusion Detection System for Wireless Sensor Networks , 2008, Security and Management.

[9]  Michael R. Lyu,et al.  On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Communications.

[10]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[11]  Tassos Dimitriou,et al.  Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks , 2007, ALGOSENSORS.

[12]  Ahmad Khonsari,et al.  Misbehavior resilient multi-path data transmission in mobile ad-hoc networks , 2006, SASN '06.

[13]  Yao Zheng,et al.  The Relation of CMM and Software Lifecycle Model , 2007 .

[14]  Qing Zhang,et al.  A Framework for Identifying Compromised Nodes in Wireless Sensor Networks , 2008, TSEC.