Using network traffic to infer compromised neighbors in wireless sensor nodes

This work introduces a novel security framework for wireless sensor networks (WSN) based on dynamic duty cycle, which allows nodes to detect their compromised neighbors based on unanticipated fluctuations in network traffic send rate over time. Our framework was assessed by its ability to detect advanced WSN threats (e.g., active, passive, or both attacks). One of the benefits of this framework is that it reduces all threats to unanticipated power dissipation. In other words, the framework assumes any neighbor not conforming to predicted power levels has been communicating with an unauthorized node, and thus is compromised. This threat model is emulated by applying pseudo random but bound (large to small) power dissipations to arbitrary nodes. Simulation results demonstrated that this framework was effective in detecting and isolating compromised sensor nodes.

[1]  M. B. Ghaznavi-Ghoushchi,et al.  An Improved Watchdog Technique Based On Power-Aware Hierarchical Design For Ids In Wireless Sensor Networks , 2012, ArXiv.

[2]  Miao Xie,et al.  Anomaly Detection in Wireless Sensor Networks , 2013 .

[3]  Wendi Heinzelman,et al.  Energy-efficient communication protocol for wireless microsensor networks , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[4]  Subhash Challa,et al.  Survey of trust models in different network domains , 2010, ArXiv.

[5]  N. Pissinou,et al.  A framework for trust-based cluster head election in wireless sensor networks , 2006, Second IEEE Workshop on Dependability and Security in Sensor Networks and Systems.

[6]  Daniel Curiac,et al.  Malicious Node Detection in Wireless Sensor Networks Using an Autoregression Technique , 2007, International Conference on Networking and Services (ICNS '07).

[7]  Niki Pissinou,et al.  Cluster-Based Reputation and Trust for Wireless Sensor Networks , 2007, 2007 4th IEEE Consumer Communications and Networking Conference.

[8]  Yaqiong Liu,et al.  An Improved Intrusion Detection Scheme Based on Weighted Trust Evaluation for Wireless Sensor Networks , 2010, 2010 Proceedings of the 5th International Conference on Ubiquitous Information Technologies and Applications.

[9]  Garth V. Crosby,et al.  Using network traffic to infer power levels in wireless sensor nodes , 2014, 2014 International Conference on Computing, Networking and Communications (ICNC).

[10]  G. Padmavathi,et al.  A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks , 2009, ArXiv.