Detection and mitigation of sinkhole attacks in wireless sensor networks

With the advances in technology, there has been an increasing interest in the use of wireless sensor networks (WSNs). WSNs are vulnerable to a wide class of attacks among which sinkhole attack puts severe threats to the security of such networks. This paper proposes two approaches to detect and mitigate such attack in WSNs. It provides a centralized approach to detect suspicious regions in the network using geostatistical hazard model. Furthermore, a distributed monitoring approach has been proposed to explore every neighborhood in the network to detect malicious behaviors. Our simulation experiments validate the correctness and efficiency of the proposed approaches.

[1]  Michael R. Lyu,et al.  An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks , 2007, Comput. Commun..

[2]  Hyunseung Choo,et al.  Virtual Convex Polygon Based Hole Boundary Detection and Time Delay Based Hole Detour Scheme in WSNs , 2009, HCI.

[3]  David A. Wagner,et al.  Security in wireless sensor networks , 2004, SASN '04.

[4]  Narayan C. Debnath,et al.  Countering sinkhole and black hole attacks on sensor networks using Dynamic Trust Management , 2008, 2008 IEEE Symposium on Computers and Communications.

[5]  Choong Seon Hong,et al.  A sinkhole attack detection mechanism for LQI based mesh routing in WSN , 2009, 2009 International Conference on Information Networking.

[6]  Leonidas J. Guibas,et al.  Locating and bypassing routing holes in sensor networks , 2004, IEEE INFOCOM 2004.

[7]  Sanjay Jha,et al.  Confidential and Secure Broadcast in Wireless Sensor Networks , 2007, 2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications.

[8]  C. Vargas,et al.  Network Coding for Detection and Defense of Sink Holes in Wireless Reconfigurable Networks , 2008, 2008 Third International Conference on Systems and Networks Communications.

[9]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[10]  A. Varga,et al.  THE OMNET++ DISCRETE EVENT SIMULATION SYSTEM , 2003 .

[11]  Ye Tian,et al.  Efficient Hole Detour Scheme for Geographic Routing in Wireless Sensor Networks , 2008, VTC Spring 2008 - IEEE Vehicular Technology Conference.

[12]  Tassos Dimitriou,et al.  Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks , 2007, ALGOSENSORS.

[13]  Tassos Dimitriou,et al.  Launching a Sinkhole Attack in Wireless Sensor Networks; The Intruder Side , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.

[14]  Panganamala Ramana Kumar,et al.  Scaling Laws for Ad Hoc Wireless Networks: An Information Theoretic Approach , 2006, Found. Trends Netw..

[15]  Adrian Perrig,et al.  Security and Privacy in Sensor Networks , 2003, Computer.

[16]  Hyunseung Choo,et al.  Bypassing Hole Scheme Using Observer Packets for Geographic Routing in WSNs , 2011, The International Conference on Information Networking 2011 (ICOIN2011).

[17]  Athanassios Boulis,et al.  Performance and scalability evaluation of the Castalia wireless sensor network simulator , 2010, SimuTools.

[18]  Raquel Menezes,et al.  Extrema Propagation: Fast Distributed Estimation of Sums and Network Sizes , 2012, IEEE Transactions on Parallel and Distributed Systems.

[19]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[20]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[21]  Ravi Prakash,et al.  Max-min d-cluster formation in wireless ad hoc networks , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).

[22]  B. Carlin,et al.  Frailty modeling for spatially correlated survival data, with application to infant mortality in Minnesota. , 2003, Biostatistics.

[23]  P. Diggle,et al.  Model‐based geostatistics , 2007 .

[24]  Wendi Heinzelman,et al.  Proceedings of the 33rd Hawaii International Conference on System Sciences- 2000 Energy-Efficient Communication Protocol for Wireless Microsensor Networks , 2022 .

[25]  Anantha P. Chandrakasan,et al.  An application-specific protocol architecture for wireless microsensor networks , 2002, IEEE Trans. Wirel. Commun..

[26]  Ivan Stojmenovic,et al.  Design Guidelines for Maximizing Lifetime and Avoiding Energy Holes in Sensor Networks with Uniform Distribution and Uniform Reporting , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[27]  Gavriel Salvendy,et al.  Designing information environments , 2009 .

[28]  Catherine Rosenberg,et al.  A minimum cost heterogeneous sensor network with a lifetime constraint , 2005, IEEE Transactions on Mobile Computing.