Mollifying the Effect of Cloning, Sink Hole and Black Hole Attacksin Wireless Sensor Networks using Mobile Agents with Several Base Stations

dangerous attacks in wireless sensor network is handled in this proposed security solution. This paper proposes a lightweight and fast mobile agent technology based security solution against cloning attack, sinkhole attack and black hole attack for wireless sensor networks (WSNs).Recently mobile agents have been proposed in wireless sensor networks to reduce the communication cost especially over low bandwidth links. The proposed scheme is to defend against cloning attack, sink hole attacks and black hole attacks using mobile agents. In the cloning attack, adversary introduces replicas of compromised node. In the sinkhole attack, an adversary lures traffic through a compromised node. A black hole attack is a type of denial-of-service attack accomplished by dropping packets for a particular network destination in bulk (by dropping all packets).For dealing with black hole attacks more than one base station concept is also added with mobile agent concept to bring the best result. Here we implement a simulation-based model of our solution to recover from cloning attack, sinkhole attack and black hole attack in a Wireless Sensor Network. This mechanism does not require more energy.Comparison of communication overhead and cost were made between the proposed attack detection system using mobile agent against the security system in the absence of mobile agents. Comparison was also done between the proposed security system with the security system handling single attack. The mobile agents were developed using the Aglet.

[1]  Lu Ma,et al.  Mobile Agent System , 2006 .

[2]  Narayan C. Debnath,et al.  Countering sinkhole and black hole attacks on sensor networks using Dynamic Trust Management , 2008, 2008 IEEE Symposium on Computers and Communications.

[3]  Yih-Chun Hu Packet Leashes : A Defense against Wormhole Attacks in Wireless Ad Hoc Networks , 2001 .

[4]  Adrian Perrig,et al.  Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[5]  Dejan S. Milojicic,et al.  Trend Wars - Mobile agent applications , 1999, IEEE Concurrency.

[6]  Satyajayant Misra,et al.  BAMBi: Blackhole Attacks Mitigation with Multiple Base Stations in Wireless Sensor Networks , 2011, 2011 IEEE International Conference on Communications (ICC).

[7]  Zdravko Karakehayov Using REWARD to Detect Team Black-Hole Attacks in Wireless Sensor Networks , 2005 .

[8]  Jiannong Cao,et al.  Random-walk based approach to detect clone attacks in wireless sensor networks , 2010, IEEE Journal on Selected Areas in Communications.

[9]  Hairong Qi,et al.  Mobile-agent-based collaborative signal and information processing in sensor networks , 2003, Proc. IEEE.

[10]  Bo Yu,et al.  CHEMAS: Identify suspect nodes in selective forwarding attacks , 2007, J. Parallel Distributed Comput..

[11]  Lang Tong,et al.  Sensor networks with mobile agents , 2003, IEEE Military Communications Conference, 2003. MILCOM 2003..

[12]  Satyajayant Misra,et al.  Efficient anonymity schemes for clustered wireless sensor networks , 2006, Int. J. Sens. Networks.

[13]  Hewlett Packard Mobile agent applications , 1999 .

[14]  Jongwon Yoon,et al.  Multiple-Objective Metric for Placing Multiple Base Stations in Wireless Sensor Networks , 2007, 2007 2nd International Symposium on Wireless Pervasive Computing.

[15]  Srdjan Capkun,et al.  SECTOR: secure tracking of node encounters in multi-hop wireless networks , 2003, SASN '03.

[16]  A. Homaifar,et al.  Distributed sensor networks based on mobile agents paradigm , 2005, Proceedings of the Thirty-Seventh Southeastern Symposium on System Theory, 2005. SSST '05..

[17]  Saurabh Bagchi,et al.  Optimizing AES for embedded devices and wireless sensor networks , 2008 .

[18]  Yuguang Fang,et al.  Location-based compromise-tolerant security mechanisms for wireless sensor networks , 2006, IEEE Journal on Selected Areas in Communications.

[19]  Saurabh Bagchi,et al.  Optimizing AES for embedded devices and wireless sensor networks , 2008, TRIDENTCOM.

[20]  Thomas Magedanz,et al.  The Mobile Agent Technology , 1997, SOFSEM.

[21]  Z. Konjovic,et al.  Agent based system for network availability and vulnerability monitoring , 2011, 2011 IEEE 9th International Symposium on Intelligent Systems and Informatics.

[22]  Ichiro Satoh Mobile Agent Technology , 2001 .

[23]  Marco Furini,et al.  International Journal of Computer and Applications , 2010 .

[24]  Yuguang Fang,et al.  SPREAD: enhancing data confidentiality in mobile ad hoc networks , 2004, IEEE INFOCOM 2004.

[25]  Yuguang Fang,et al.  Securing wireless sensor networks: a survey , 2008, IEEE Communications Surveys & Tutorials.

[26]  Michael R. Lyu,et al.  On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Communications.

[27]  Wenjing Lou,et al.  H-SPREAD: a hybrid multipath scheme for secure and reliable data collection in wireless sensor networks , 2006, IEEE Transactions on Vehicular Technology.