EYES: Mitigating forwarding misbehavior in energy harvesting motivated networks

Abstract Energy harvesting motivated networks (EHNets) has been becoming increasingly popular in the presence of Internet-of-Things (IoT). Each self-sustainable node periodically harvests energy from an immediate environment but it is admittedly vulnerable to a Denial-of-Service (DoS) attack in the EHNets. In this paper, we propose a novel countermeasure, called EYES, to the forwarding misbehavior of multiple colluding malicious nodes in the realm of EHNets. Under the charge-and-spend harvesting policy, we first establish a set of adversarial scenarios, analyze its forwarding operations, and identify vulnerable cases. The EYES consists of two schemes, SlyDog and LazyDog, and cooperatively detects the forwarding misbehavior. In the SlyDog, each node actively disguises itself as an energy harvesting node and stealthily monitors the forwarding operations of adjacent nodes. In the LazyDog, however, each node periodically requests the number of overheard packets from its adjacent nodes and validates any prior uncertain forwarding operation. The combination of two schemes can efficiently detect the forwarding misbehaviors of colluding malicious nodes and quickly isolate them from the network. We also present a simple analytical model and its numerical result in terms of detection rate. We evaluate the proposed countermeasure through extensive simulation experiments using the OMNeT++ and compare its performance with two existing schemes, the hop-by-hop cooperative detection (HCD) and Watchdog. Simulation results show that the EYES provides 70–92% detection rate and achieves 23–60% lower detection latency compared to the HCD and Watchdog. The EYES also shows a competitive performance in packet delivery ratio.

[1]  Pramod K. Varshney,et al.  An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs , 2007, IEEE Transactions on Mobile Computing.

[2]  Elisa Bertino,et al.  Node or Link? Fine-Grained Analysis of Packet-Loss Attacks in Wireless Sensor Networks , 2016, TOSN.

[3]  Dimitrios D. Vergados,et al.  Energy-Efficient Routing Protocols in Wireless Sensor Networks: A Survey , 2013, IEEE Communications Surveys & Tutorials.

[4]  Xiaohui Liang,et al.  Side Channel Monitoring: Packet Drop Attack Detection in Wireless Ad Hoc Networks , 2011, 2011 IEEE International Conference on Communications (ICC).

[5]  Vashek Matyas,et al.  Towards better selective forwarding and delay attacks detection in wireless sensor networks , 2016, 2016 IEEE 13th International Conference on Networking, Sensing, and Control (ICNSC).

[6]  Sunho Lim,et al.  Hop-by-Hop cooperative detection of selective forwarding attacks in energy harvesting wireless sensor networks , 2015, 2015 International Conference on Computing, Networking and Communications (ICNC).

[7]  Cong Pu,et al.  Mitigating Forwarding misbehaviors in RPL-based low power and lossy networks , 2018, 2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC).

[8]  Bo Yu,et al.  CHEMAS: Identify suspect nodes in selective forwarding attacks , 2007, J. Parallel Distributed Comput..

[9]  Joseph A. Paradiso,et al.  Human Generated Power for Mobile Electronics , 2004 .

[10]  Isaac Woungang,et al.  Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach , 2015, IEEE Systems Journal.

[11]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[12]  Cong Wang,et al.  Storage-Less and Converter-Less Photovoltaic Energy Harvesting With Maximum Power Point Tracking for Internet of Things , 2016, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[13]  Sunho Lim,et al.  Analysis of Energy Harvesting for Vibration-Motivated Wireless Sensor Networks , 2010, ICWN.

[14]  Marimuthu Palaniswami,et al.  Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..

[15]  Shahriar Mirabbasi,et al.  Wireless Energy Harvesting for Internet of Things , 2014 .

[16]  Thad Starner,et al.  Human-Powered Wearable Computing , 1996, IBM Syst. J..

[17]  Leonidas J. Guibas,et al.  Locating and Bypassing Holes in Sensor Networks , 2006, Mob. Networks Appl..

[18]  Hwee Pink Tan,et al.  Design and performance analysis of MAC schemes for Wireless Sensor Networks Powered by Ambient Energy Harvesting , 2011, Ad Hoc Networks.

[19]  Nitin H. Vaidya,et al.  Efficient network camouflaging in wireless networks , 2005 .

[20]  Xuemin Shen,et al.  Exploiting channel-aware reputation system against selective forwarding attacks in WSNs , 2014, 2014 IEEE Global Communications Conference.

[21]  Scott F. Midkiff,et al.  Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses , 2008, IEEE Pervasive Computing.

[22]  Yu Zhang,et al.  AMD: Audit-Based Misbehavior Detection in Wireless Ad Hoc Networks , 2016, IEEE Transactions on Mobile Computing.

[23]  Winston K. G. Seah,et al.  Multi-tier probabilistic polling in Wireless Sensor Networks powered by energy harvesting , 2011, 2011 Seventh International Conference on Intelligent Sensors, Sensor Networks and Information Processing.

[24]  Cong Pu,et al.  Spy vs. spy: Camouflage-based active detection in energy harvesting motivated networks , 2015, MILCOM 2015 - 2015 IEEE Military Communications Conference.

[25]  Yan Lindsay Sun,et al.  Trust Management for Defending On-Off Attacks , 2015, IEEE Transactions on Parallel and Distributed Systems.

[26]  Gil Zussman,et al.  Movers and Shakers: Kinetic Energy Harvesting for the Internet of Things , 2013, IEEE Journal on Selected Areas in Communications.

[27]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[28]  Rutvij H. Jhaveri,et al.  A sequence number based bait detection scheme to thwart grayhole attack in mobile ad hoc networks , 2015, Wirel. Networks.

[29]  K. Selvakumar,et al.  Eaack- A Secure Intrusion Detection System for Manets , 2015 .

[30]  Yan Zhang,et al.  Hybridizing energy conversion and storage in a mechanical-to-electrochemical process for self-charging power cell. , 2012, Nano letters.

[31]  Cong Pu,et al.  Lightweight Forwarding Protocols in Energy Harvesting Wireless Sensor Networks , 2014, 2014 IEEE Military Communications Conference.

[32]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[33]  Victor C. M. Leung,et al.  FADE: Forwarding Assessment Based Detection of Collaborative Grey Hole Attacks in WMNs , 2013, IEEE Transactions on Wireless Communications.

[34]  Yu Cheng,et al.  Mitigating selective forwarding attacks with a channel-aware approach in WMNS , 2010, IEEE Transactions on Wireless Communications.

[35]  Zhong Lin Wang Nanogenerators for Self-powered Devices and Systems , 2011 .

[36]  K. Ashok Babu,et al.  Adaptive and Channel-Aware Detection of Selective Forwarding Attacks in Wireless Sensor Networks , 2017 .

[37]  Robin Kravets,et al.  Power management techniques for mobile communication , 1998, MobiCom '98.

[38]  Jianliang Xu,et al.  Extending Network Lifetime for Precision-Constrained Data Aggregation in Wireless Sensor Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[39]  Eui-nam Huh,et al.  Detecting Selective Forwarding Attacks in Wireless Sensor Networks Using Two-hops Neighbor Knowledge , 2008, 2008 Seventh IEEE International Symposium on Network Computing and Applications.

[40]  Shivakant Mishra,et al.  INSENS: Intrusion-Tolerant Routing in Wireless Sensor Networks , 2002 .

[41]  Venkata M. Mulpuru,et al.  Detecting selective forwarding attacks in wireless sensor networks , 2008 .

[42]  Cong Pu,et al.  A Light-Weight Countermeasure to Forwarding Misbehavior in Wireless Sensor Networks: Design, Analysis, and Evaluation , 2018, IEEE Systems Journal.

[43]  Cong Pu,et al.  Light-Weight Forwarding Protocols in Energy Harvesting Wireless Sensor Networks , .

[44]  Tang Ming . Wei Lian. Si Tuo Lin Si,et al.  Cryptography and Network Security - Principles and Practice , 2015 .