Energy-balancing method to detect denial of service attacks in wireless sensor networks

The use of sensor networks has increased rapidly over the last years. Due to their low resources, sensors come along with new issues regarding network security and energy consumption. Focusing on the network availability, previous studies proposed to protect the network against denial of service attacks with the use of traffic monitoring agents on some nodes. But if the control nodes go down or get compromised, they leave the network unprotected. To better fight against attacks, we try to enhance this solution by introducing an energy-aware and secure method to select these monitoring nodes (called cNodes) in a clustered wireless sensor network. Our election process is done in accordance to their remaining reserves: nodes with the higher residual energy are selected. We discuss limitations of this deterministic process concerning security and cluster coverage, and suggest as a workaround to designate new control nodes (called vNodes). Those vNodes are responsible for monitoring the cNodes by periodically enquiring about their remaining energy and ensuring that they do not lie during the election process (in attempt to keep their cNode role). Finally, we present some experimental results obtained with the ns-3 simulator in order to analyze the impact of our proposal on the energy repartition in the network.

[1]  Alireza Keshavarz-Haddad,et al.  Watchdog-LEACH: A new method based on LEACH protocol to Secure Clustered Wireless Sensor Networks , 2013, ArXiv.

[2]  Yang Xiao,et al.  Secure data aggregation in wireless sensor networks: A comprehensive overview , 2009, Comput. Networks.

[3]  Shio Kumar Singh,et al.  A Survey on Network Security and Attack Defense Mechanism For Wireless Sensor Networks , 2011 .

[4]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[5]  Saurabh Singh,et al.  Security For Wireless Sensor Network , 2011 .

[6]  Luay A. Wahsheh,et al.  Security of Wireless Sensor Networks , 2011, 2011 Eighth International Conference on Information Technology: New Generations.

[7]  Sidi-Mohammed Senouci,et al.  An efficient intrusion detection framework in cluster-based wireless sensor networks , 2013, Secur. Commun. Networks.

[8]  Paolo Ballarini,et al.  Modeling tools for detecting DoS attacks in WSNs , 2013, Secur. Commun. Networks.

[9]  Ossama Younis,et al.  HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks , 2004, IEEE Transactions on Mobile Computing.

[10]  Jun Zheng,et al.  Wireless Sensor Networks: A Networking Perspective , 2009 .

[11]  M. Guechari,et al.  Dynamic solution for detecting Denial of Service attacks in wireless sensor networks , 2012, 2012 IEEE International Conference on Communications (ICC).

[12]  Hacène Fouchal,et al.  Classification of usual protocols over Wireless Sensor Networks , 2012, 2012 IEEE International Conference on Communications (ICC).

[13]  Subhash Challa,et al.  Survey of trust models in different network domains , 2010, ArXiv.

[14]  Sarma B. K. Vrudhula,et al.  An Analytical High-Level Battery Model for Use in Energy Management of Portable Electronic Systems , 2001, ICCAD.

[15]  Hacène Fouchal,et al.  Slot scheduling for wireless sensor networks , 2012, J. Comput. Methods Sci. Eng..

[16]  Dirk Timmermann,et al.  Low energy adaptive clustering hierarchy with deterministic cluster-head selection , 2002, 4th International Workshop on Mobile and Wireless Communications Network.

[17]  Yang Xiao,et al.  Secure data aggregation without persistent cryptographic operations in wireless sensor networks , 2006, 2006 IEEE International Performance Computing and Communications Conference.

[18]  Hacène Fouchal,et al.  Distributed backtracking algorithm based on tree decomposition over wireless sensor networks , 2013, Concurr. Comput. Pract. Exp..

[19]  Rodrigo Roman,et al.  A Survey on the Applicability of Trust Management Systems for Wireless Sensor Networks , 2007, Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2007).