Sensor wars: detecting and defending against spam attacks in wireless sensor networks

Anti-nodes deployed inside a wireless sensor network can frequently generate dummy data packets that make the nodes relaying them deplete their energy. Especially the nodes closer to the sink fail sooner, because they convey more data packets. This causes the sink to be disconnected from the sensor network. The counter-measures for this type of attacks, namely spam attacks, should consider that the sensor nodes have limited energy, computational power and memory. In this paper, we propose detect and defend against spams (DADS) scheme. In DADS the vicinity of the detected malicious node is notified about the quarantine region, and nodes do not relay unauthenticated messages coming from a node in the quarantine region. Our experiments show that our scheme fits the requirements of the sensor network.

[1]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[2]  Vesa Karpijoki Security in Ad Hoc Networks , 2001 .

[3]  Kai Li,et al.  A directionality based location discovery scheme for wireless sensor networks , 2002, WSNA '02.

[4]  Frank Stajano,et al.  The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.

[5]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[6]  Mike Chen,et al.  Security and Deployment Issues in a Sensor Network , 2000 .

[7]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[8]  William Stallings,et al.  Cryptography and network security , 1998 .

[9]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[10]  David E. Culler,et al.  System architecture directions for networked sensors , 2000, SIGP.

[11]  Tarek F. Abdelzaher,et al.  Energy-conserving data placement and asynchronous multicast in wireless sensor networks , 2003, MobiSys '03.

[12]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[13]  Hugo Krawczyk,et al.  HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.

[14]  David E. Culler,et al.  SPINS: security protocols for sensor networks , 2001, MobiCom '01.

[15]  Pietro Michiardi,et al.  Security in ad hoc networks , 2003 .

[16]  Mani B. Srivastava,et al.  The bits and flops of the n-hop multilateration primitive for node localization problems , 2002, WSNA '02.

[17]  Jean-Pierre Hubaux,et al.  The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.

[18]  Deborah Estrin,et al.  Directed diffusion: a scalable and robust communication paradigm for sensor networks , 2000, MobiCom '00.