A proposed security scheme against Denial of Service attacks in cluster-based wireless sensor networks

Traditional security schemes developed for sensor networks are not suitable for cluster-based wireless sensor networks (WSNs) because of their susceptibility to Denial of Service (DoS) attacks. In this paper, we provide a security scheme against DoS attacks (SSAD) in cluster-based WSNs. The scheme establishes trust management with energy character, which leads nodes to elect trusted cluster heads. Furthermore, a new type of vice cluster head node is proposed to detect betrayed cluster heads. Theoretical analyses and simulation results show that SSAD can prevent and detect malicious nodes with high probability of success

[1]  Azzedine Boukerche,et al.  Trust-based security for wireless ad hoc and sensor networks , 2007, Comput. Commun..

[2]  Huanguo Zhang,et al.  A New Hierarchical Trusted Model for Wireless Sensor Networks , 2006, 2006 International Conference on Computational Intelligence and Security.

[3]  Zhu Han,et al.  Defense of trust management vulnerabilities in distributed networks , 2008, IEEE Communications Magazine.

[4]  Wenjing Lou,et al.  LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[5]  Witold A. Krzymien,et al.  Analytical query response time evaluation for a two-level clustering hierarchy based wireless sensor network routing protocol , 2010, IEEE Communications Letters.

[6]  Heejo Lee,et al.  Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks , 2009, IEEE Transactions on Parallel and Distributed Systems.

[7]  Der-Jiunn Deng,et al.  Cluster-based secure communication mechanism in wireless ad hoc networks , 2010, IET Inf. Secur..

[8]  Wendi Heinzelman,et al.  Energy-efficient communication protocol for wireless microsensor networks , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[9]  Srdjan Capkun,et al.  Wormhole-Based Anti-Jamming Techniques in Sensor Networks , 2007 .

[10]  Srdjan Capkun,et al.  Wormhole-Based Antijamming Techniques in Sensor Networks , 2007, IEEE Transactions on Mobile Computing.

[11]  Hongyi Wu,et al.  Clustering and cluster-based routing protocol for delay-tolerant mobile networks , 2010, IEEE Transactions on Wireless Communications.

[12]  Jianhua Ma,et al.  Power-Aware and Reliable Sensor Selection Based on Trust for Wireless Sensor Networks , 2010, J. Commun..

[13]  Farouk Kamoun,et al.  CASAN: Clustering algorithm for security in ad hoc networks , 2008, Comput. Commun..

[14]  Niki Pissinou,et al.  Cluster-Based Reputation and Trust for Wireless Sensor Networks , 2007, 2007 4th IEEE Consumer Communications and Networking Conference.

[15]  N. Pissinou,et al.  A framework for trust-based cluster head election in wireless sensor networks , 2006, Second IEEE Workshop on Dependability and Security in Sensor Networks and Systems.

[16]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[17]  Ted Taekyoung Kwon,et al.  Secure and Efficient Broadcast Authentication in Wireless Sensor Networks , 2010, IEEE Transactions on Computers.

[18]  Uthman A. Baroudi,et al.  Efficient monitoring approach for reputation system-based trust-aware routing in wireless sensor networks , 2009, IET Commun..

[19]  Wenjing Lou,et al.  LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks , 2008, IEEE Trans. Mob. Comput..

[20]  Kang Yen,et al.  Sensor network security: a survey , 2009, IEEE Communications Surveys & Tutorials.

[21]  Julien Penders,et al.  Energy Harvesting for Autonomous Wireless Sensor Networks , 2010, IEEE Solid-State Circuits Magazine.