Split-Network in Wireless Sensor Network: Attack and Countermeasures

Wireless Sensor Network usually is deployed open environment to collect some sensitive information and has special features of its own are different from traditional network, which is vulnerable to internal and external attacks. Whole network can be split up into many separate subnets which cannot communicate with each other because some vital sensor nodes are attacked. This paper proposed an effective countermeasure based on ARMA prediction model and frequency hopping to react against split-network attack. ARMA model is used to evaluate the behavior of sensor nodes. Frequency hopping makes the communication frequency of the network escape from attack frequency. Then wireless sensor network is integrated into single network from split-network. Simulation results show the proposed countermeasure significantly reduces the success rate of split-network attack and increases the lifetime of network.

[1]  Madjid Merabti,et al.  Security in Wireless Sensor Networks , 2010, Handbook of Information and Communication Security.

[2]  Srdjan Capkun,et al.  Efficient uncoordinated FHSS anti-jamming communication , 2009, MobiHoc '09.

[3]  Shuang-Hua Yang,et al.  A scheme for preventing denial of service attacks on wireless sensor networks , 2009, 2009 35th Annual Conference of IEEE Industrial Electronics.

[4]  Mehmet Celenk,et al.  Predictive Network Anomaly Detection and Visualization , 2010, IEEE Transactions on Information Forensics and Security.

[5]  Srikanth V. Krishnamurthy,et al.  Denial of Service Attacks in Wireless Networks: The Case of Jammers , 2011, IEEE Communications Surveys & Tutorials.

[6]  Robert Simon,et al.  A multi-channel defense against jamming attacks in wireless sensor networks , 2007, Q2SWinet '07.

[7]  Wenyuan Xu,et al.  Jamming sensor networks: attack and defense strategies , 2006, IEEE Network.

[8]  David Richard Raymond Denial-of-Sleep Vulnerabilities and Defenses in Wireless Sensor Network MAC Protocols , 2008 .

[9]  Wenyuan Xu,et al.  Defending wireless sensor networks from radio interference through channel adaptation , 2008, TOSN.

[10]  Scott F. Midkiff,et al.  Clustered Adaptive Rate Limiting: Defeating Denial-of-Sleep Attacks in Wireless Sensor Networks , 2007, MILCOM 2007 - IEEE Military Communications Conference.

[11]  Wenyuan Xu,et al.  Channel Surfing: Defending Wireless Sensor Networks from Interference , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.

[12]  Mahmut T. Kandemir,et al.  The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense , 2006, Int. J. Distributed Sens. Networks.

[13]  Scott F. Midkiff,et al.  Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses , 2008, IEEE Pervasive Computing.

[14]  Hans-Joachim Hof,et al.  Fighting Insomnia: A Secure Wake-Up Scheme for Wireless Sensor Networks , 2009, 2009 Third International Conference on Emerging Security Information, Systems and Technologies.

[15]  Charalampos Konstantopoulos,et al.  A survey on jamming attacks and countermeasures in WSNs , 2009, IEEE Communications Surveys & Tutorials.

[16]  Mehmet Celenk,et al.  Anomaly prediction in network traffic using adaptive Wiener filtering and ARMA modeling , 2008, 2008 IEEE International Conference on Systems, Man and Cybernetics.

[17]  Aristides Mpitziopoulos,et al.  An effective defensive node against jamming attacks in sensor networks , 2009, Secur. Commun. Networks.

[18]  Scott F. Midkiff,et al.  Effects of Denial-of-Sleep Attacks on Wireless Sensor Network MAC Protocols , 2009, IEEE Transactions on Vehicular Technology.