Hello Flood Attack and its Countermeasures in Wireless Sensor Networks

Wireless sensor network have emerged as an important application of the ad-hoc networks paradigm, such as for monitoring physical environment. These sensor networks have limitations of system resources like battery power, communication range and processing capability. Low processing power and wireless connectivity make such networks vulnerable to various types of network attacks. One of them is hello flood attack, in which an adversary, which is not a legal node in the network, can flood hello request to any legitimate node and break the security of WSN. The current solutions for these types of attacks are mainly cryptographic, which suffer from heavy computational complexity. Hence they are less suitable for wireless sensor networks. In this paper a method based on signal strength has been proposed to detect and prevent hello flood attack. Nodes have been classified as friend and stranger based on the signal strength. Short client puzzles that require less computational power and battery power have been used to check the validity of suspicious nodes.

[1]  David C. Yen,et al.  Taxonomy and survey of RFID anti-collision protocols , 2006, Comput. Commun..

[2]  Kun-Ming Yu,et al.  A Density-Based Algorithm for Redundant Reader Elimination in a RFID Network , 2008, 2008 Second International Conference on Future Generation Communication and Networking.

[3]  W. W. Royce,et al.  Managing the development of large software systems , 1970 .

[4]  Dekang Lin,et al.  An Information-Theoretic Definition of Similarity , 1998, ICML.

[5]  Martha Palmer,et al.  Verb Semantics and Lexical Selection , 1994, ACL.

[6]  Ananth Grama,et al.  Redundant reader elimination in RFID systems , 2005, 2005 Second Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2005. IEEE SECON 2005..

[7]  V. Daniel Hunt,et al.  RFID: A Guide to Radio Frequency Identification , 2007 .

[8]  Kent L. Beck,et al.  Extreme programming explained - embrace change , 1990 .

[9]  Torsten Suel,et al.  Design and implementation of a high-performance distributed Web crawler , 2002, Proceedings 18th International Conference on Data Engineering.

[10]  Mohammad Ilyas,et al.  Secure Routing in Wireless Sensor Networks , 2010, Handbook of Information and Communication Security.

[11]  Marc Najork,et al.  Mercator: A scalable, extensible Web crawler , 1999, World Wide Web.

[12]  Giuseppe Pirrò,et al.  A semantic similarity metric combining features and intrinsic information content , 2009, Data Knowl. Eng..

[13]  Tony Veale,et al.  An Intrinsic Information Content Metric for Semantic Similarity in WordNet , 2004, ECAI.

[14]  Tarek A. El-Sadany,et al.  An Arabic Morphological System , 1989, IBM Syst. J..

[15]  Daniel W. Engels,et al.  Colorwave: a MAC for RFID reader networks , 2003, 2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003..

[16]  Daniel M. Dobkin,et al.  The RF in RFID: Passive UHF RFID in Practice , 2007 .

[17]  Graeme Hirst,et al.  Semantic distance in WordNet: An experimental, application-oriented evaluation of five measures , 2004 .

[18]  Troels Andreasen,et al.  Domain-Specific Similarity and Retrieval , 2005 .

[19]  Fouad A. Tobagi,et al.  Capacity of an IEEE 802.11b wireless LAN supporting VoIP , 2004, 2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577).

[20]  Kimmo Koskenniemi,et al.  A General Computational Model for Word-Form Recognition and Production , 1984, ACL.

[21]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[22]  Ching-Hsien Hsu,et al.  A Layered Optimization Approach for Redundant Reader Elimination in Wireless RFID Networks , 2007, The 2nd IEEE Asia-Pacific Service Computing Conference (APSCC 2007).

[23]  Liu Hongwei,et al.  Malicious node detection in wireless sensor networks using time series analysis on node reputation , 2012 .

[24]  Luis E. Palafox,et al.  Chapter XXXIV Security in Wireless Sensor Networks , 2008 .

[25]  Philip Resnik,et al.  Semantic Similarity in a Taxonomy: An Information-Based Measure and its Application to Problems of Ambiguity in Natural Language , 1999, J. Artif. Intell. Res..

[26]  Henrik Bulskov Styltsvig Ontology-based Information Retrieval , 2006 .

[27]  Hadj Ahmed Cherkaoui A Computational Lexeme-Based Treatment of Arabic Morphology , 2001 .

[28]  G. Miller,et al.  Contextual correlates of semantic similarity , 1991 .

[29]  Jun-Liang Chen,et al.  The Simulation and Analysis of Algorithms for Redundant Reader Elimination in RFID System , 2009, 2009 Third UKSim European Symposium on Computer Modeling and Simulation.

[30]  Giuseppe Portelli,et al.  Design and implementation of a Bluetooth ad hoc network for indoor positioning , 2005, IEE Proc. Softw..

[31]  Hector Garcia-Molina,et al.  Parallel crawlers , 2002, WWW.

[32]  S. Iyer,et al.  Mitigating the reader collision problem in RFID networks with mobile readers , 2005, 2005 13th IEEE International Conference on Networks Jointly held with the 2005 IEEE 7th Malaysia International Conf on Communic.

[33]  J.E. Mazo,et al.  Digital communications , 1985, Proceedings of the IEEE.

[34]  JaatunMartin Gilje,et al.  Agile Software Development , 2002, Comput. Sci. Educ..

[35]  A. Goldsmith,et al.  Variable-rate variable-power MQAM for fading channels , 1996, Proceedings of Vehicular Technology Conference - VTC.

[36]  Daniel W. Engels,et al.  HiQ: a hierarchical Q-learning algorithm to solve the reader collision problem , 2006, International Symposium on Applications and the Internet Workshops (SAINTW'06).

[37]  Roy Rada,et al.  Ranking documents with a thesaurus , 1989, JASIS.

[38]  Kang G. Shin,et al.  Goodput Analysis and Link Adaptation for IEEE 802.11a Wireless LANs , 2002, IEEE Trans. Mob. Comput..

[39]  Sunghyun Choi,et al.  Link adaptation strategy for IEEE 802.11 WLAN via received signal strength measurement , 2003, IEEE International Conference on Communications, 2003. ICC '03..

[40]  Ygal Bendavid,et al.  Proof of concept of an RFID-enabled supply chain in a B2B e-commerce environment , 2006, ICEC '06.

[41]  Jianbin Hu,et al.  Enhancing Base Station Security Against DoS Attacks in Wireless Sensor Networks , 2006, 2006 International Conference on Wireless Communications, Networking and Mobile Computing.

[42]  Doo Seop Eom,et al.  DiCa: Distributed Tag Access with Collision-Avoidance Among Mobile RFID Readers , 2006, EUC Workshops.

[43]  Philip Resnik,et al.  Using Information Content to Evaluate Semantic Similarity in a Taxonomy , 1995, IJCAI.

[44]  Francoise Pelle ISSN , 2002 .

[45]  Graeme Hirst,et al.  Lexical chains as representations of context for the detection and correction of malapropisms , 1995 .

[46]  Kenneth R. Beesley,et al.  Arabic Morphology Using Only Finite-State Operations , 1998, SEMITIC@COLING.

[47]  Roy Rada,et al.  Development and application of a metric on semantic nets , 1989, IEEE Trans. Syst. Man Cybern..

[48]  Jun-Seok Park,et al.  Effects of reader interference on the RFID interrogation range , 2007, 2007 European Microwave Conference.

[49]  Wonjun Lee,et al.  GENTLE: Reducing Reader Collision in Mobile RFID Networks , 2008, 2008 The 4th International Conference on Mobile Ad-hoc and Sensor Networks.

[50]  Ivan Martinovic Security in wireless networks , 2005 .

[51]  Partha Dasgupta,et al.  Security in wireless networks , 2005 .

[52]  Minho Jo,et al.  RFID tag detection on a water object using a backpropagation learning machine , 2007, KSII Trans. Internet Inf. Syst..

[53]  Davide Brunelli,et al.  Wireless Sensor Networks , 2012, Lecture Notes in Computer Science.

[54]  John B. Goodenough,et al.  Contextual correlates of synonymy , 1965, CACM.

[55]  Choong Seon Hong,et al.  Defense against lap-top class attacker in wireless sensor network , 2006, 2006 8th International Conference Advanced Communication Technology.

[56]  John A. Goldsmith,et al.  Unsupervised Learning of the Morphology of a Natural Language , 2001, CL.

[57]  Michael Sussna,et al.  Word sense disambiguation for free-text indexing using a massive semantic network , 1993, CIKM '93.

[58]  Haitao Wu,et al.  Performance of reliable transport protocol over IEEE 802.11 wireless LAN: analysis and enhancement , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.

[59]  Alexander Budanitsky,et al.  Lexical Semantic Relatedness and Its Application in Natural Language Processing , 1999 .

[60]  Martin Chodorow,et al.  Combining local context and wordnet similarity for word sense identification , 1998 .

[61]  Manoj Sharma,et al.  A Survey of RFID Tags , 2009 .

[62]  Joachim Hammer,et al.  Using mobile crawlers to search the Web efficiently , 2000, ACIS Int. J. Comput. Inf. Sci..

[63]  Sebastiano Vigna,et al.  UbiCrawler: a scalable fully distributed Web crawler , 2004, Softw. Pract. Exp..

[64]  Dekang Lin,et al.  Using Syntactic Dependency as Local Context to Resolve Word Sense Ambiguity , 1997, ACL.

[65]  Mukesh Singhal,et al.  Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..

[66]  J. P. Gupta,et al.  PARCAHYD: An Architecture of a Parallel Crawler based on Augmented Hypertext Documents , 2010 .

[67]  A. Girotra,et al.  Performance Analysis of the IEEE 802 . 11 Distributed Coordination Function , 2005 .

[68]  Mani B. Srivastava,et al.  Adaptive frame length control for improving wireless link throughput, range, and energy efficiency , 1998, Proceedings. IEEE INFOCOM '98, the Conference on Computer Communications. Seventeenth Annual Joint Conference of the IEEE Computer and Communications Societies. Gateway to the 21st Century (Cat. No.98.

[69]  Daniel W. Engels,et al.  The reader collision problem , 2002, IEEE International Conference on Systems, Man and Cybernetics.

[70]  Antonio Alfredo Ferreira Loureiro,et al.  Malicious node detection in wireless sensor networks , 2004, 18th International Parallel and Distributed Processing Symposium, 2004. Proceedings..

[71]  K. Mohamedpour,et al.  Securing wireless sensor networks against broadcast attacks , 2008, 2008 International Symposium on Telecommunications.