Sensor Networks Attacks Classifications and Mitigation

This second part covers the implementation, testing, critical evaluation, conclusion and further study. It concentrates on the actual implementation details of hardening of network devices by referring to the hardware and software components, device operating system’s features, management controls, access-list restrictions, operational configurations and critically making sure that the data and credentials are not stored or transferred in ‘plaintext’ over the network by detailed testing and evaluation. It investigates the commands used to enable cryptography and network protocols based on encryption, in order to meet the need for essential security requirements. Substantial work is devoted to the command line details and testing of a router based on Cryptography and Security Protocols in the border router. A step-by-step hardening approach is detailed using the commands used to secure the proposed network framework’s border router. Encrypted services coupled with best practice configurations are explained and tested in an emulated environment. The use of protocol analysers, CISCO Configuration Professional’s Audit and penetration testing tools corroborated the success of the project.

[1]  S. Dobson,et al.  A Secure Lightweight Architecture for Wireless Sensor Networks , 2008, 2008 The Second International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies.

[2]  JeongGil Ko,et al.  Wireless Sensor Networks for Healthcare , 2010, Proceedings of the IEEE.

[3]  Vimal Kumar,et al.  An Adaptive Approach for Detection of Blackhole Attack in Mobile Ad hoc Network , 2015 .

[4]  José Manuel Moya,et al.  Detecting Bad-Mouthing Attacks on Reputation Systems Using Self-Organizing Maps , 2011, CISIS.

[5]  Sener Uysal,et al.  Forest Fire Detection in Wireless Sensor Network Using Fuzzy Logic , 2013, 2013 Fifth International Conference on Computational Intelligence, Communication Systems and Networks.

[6]  G. Padmavathi,et al.  A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks , 2009, ArXiv.

[7]  Victoria J. Hodge,et al.  Wireless Sensor Networks for Condition Monitoring in the Railway Industry: A Survey , 2015, IEEE Transactions on Intelligent Transportation Systems.

[8]  Hui Liu,et al.  Intrusion Detection System Based on Evolving Rules for Wireless Sensor Networks , 2018, J. Sensors.

[9]  Firdaus,et al.  Wireless Sensor Networks for microclimate telemonitoring using ZigBee and WiFi , 2014, 2014 IEEE International Conference on Aerospace Electronics and Remote Sensing Technology.

[10]  Michael R. Lyu,et al.  On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Communications.

[11]  Brice Augustin,et al.  Wireless Sensor Networks for medical care services , 2011, 2011 7th International Wireless Communications and Mobile Computing Conference.

[12]  Devesh C. Jinwala,et al.  Detection of Wormhole attacks in Wireless Sensor Network , 2011, ARTCom 2011.

[13]  Subhashis Banerjee,et al.  WORMHOLE ATTACK MITIGATION IN MANET: A CLUSTER BASED AVOIDANCE TECHNIQUE , 2014 .

[14]  Yasir Arfat Malkani,et al.  Securing mobile Wireless Sensor Networks (WSNs) against Clone Node Attack , 2015, 2015 Conference on Information Assurance and Cyber Security (CIACS).

[15]  Kalpana Sharma,et al.  Complete Security Framework for Wireless Sensor Networks , 2009, ArXiv.

[16]  Victor C. M. Leung,et al.  FADE: Forwarding Assessment Based Detection of Collaborative Grey Hole Attacks in WMNs , 2013, IEEE Transactions on Wireless Communications.

[17]  Manyam Thaile,et al.  Node Compromise Detection based on NodeTrust in Wireless Sensor Networks , 2016, 2016 International Conference on Computer Communication and Informatics (ICCCI).

[18]  V. B. Vaghela,et al.  Detection and Prevention of Wormhole Attack in Wireless Sensor Network using AOMDV Protocol , 2016 .

[19]  Gil Goncalves,et al.  Environmental Monitoring Services and wireless sensor networks applied on Urban spaces , 2010, 2010 IEEE International Conference on Automation, Quality and Testing, Robotics (AQTR).

[20]  Gianfranco Manes,et al.  A real-time traffic monitoring based on wireless sensor network technologies , 2011, 2011 7th International Wireless Communications and Mobile Computing Conference.

[21]  Matt Welsh,et al.  Monitoring volcanic eruptions with a wireless sensor network , 2005, Proceeedings of the Second European Workshop on Wireless Sensor Networks, 2005..

[22]  John S. Baras,et al.  SECURITY IN MOBILE AD HOC AND SENSOR NETWORKS , .

[23]  Felix C. Freiling,et al.  Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks , 2005, ESORICS.

[24]  Devesh C. Jinwala,et al.  Prevention of Wormhole Attack in Wireless Sensor Network , 2011, ArXiv.

[25]  Murat Demirbas,et al.  An RSSI-based scheme for sybil attack detection in wireless sensor networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).

[26]  G EdwinPremKumar,et al.  A Comprehensive Review on Reduction of MaliciousNodes in Clustered Wireless Sensor Networks UsingDifferent Trust Management Schemes , 2014 .

[27]  Afrand Agah,et al.  Preventing DoS Attacks in Wireless Sensor Networks: A Repeated Game Theory Approach , 2007, Int. J. Netw. Secur..

[28]  Reza Ebrahimi Atani,et al.  A Comparison of Link Layer Attacks on Wireless Sensor Networks , 2011, J. Information Security.

[29]  Shivakant Mishra,et al.  Defending against path-based DoS attacks in wireless sensor networks , 2005, SASN '05.

[30]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[31]  Jean-Philippe Babau,et al.  An Ontology for Attacks in Wireless Sensor Networks , 2007 .

[32]  A. P. Renold,et al.  Performance analysis of LEACH with gray hole attack in Wireless Sensor Networks , 2012, 2012 International Conference on Computer Communication and Informatics.

[33]  B. Umakanth,et al.  Detection of Energy draining attack using EWMA in Wireless Ad Hoc Sensor Networks , 2013 .

[34]  Virendra Pal Singh,et al.  Hello Flood Attack and its Countermeasures in Wireless Sensor Networks , 2010 .

[35]  Yasir Arfat Malkani,et al.  A framework for securing mobile wireless sensor networks against physical attacks , 2016, 2016 International Conference on Emerging Technologies (ICET).

[36]  Carlos E. Palau,et al.  Quake detection system using smartphone-based wireless sensor network for early warning , 2014, 2014 IEEE International Conference on Pervasive Computing and Communication Workshops (PERCOM WORKSHOPS).

[37]  Muhammad Yasir Malik An Outline of Security in Wireless Sensor Networks: Threats, Countermeasures and Implementations , 2013, ArXiv.

[38]  Ashwani Kumar,et al.  A Survey in Energy Drain Attacks and Their Countermeasures in Wireless Sensor Networks , 2014 .

[39]  A. Hiren Kumar Deva Sarma,et al.  Secure Routing Protocol for Mobile Wireless Sensor Network , 2011, 2011 IEEE Sensors Applications Symposium.

[40]  I. Chatzigiannakis,et al.  Adaptive probabilistic secure routing in mobile wireless sensor networks , 2008, 2008 16th International Conference on Software, Telecommunications and Computer Networks.

[41]  Wojciech Tylman Misuse-Based Intrusion Detection Using Bayesian Networks , 2008, DepCoS-RELCOMEX.

[42]  Shivashankar,et al.  A review on security and privacy issues in wireless sensor networks , 2017, 2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT).

[43]  Michael R. Lyu,et al.  An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks , 2007, Comput. Commun..

[44]  Yih-Chun Hu,et al.  Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.

[45]  Tassos Dimitriou,et al.  Launching a Sinkhole Attack in Wireless Sensor Networks; The Intruder Side , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.

[46]  Yongping Zhang,et al.  SeRA: A Secure Routing Algorithm Against Sinkhole Attacks for Mobile Wireless Sensor Networks , 2010, 2010 Second International Conference on Computer Modeling and Simulation.

[47]  Choong Seon Hong,et al.  Security in wireless sensor networks: issues and challenges , 2006, 2006 8th International Conference Advanced Communication Technology.

[48]  Markus Jakobsson,et al.  Stealth attacks on ad-hoc wireless networks , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).

[49]  Hoon Jae Lee,et al.  A secure authentication protocol among mobile phone and wireless sensor networks , 2013, 2013 15th International Conference on Advanced Communications Technology (ICACT).

[50]  J. Anand,et al.  Preserving national animal using wireless sensor network based hotspot algorithm , 2013, 2013 International Conference on Green High Performance Computing (ICGHPC).