Denial of Service Defence for Resource Availability in Wireless Sensor Networks

Wireless sensor networks (WSN) over the years have become one of the most promising networking solutions with exciting new applications for the near future. Its deployment has been enhanced by its small, inexpensive, and smart sensor nodes, which are easily deployed, depending on its application and coverage area. Common applications include its use for military operations, monitoring environmental conditions (such as volcano detection, agriculture, and management), distributed control systems, healthcare, and the detection of radioactive sources. Notwithstanding its promising attributes, security in WSN is a big challenge and remains an ongoing research trend. Deployed sensor nodes are vulnerable to various security attacks due to its architecture, hostile deployment location, and insecure routing protocol. Furthermore, the sensor nodes in WSNs are characterized by their resource constraints, such as, limited energy, low bandwidth, short communication range, limited processing, and storage capacity, which have made the sensor nodes an easy target. Therefore, in this paper, we present a review of denial of service attacks that affect resource availability in WSN and their countermeasure by presenting a taxonomy. Future research directions and open research issues are also discussed.

[1]  Konstantinos G. Kyriakopoulos,et al.  A Hybrid Intrusion Detection System for Virtual Jamming Attacks on Wireless Networks , 2017 .

[2]  Zubair A. Baig Pattern recognition for detecting distributed node exhaustion attacks in wireless sensor networks , 2011, Comput. Commun..

[3]  Xiaodong Wang,et al.  DIDS: A dynamic model of intrusion detection system in wireless sensor networks , 2008, 2008 International Conference on Information and Automation.

[4]  Scott F. Midkiff,et al.  Effects of Denial-of-Sleep Attacks on Wireless Sensor Network MAC Protocols , 2009, IEEE Transactions on Vehicular Technology.

[5]  Yu-Fang Chung,et al.  Shielding wireless sensor network using Markovian intrusion detection system with attack pattern mining , 2013, Inf. Sci..

[6]  K. V. Arya,et al.  Designing Intrusion Detection to Detect Black Hole and Selective Forwarding Attack in WSN Based on Local Information , 2009, 2009 Fourth International Conference on Computer Sciences and Convergence Information Technology.

[7]  Yue Wu,et al.  A New Intrusion Detection System Based on KNN Classification Algorithm in Wireless Sensor Network , 2014, J. Electr. Comput. Eng..

[8]  Biswanath Mukherjee,et al.  Wireless sensor network survey , 2008, Comput. Networks.

[9]  John A. Stankovic,et al.  A Taxonomy for Denial-of-Service Attacks in Wireless Sensor Networks , 2004, Handbook of Sensor Networks.

[10]  Kotagiri Ramamohanarao,et al.  Hop-Count Monitoring: Detecting Sinkhole Attacks in Wireless Sensor Networks , 2007, 2007 15th IEEE International Conference on Networks.

[11]  Saswati Sarkar,et al.  On optimal placement of intrusion detection modules in sensor networks , 2004, First International Conference on Broadband Networks.

[12]  Kim-Kwang Raymond Choo,et al.  Change-point cloud DDoS detection using packet inter-arrival time , 2016, 2016 8th Computer Science and Electronic Engineering (CEEC).

[13]  Eui-nam Huh,et al.  Hybrid Intrusion Detection System for Wireless Sensor Networks , 2007, ICCSA.

[14]  Shahaboddin Shamshirband,et al.  Cooperative game theoretic approach using fuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks , 2014, Eng. Appl. Artif. Intell..

[15]  Jeffrey J. P. Tsai,et al.  A Framework of Machine Learning Based Intrusion Detection for Wireless Sensor Networks , 2008, 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (sutc 2008).

[16]  Opeyemi Osanaiye,et al.  DDoS defence for service availability in cloud computing , 2016 .

[17]  Scott F. Midkiff,et al.  Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses , 2008, IEEE Pervasive Computing.

[18]  José Manuel Moya,et al.  Distributed intrusion detection system for wireless sensor networks based on a reputation system coupled with kernel self-organizing maps , 2010, Integr. Comput. Aided Eng..

[19]  Paolo Ballarini,et al.  Modeling tools for detecting DoS attacks in WSNs , 2013, Secur. Commun. Networks.

[20]  Ahmed I. Saleh,et al.  Energy-efficient routing protocols for solving energy hole problem in wireless sensor networks , 2017, Comput. Networks.

[21]  Ravi Sankar,et al.  A Survey of Intrusion Detection Systems in Wireless Sensor Networks , 2014, IEEE Communications Surveys & Tutorials.

[22]  Y.A. Sekercioglu,et al.  Detecting Selective Forwarding Attacks in Wireless Sensor Networks using Support Vector Machines , 2007, 2007 3rd International Conference on Intelligent Sensors, Sensor Networks and Information.

[23]  Miroslav Voznák,et al.  Centralized IDS Based on Misuse Detection for Cluster-Based Wireless Sensors Networks , 2015, Wireless Personal Communications.

[24]  Ian F. Akyildiz,et al.  Wireless underground sensor networks: Research challenges , 2006, Ad Hoc Networks.

[25]  王淑卿,et al.  An Integrated Intrusion Detection System for Cluster-based Wireless Sensor Networks , 2011 .

[26]  Attahiru Sule Alfa,et al.  A Survey on an Energy-Efficient and Energy-Balanced Routing Protocol for Wireless Sensor Networks , 2017, Sensors.

[27]  Emanuele Garone,et al.  False data injection attacks against state estimation in wireless sensor networks , 2010, 49th IEEE Conference on Decision and Control (CDC).

[28]  Wenyuan Xu,et al.  Jamming sensor networks: attack and defense strategies , 2006, IEEE Network.

[29]  Yang Xiao,et al.  Anomaly Detection Based Secure In-Network Aggregation for Wireless Sensor Networks , 2013, IEEE Systems Journal.

[30]  Nasser Yazdani,et al.  Detection of black hole attack in wireless sensor network using UAV , 2015, 2015 7th Conference on Information and Knowledge Technology (IKT).

[31]  Mandeep Singh,et al.  Detection of black hole in Wireless Sensor Network based on Data Mining , 2014, 2014 5th International Conference - Confluence The Next Generation Information Technology Summit (Confluence).

[32]  Chun-Hung Richard Lin,et al.  Intrusion detection system: A comprehensive review , 2013, J. Netw. Comput. Appl..

[33]  Shuang-Hua Yang,et al.  A scheme for preventing denial of service attacks on wireless sensor networks , 2009, 2009 35th Annual Conference of IEEE Industrial Electronics.

[34]  Sutharshan Rajasegarar,et al.  Anomaly detection by clustering ellipsoids in wireless sensor networks , 2009, 2009 International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP).

[35]  Jing Jin,et al.  Anomaly event detection in temporal sensor network data of intelligent environments , 2010, 2010 2nd International Conference on Computer Engineering and Technology.

[36]  Song Guo,et al.  Distributed Segment-Based Anomaly Detection With Kullback–Leibler Divergence in Wireless Sensor Networks , 2017, IEEE Transactions on Information Forensics and Security.

[37]  Nor Badrul Anuar,et al.  An appraisal and design of a multi-agent system based cooperative wireless intrusion detection computational intelligence technique , 2013, Eng. Appl. Artif. Intell..

[38]  Ian F. Akyildiz,et al.  A survey on wireless multimedia sensor networks , 2007, Comput. Networks.

[39]  Nicholas Hopper,et al.  Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks , 2013, IEEE Transactions on Mobile Computing.

[40]  Hui He,et al.  Multitask Learning-Based Security Event Forecast Methods for Wireless Sensor Networks , 2016, J. Sensors.

[41]  Thiemo Voigt,et al.  Droplet: A New Denial-of-Service Attack on Low Power Wireless Sensor Networks , 2013, 2013 IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems.

[42]  Sungyoung Lee,et al.  A novel intrusion detection framework for wireless sensor networks , 2013, Personal and Ubiquitous Computing.

[43]  Azeddine Bilami,et al.  A Defense Strategy against Energy Exhausting Attacks in Wireless Sensor Networks , 2013 .

[44]  Satish Vadlamani,et al.  Jamming attacks on wireless networks: A taxonomic survey , 2016 .

[45]  P. Venkata Krishna,et al.  LAID: a learning automata-based scheme for intrusion detection in wireless sensor networks , 2009, Secur. Commun. Networks.

[46]  Driss Aboutajdine,et al.  Analysis of the Deployment Quality for Intrusion Detection in Wireless Sensor Networks , 2015, J. Comput. Networks Commun..

[47]  Lixiang Liu,et al.  Extended Watchdog Mechanism for Wireless Sensor Networks , 2008 .

[48]  Xiaojiang Du,et al.  Security in wireless sensor networks , 2008, IEEE Wireless Communications.

[49]  Valerio Formicola,et al.  Enhancing Intrusion Detection in Wireless Sensor Networks through Decision Trees , 2013, EWDC.

[50]  Yuguang Fang,et al.  Security in wireless sensor networks , 2007 .

[51]  Steven Furnell,et al.  D-FICCA: A density-based fuzzy imperialist competitive clustering algorithm for intrusion detection in wireless sensor networks , 2014 .

[52]  K. Q. Yan,et al.  A Hybrid Intrusion Detection System of Cluster-based Wireless Sensor Networks , 2009 .

[53]  Rongxing Lu,et al.  From Cloud to Fog Computing: A Review and a Conceptual Live VM Migration Framework , 2017, IEEE Access.

[54]  Mqhele E. Dlodlo,et al.  TCP/IP header classification for detecting spoofed DDoS attack in Cloud environment , 2015, IEEE EUROCON 2015 - International Conference on Computer as a Tool (EUROCON).

[55]  Mohammed Feham,et al.  Novel hybrid intrusion detection system for clustered wireless sensor network , 2011, ArXiv.

[56]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[57]  Zheng Yuan,et al.  Intrusion Detection for Wireless Sensor Networks Based on Multi-agent and Refined Clustering , 2009, 2009 WRI International Conference on Communications and Mobile Computing.

[58]  Alexandros G. Fragkiadakis,et al.  Anomaly-Based Intrusion Detection Algorithms for Wireless Networks , 2010, WWIC.

[59]  Ing-Ray Chen,et al.  A survey of intrusion detection in wireless network applications , 2014, Comput. Commun..

[60]  Tassos Dimitriou,et al.  Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks , 2007, ALGOSENSORS.

[61]  Marimuthu Palaniswami,et al.  Centered Hyperspherical and Hyperellipsoidal One-Class Support Vector Machines for Anomaly Detection in Sensor Networks , 2010, IEEE Transactions on Information Forensics and Security.

[62]  Felix C. Freiling,et al.  Intrusion Detection in Wireless Sensor Networks , 2009 .

[63]  Zinaida Benenson,et al.  Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks , 2006, SPC.

[64]  Ali Farrokhtala,et al.  Security in Wireless Sensor Networks: Issues and challanges , 2013, 2013 IEEE International Conference on Space Science and Communication (IconSpace).

[65]  Kenji Yoshigoe,et al.  Security and Attacks in Wireless Sensor Networks , 2012 .

[66]  Vasos Vassiliou,et al.  An Intrusion Detection System for Wireless Sensor Networks , 2017, 2017 24th International Conference on Telecommunications (ICT).

[67]  VARUN CHANDOLA,et al.  Anomaly detection: A survey , 2009, CSUR.

[68]  Mahalakshmi Gunasekaran,et al.  A hybrid protection approaches for denial of service (DoS) attacks in wireless sensor networks , 2017 .

[69]  Kim-Kwang Raymond Choo,et al.  Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework , 2016, J. Netw. Comput. Appl..

[70]  Teodor-Grigore Lupu,et al.  Main types of attacks in wireless sensor networks , 2009 .

[71]  Mukesh Singhal,et al.  Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..

[72]  G Kiran Kumar,et al.  Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes , 2014 .

[73]  Yu Sheng Chen,et al.  Intrusion Detection System Based on Immune Algorithm and Support Vector Machine in Wireless Sensor Network , 2010, ISIA.

[74]  K.Q. Yan,et al.  Hybrid Intrusion Detection System for enhancing the security of a cluster-based Wireless Sensor Network , 2010, 2010 3rd International Conference on Computer Science and Information Technology.

[75]  Antonio Alfredo Ferreira Loureiro,et al.  Decentralized intrusion detection in wireless sensor networks , 2005, Q2SWinet '05.

[76]  Abderrahmane Baadache,et al.  Avoiding Black Hole and Cooperative Black Hole Attacks in Wireless Ad hoc Networks , 2010, ArXiv.

[77]  Choong Seon Hong,et al.  A Partially Distributed Intrusion Detection System for Wireless Sensor Networks , 2013, Sensors.

[78]  Lynda Mokdad,et al.  Recursive‐clustering‐based approach for denial of service (DoS) attacks in wireless sensors networks , 2015, Int. J. Commun. Syst..

[79]  Ali Dehghantanha,et al.  Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing , 2016, EURASIP Journal on Wireless Communications and Networking.

[80]  Jonathan Loo,et al.  Artificial Neural Network Based Detection of Energy Exhaustion Attacks in Wireless Sensor Networks Capable of Energy Harvesting , 2014, Ad Hoc Sens. Wirel. Networks.

[81]  Ping Li,et al.  Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures , 2012, J. Netw. Comput. Appl..

[82]  Bo Yan,et al.  An Integrated Intrusion Detection Model of Cluster-Based Wireless Sensor Network , 2015, PloS one.

[83]  Mousa Al-Akhras,et al.  WSN-DS: A Dataset for Intrusion Detection Systems in Wireless Sensor Networks , 2016, J. Sensors.

[84]  Anazida Zainal,et al.  One-Class Principal Component Classifier for anomaly detection in wireless sensor network , 2012, 2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN).

[85]  Mohammad Saiful Islam Mamun,et al.  Hierarchical Design Based Intrusion Detection System For Wireless Ad hoc Network , 2010, ArXiv.

[86]  Nirvana Meratnia,et al.  Outlier Detection Techniques for Wireless Sensor Networks: A Survey , 2008, IEEE Communications Surveys & Tutorials.

[87]  Laura Gheorghe,et al.  Storm Control Mechanism in Wireless Sensor Networks , 2010, 9th RoEduNet IEEE International Conference.

[88]  Biming Tian,et al.  Anomaly detection in wireless sensor networks: A survey , 2011, J. Netw. Comput. Appl..

[89]  Felix C. Freiling,et al.  Vulnerabilities and Attacks in Wireless Sensor Networks , 2008 .

[90]  Robert H. Deng,et al.  Detecting node replication attacks in wireless sensor networks: A survey , 2012, J. Netw. Comput. Appl..

[91]  Cristina Alcaraz,et al.  Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks , 2009, FOSAD.

[92]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[93]  Sudip Misra,et al.  CURD: Controllable reactive jamming detection in underwater sensor networks , 2014, Pervasive Mob. Comput..

[94]  Raimir Holanda Filho,et al.  A New Collaborative Approach for Intrusion Detection System on Wireless Sensor Networks , 2008, TeNe.

[95]  Ting Zhao,et al.  A zero-sum game theoretic framework for jamming detection and avoidance in Wireless Sensor Networks , 2012, 2012 International Conference on Computer Science and Information Processing (CSIP).

[96]  Subir Halder,et al.  Tailor-Made Gaussian Distribution for Intrusion Detection in Wireless Sensor Networks , 2014, 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops.

[97]  Roberto Uribeetxeberria,et al.  Reputation-based Intrusion Detection System for wireless sensor networks , 2012, 2012 Complexity in Engineering (COMPENG). Proceedings.

[98]  Shahaboddin Shamshirband,et al.  Co-FAIS: Cooperative fuzzy artificial immune system for detecting intrusion in wireless sensor networks , 2014, J. Netw. Comput. Appl..

[99]  Quazi Mamun,et al.  A Qualitative Comparison of Different Logical Topologies for Wireless Sensor Networks , 2012, Sensors.

[100]  Gabriel Maciá-Fernández,et al.  Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..

[101]  Prashant Kumar,et al.  Distributed Intrusion Detection System for Wireless Sensor Networks , 2013 .

[102]  Sajal K. Das,et al.  Distributed detection of mobile malicious node attacks in wireless sensor networks , 2012, Ad Hoc Networks.

[103]  Sugata Sanyal,et al.  Sleep Deprivation Attack Detection in Wireless Sensor Network , 2012, ArXiv.

[104]  Can Zhang,et al.  Detection and Defense Technology of Blackhole Attacks in Wireless Sensor Network , 2014, ICA3PP.

[105]  Jaydip Sen,et al.  A Survey on Wireless Sensor Network Security , 2009, Int. J. Commun. Networks Inf. Secur..

[106]  Andreas Pitsillides,et al.  A survey on secure multipath routing protocols in WSNs , 2010, Comput. Networks.

[107]  Hadi Sadoghi Yazdi,et al.  Anomaly detection and foresight response strategy for wireless sensor networks , 2015, Wirel. Networks.

[108]  Hung-Min Sun,et al.  Mobile Jamming Attack and its Countermeasure in Wireless Sensor Networks , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).

[109]  J. Heidemann,et al.  Underwater Sensor Networking : Research Challenges and Potential Applications , 2006 .

[110]  Yang Xiao,et al.  Secure data aggregation in wireless sensor networks: A comprehensive overview , 2009, Comput. Networks.

[111]  Taekyoung Kwon,et al.  An Experimental Study of Hierarchical Intrusion Detection for Wireless Industrial Sensor Networks , 2010, IEEE Transactions on Industrial Informatics.

[112]  Xu Huang,et al.  Protecting from Inside Attacks in Wireless Sensor Networks , 2011, 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing.

[113]  Luci Pirmez,et al.  Intrusion Detection System for Wireless Sensor Networks Using Danger Theory Immune-Inspired Techniques , 2012, International Journal of Wireless Information Networks.

[114]  Radha Poovendran,et al.  Optimal Jamming Attack Strategies and Network Defense Policies in Wireless Sensor Networks , 2010, IEEE Transactions on Mobile Computing.

[115]  Jianying Zhou,et al.  Applying intrusion detection systems to wireless sensor networks , 2006, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006..

[116]  Ahmad Khonsari,et al.  Detection and mitigation of sinkhole attacks in wireless sensor networks , 2014, J. Comput. Syst. Sci..

[117]  Bai Li,et al.  Using Mobile Agents to Detect Node Compromise in Path-Based DoS Attacks on Wireless Sensor Networks , 2007, 2007 International Conference on Wireless Communications, Networking and Mobile Computing.

[118]  K DasSajal,et al.  Distributed detection of mobile malicious node attacks in wireless sensor networks , 2012, AdhocNets 2012.

[119]  Rodrigo Roman,et al.  On the Vital Areas of Intrusion Detection Systems in Wireless Sensor Networks , 2013, IEEE Communications Surveys & Tutorials.

[120]  G. A. Vijayalakshmi Pai,et al.  Swarm intelligence based approach for sinkhole attack detection in wireless sensor networks , 2014, Appl. Soft Comput..

[121]  Jalel Ben-Othman,et al.  Detecting DoS attacks in WSN based on clustering technique , 2013, 2013 IEEE Wireless Communications and Networking Conference (WCNC).

[122]  Jugal K. Kalita,et al.  Network Anomaly Detection: Methods, Systems and Tools , 2014, IEEE Communications Surveys & Tutorials.

[123]  Jin-Hee Cho,et al.  Trust-Based Intrusion Detection in Wireless Sensor Networks , 2011, 2011 IEEE International Conference on Communications (ICC).

[124]  F. Freiling,et al.  Towards Intrusion Detection in Wireless Sensor Networks , 2007 .