A Scheme for Adaptively Countering Application Layer Security Attacks in Wireless Sensor Networks

In wireless sensor networks, adversaries can easily launch application layer attacks, such as false data injection attacks and false vote insertion attacks. False data injection attacks may drain energy resources and waste real world response efforts. False vote insertion attacks would prevent reporting of important information on the field. In order to minimize the damage from such attacks, several prevention based solutions have been proposed by researchers, but may be inefficient in normal condition due to their overhead. Thus, they should be activated upon detection of such attacks. Existing detection based solutions, however, does not address application layer attacks. This paper presents a scheme to adaptively counter false data injection attacks and false vote insertion attacks in sensor networks. The proposed scheme consists of two sub-units: one used to detect the security attacks and the other used to select efficient countermeasures against the attacks. Countermeasures are activated upon detection of the security attacks, with the consideration of the current network status and the attacks. Such adaptive countering approach can conserve energy resources especially in normal condition and provide reliability against false vote insertion attacks.

[1]  Yuichi Sei,et al.  Distributed detection of node replication attacks resilient to many compromised nodes in wireless sensor networks , 2008, WICON 2008.

[2]  Bernard P. Zeigler,et al.  Designing fuzzy net controllers using GA optimization , 1994, Proceedings of IEEE Symposium on Computer-Aided Control Systems Design (CACSD).

[3]  Sushil Jajodia,et al.  Interleaved hop-by-hop authentication against false data injection attacks in sensor networks , 2007, TOSN.

[4]  Aikaterini Mitrokotsa,et al.  Intrusion Detection Techniques in Sensor Networks , 2008 .

[5]  Jianzhong Li,et al.  Grouping-Based Resilient Statistical En-Route Filtering for Sensor Networks , 2009, IEEE INFOCOM 2009.

[6]  Lan Chen,et al.  An Efficient Route Maintenance Scheme for Wireless Sensor Network with Mobile Sink , 2007, 2007 IEEE 65th Vehicular Technology Conference - VTC2007-Spring.

[7]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[8]  Michael R. Lyu,et al.  On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Communications.

[9]  Tae Ho Cho,et al.  Fuzzy Adaptive Selection of Filtering Schemes for Energy Saving in Sensor Networks , 2007, IEICE Trans. Commun..

[10]  Ting Yuan,et al.  KAEF: An En-route Scheme of Filtering False Data in Wireless Sensor Networks , 2008, 2008 IEEE International Performance, Computing and Communications Conference.

[11]  Tae Ho Cho,et al.  A Multipath En-Route Filtering Method for Dropping Reports in Sensor Networks , 2007, IEICE Trans. Inf. Syst..

[12]  Antonio Alfredo Ferreira Loureiro,et al.  Decentralized intrusion detection in wireless sensor networks , 2005, Q2SWinet '05.

[13]  Y.A. Sekercioglu,et al.  Detecting Selective Forwarding Attacks in Wireless Sensor Networks using Support Vector Machines , 2007, 2007 3rd International Conference on Intelligent Sensors, Sensor Networks and Information.

[14]  Donald A. Waterman,et al.  Pattern-Directed Inference Systems , 1981, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[15]  Haiyun Luo,et al.  Statistical en-route filtering of injected false data in sensor networks , 2005, IEEE J. Sel. Areas Commun..

[16]  Jie Wu,et al.  PVFS: A Probabilistic Voting-based Filtering Scheme in Wireless Sensor Networks , 2008, Int. J. Secur. Networks.

[17]  JAMAL N. AL-KARAKI,et al.  Routing techniques in wireless sensor networks: a survey , 2004, IEEE Wireless Communications.

[18]  Chun-Shien Lu,et al.  A DoS-resilient en-route filtering scheme for sensor networks , 2009, MobiHoc '09.

[19]  Songwu Lu,et al.  Commutative cipher based en-route filtering in wireless sensor networks , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.