Design and Analysis of Probing Route to Defense Sink-Hole Attacks for Internet of Things Security

Internet of Things (IoT) applications have been growing significantly in recent years, however, the security issue has not been well studied in the literature for the IoT ecosystem. The sinkhole attack is one of serious destructive attacks for IoT as it is easy to launch the attack and difficult to defend it. In this paper, a Probe Route based Defense Sinkhole Attack (PRDSA) scheme is proposed to resist Sinkhole attack and guarantee security for IoT, which is the first work that can detect, bypass and locate the sinkhole at the same time. The PRDSA scheme proposes a routing mechanism combining the far-sink reverse routing, equal-hop routing, and minimum hop routing, which can effectively circumvent the sinkhole attacks and find a safe route to the real sink, so that the scheme can achieve better sinkhole detection. More importantly, the PRDSA scheme overcomes the limitation of previous schemes that they cannot locate the sinkhole. During the detection of the sinkhole attack, the PRDSA scheme requires the nodes and the sink node to return the signature of the information (e.g., IDs, etc.), so that the location of the sinkhole can be determined. Furthermore, the PRDAS scheme mainly utilizes the characteristics of network energy consumption. The probe route of sinkhole attack mainly occurs in the region where the remaining energy exists. Thus, the PRDSA scheme has little impact on the network lifetime. Theory and experiments show that this scheme can achieve better performance than existing schemes in term of network security and lifetime.

[1]  Danda B. Rawat,et al.  Evaluating Secrecy Outage of Physical Layer Security in Large-Scale MIMO Wireless Communications for Cyber-Physical Systems , 2017, IEEE Internet of Things Journal.

[2]  Jin Li,et al.  Insight of the protection for data security under selective opening attacks , 2017, Inf. Sci..

[3]  Naixue Xiong,et al.  Knowledge-aware Proactive Nodes Selection approach for energy management in Internet of Things , 2017, Future Gener. Comput. Syst..

[4]  Junshan Zhang,et al.  Distributed Algorithms to Compute Walrasian Equilibrium in Mobile Crowdsensing , 2017, IEEE Transactions on Industrial Electronics.

[5]  Yuguang Fang,et al.  Location-based compromise-tolerant security mechanisms for wireless sensor networks , 2006, IEEE Journal on Selected Areas in Communications.

[6]  Ibrahim Abdullah,et al.  Detecting Sinkhole Attacks in Wireless Sensor Network using Hop Count , 2015 .

[7]  Xiapu Luo,et al.  Modeling the Vulnerability of Feedback-Control Based Internet Services to Low-Rate DoS Attacks , 2014, IEEE Transactions on Information Forensics and Security.

[8]  Mohammed Gharib,et al.  Secure Overlay Routing for Large Scale Networks , 2019, IEEE Transactions on Network Science and Engineering.

[9]  Meng Liu,et al.  DDoS attacks on data plane of software-defined network: are they possible? , 2016, Secur. Commun. Networks.

[10]  Jaime Lloret Mauri,et al.  Intrusion Detection Algorithm Based on Neighbor Information Against Sinkhole Attack in Wireless Sensor Networks , 2015, Comput. J..

[11]  Zhetao Li,et al.  Context-aware collect data with energy efficient in Cyber-physical cloud systems , 2017, Future Gener. Comput. Syst..

[12]  Muhammad Khurram Khan,et al.  Design of sinkhole node detection mechanism for hierarchical wireless sensor networks , 2016, Secur. Commun. Networks.

[13]  Laurence T. Yang,et al.  Trace malicious source to guarantee cyber security for mass monitor critical infrastructure , 2018, J. Comput. Syst. Sci..

[14]  Zhijin Qin,et al.  Malicious User Detection Based on Low-Rank Matrix Completion in Wideband Spectrum Sensing , 2018, IEEE Transactions on Signal Processing.

[15]  Xiaoying Gan,et al.  Analytical model with a novel selfishness division of mobile nodes to participate cooperation , 2016, Peer-to-Peer Netw. Appl..

[16]  Laurence T. Yang,et al.  Defending ON–OFF Attacks Using Light Probing Messages in Smart Sensors for Industrial Communication Systems , 2018, IEEE Transactions on Industrial Informatics.

[17]  Patrick Thiran,et al.  A General Framework for Sensor Placement in Source Localization , 2019, IEEE Transactions on Network Science and Engineering.

[18]  G. A. Vijayalakshmi Pai,et al.  Swarm intelligence based approach for sinkhole attack detection in wireless sensor networks , 2014, Appl. Soft Comput..

[19]  Ruttikorn Varakulsiripunth,et al.  Detecting sinkhole attack and selective forwarding attack in wireless sensor networks , 2009, 2009 7th International Conference on Information, Communications and Signal Processing (ICICS).

[20]  Naixue Xiong,et al.  An adaptive virtual relaying set scheme for loss-and-delay sensitive WSNs , 2018, Inf. Sci..

[21]  Honggang Wang,et al.  Topology Control for Building a Large-Scale and Energy-Efficient Internet of Things , 2017, IEEE Wireless Communications.

[22]  Song Guo,et al.  Utility Based Data Computing Scheme to Provide Sensing Service in Internet of Things , 2019, IEEE Transactions on Emerging Topics in Computing.

[23]  Tassos Dimitriou,et al.  Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks , 2007, ALGOSENSORS.

[24]  Hongwei Li,et al.  Engineering searchable encryption of mobile cloud networks: when QoE meets QoP , 2015, IEEE Wireless Communications.

[25]  Deborah Estrin,et al.  Highly-resilient, energy-efficient multipath routing in wireless sensor networks , 2001, MOCO.

[26]  Reza Rafeh,et al.  A novel agent-based approach to detect sinkhole attacks in wireless sensor networks , 2013, Comput. Secur..

[27]  Amitava Datta,et al.  Performance comparison of trust-based reactive routing protocols , 2006, IEEE Transactions on Mobile Computing.

[28]  Tri Gia Nguyen,et al.  An efficient coverage hole-healing algorithm for area-coverage improvements in mobile sensor networks , 2019, Peer Peer Netw. Appl..

[29]  Gabriel Maciá-Fernández,et al.  Identification of contamination zones for sinkhole detection in MANETs , 2015, J. Netw. Comput. Appl..

[30]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[31]  Tanima Dutta,et al.  Coverage and Connectivity in WSNs: A Survey, Research Issues and Challenges , 2018, IEEE Access.

[32]  Fatemeh Ghassemi,et al.  An adaptive sinkhole aware algorithm in wireless sensor networks , 2017, Ad Hoc Networks.

[33]  Zhetao Li,et al.  Minimizing Convergecast Time and Energy Consumption in Green Internet of Things , 2020, IEEE Transactions on Emerging Topics in Computing.

[34]  Umamakeswari Arumugam,et al.  Intrusion Detection Algorithm for Mitigating Sinkhole Attack on LEACH Protocol in Wireless Sensor Networks , 2015, J. Sensors.

[35]  Minyi Guo,et al.  Real-Time Locating Systems Using Active RFID for Internet of Things , 2016, IEEE Systems Journal.

[36]  Ahmad Khonsari,et al.  Detection and mitigation of sinkhole attacks in wireless sensor networks , 2014, J. Comput. Syst. Sci..

[37]  Ruttikorn Varakulsiripunth,et al.  Detecting Sinkhole attacks in wireless sensor networks , 2009, 2009 ICCAS-SICE.

[38]  Roberto Beraldi,et al.  Reliable and Timely Event Notification for Publish/Subscribe Services Over the Internet , 2014, IEEE/ACM Transactions on Networking.

[39]  Athanasios V. Vasilakos,et al.  A Low-Latency Communication Scheme for Mobile Wireless Sensor Control Systems , 2019, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[40]  Anfeng Liu,et al.  Multi working sets alternate covering scheme for continuous partial coverage in WSNs , 2019, Peer-to-Peer Netw. Appl..

[41]  Naixue Xiong,et al.  Comparative analysis of quality of service and memory usage for adaptive failure detectors in healthcare systems , 2009, IEEE Journal on Selected Areas in Communications.

[42]  Jamal N. Al-Karaki,et al.  The Optimal Deployment, Coverage, and Connectivity Problems in Wireless Sensor Networks: Revisited , 2017, IEEE Access.

[43]  Zhongming Zheng,et al.  Energy and Memory Efficient Clone Detection in Wireless Sensor Networks , 2016, IEEE Transactions on Mobile Computing.