Intrusion Detection System for Power-Aware OLSR

Optimized Link State Routing (OLSR) is a standard proactive routing protocol for Wireless Sensor Network (WSN). OLSR uses two kinds of the control messages: Hello and Topology Control (TC). As these messages are un-authenticated, OLSR is prone to several attacks namely, black hole, wormhole, Gray hole etc. This paper is focused at Sleep Deprivation Torture Attack on OLSR. Sleep deprivation attack is one of the most interesting attack in layer 2 where the attacker tries to use a low energy node until all its energy is exhausted and the node goes into permanent sleep. This attack is also possible in routing level. In OLSR low energy node declare their status through willingness property of HELLO message. Using this information an attacker node can choose that low energy node deliberately and forward all traffic through that node. This leads to low energy node in a permanent sleep mode. In this paper we propose a specification based Intrusion Detection System (IDS) for that type of attack. The performance of the propose algorithm is studied by Network Simulator (NS2) and effectiveness of the propose scheme, along with a comparison with existing techniques is demonstrated.

[1]  JAMAL N. AL-KARAKI,et al.  Routing techniques in wireless sensor networks: a survey , 2004, IEEE Wireless Communications.

[2]  Christos G. Cassandras,et al.  Optimal dynamic sleep time control in Wireless Sensor Networks , 2008, 2008 47th IEEE Conference on Decision and Control.

[3]  Michael S. Hsiao,et al.  Denial-of-service attacks on battery-powered mobile computers , 2004, Second IEEE Annual Conference on Pervasive Computing and Communications, 2004. Proceedings of the.

[4]  Chaitali Biswas Dutta,et al.  Specification Based IDS for Power Enhancement Related Vulnerabilities in AODV , 2012, ACITY.

[5]  Li Hui,et al.  An Effective Scheme for Defending Denial-of-Sleep Attack in Wireless Sensor Networks , 2009, 2009 Fifth International Conference on Information Assurance and Security.

[6]  Vijay Laxmi,et al.  Detour attack in OLSR , 2011, SIN '11.

[7]  Frank Stajano,et al.  Security for Ubiquitous Computing , 2002, ICISC.

[8]  Sugata Sanyal,et al.  Sleep Deprivation Attack Detection in Wireless Sensor Network , 2012, ArXiv.

[9]  M. Brownfield,et al.  Wireless sensor network denial of sleep attack , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.

[10]  Scott F. Midkiff,et al.  Effects of Denial-of-Sleep Attacks on Wireless Sensor Network MAC Protocols , 2009, IEEE Transactions on Vehicular Technology.

[11]  Scott F. Midkiff,et al.  Clustered Adaptive Rate Limiting: Defeating Denial-of-Sleep Attacks in Wireless Sensor Networks , 2007, MILCOM 2007 - IEEE Military Communications Conference.

[12]  Sukumar Nandi,et al.  Modified Optimized Link State Routing (M-OLSR) for Wireless Mesh Networks , 2008, 2008 International Conference on Information Technology.

[13]  Mahmuda Naznin Wireless Sensor Network: Coverage, Scheduling and Optimization , 2009 .

[14]  Philippe Jacquet,et al.  Optimized Link State Routing Protocol (OLSR) , 2003, RFC.

[15]  Frank Stajano,et al.  The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.

[16]  F. De Rango,et al.  EE-OLSR: Energy Efficient OLSR routing protocol for Mobile ad-hoc Networks , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.

[17]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.