Fighting Insomnia: A Secure Wake-Up Scheme for Wireless Sensor Networks

Sleep deprivation attacks are still an unsolved but critical problem in sensor networks. They aim on quickly exhausting energy reserves of battery-powered sensor nodes by continuously sending messages to the node, preventing the attacked node to switch to an energy-saving sleep state. Sleep deprivation attacks come also in the form of sending traffic that causes a sleeping node to wake-up. Sleep deprivation attacks have the potential to lessen the lifetime of typical sensor nodes from years to days or even hours. One important communication standard for sensor networks is IEEE 802.15.4 that defines cryptographic protection of frames. While many attacks like eavesdropping or modification of frames are covered by the available security mechanisms, these mechanisms do not address sleep deprivation attacks. This paper proposes a secure wake-up scheme that activates a sensor node by a secure wake-up radio from a sleep state only if messages from an authenticated and legitimate node are pending. A lightweight security verification scheme is used that can easily be performed without requiring the node to change to active state.

[1]  John A. Stankovic,et al.  Radio-triggered wake-up capability for sensor networks , 2004, Proceedings. RTAS 2004. 10th IEEE Real-Time and Embedded Technology and Applications Symposium, 2004..

[2]  Hugo Krawczyk,et al.  HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.

[3]  Ran Canetti,et al.  Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[4]  Jan M. Rabaey,et al.  Low power distributed MAC for ad hoc sensor radio networks , 2001, GLOBECOM'01. IEEE Global Telecommunications Conference (Cat. No.01CH37270).

[5]  L.E. Larson,et al.  Passive RF Receiver Design for Wireless Sensor Networks , 2007, 2007 IEEE/MTT-S International Microwave Symposium.

[6]  Michael S. Hsiao,et al.  Towards an intrusion detection system for battery exhaustion attacks on mobile computing devices , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.

[7]  Paramvir Bahl,et al.  Wake on wireless: an event driven energy saving strategy for battery operated devices , 2002, MobiCom '02.

[8]  W. Douglas Maughan,et al.  Internet Security Association and Key Management Protocol (ISAKMP) , 1998, RFC.

[9]  Gregory M. P. O'Hare,et al.  Multi-Hop RFID Wake-Up Radio: Design, Evaluation and Energy Tradeoffs , 2008, 2008 Proceedings of 17th International Conference on Computer Communications and Networks.

[10]  Ram Ramanathan,et al.  JAVeLEN - An ultra-low energy ad hoc wireless network , 2008, Ad Hoc Networks.

[11]  Michael S. Hsiao,et al.  Denial-of-service attacks on battery-powered mobile computers , 2004, Second IEEE Annual Conference on Pervasive Computing and Communications, 2004. Proceedings of the.

[12]  Nitin H. Vaidya,et al.  A MAC protocol to reduce sensor network energy consumption using a wakeup radio , 2005, IEEE Transactions on Mobile Computing.

[13]  Mahmut T. Kandemir,et al.  The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense , 2006, Int. J. Distributed Sens. Networks.

[14]  Gregory M. P. O'Hare,et al.  On the RFID Wake-up Impulse for Multi-hop Sensor Networks , 2007 .

[15]  Frank Stajano,et al.  Security for Ubiquitous Computing , 2002, ICISC.