Design of sinkhole node detection mechanism for hierarchical wireless sensor networks

Wireless sensor networks WSNs have several applications ranging from the civilian to military applications. WSNs are prone to various hole attacks, such as sinkhole, wormhole, blackhole, and greyhole. Among these hole attacks, the sinkhole attack is the malignant one. A sinkhole attack allows a malicious node, called the sinkhole node, advertises a best possible path to the base station BS. This misguides its neighbors to utilize that path more frequently. The sinkhole node has the opportunity to tamper with the data, and it also performs the modifications in messages or it drops messages or it produces unnecessary delay before forwarding them to the BS. On the basis of these malicious acts that are performed by a sinkhole attacker node, we consider three types of malicious nodes in a WSN: sinkhole message modification node SMD, sinkhole message dropping node SDP, and sinkhole message delay node SDL. None of the existing techniques in the literature is capable to handle all three types of nodes at a time. This paper presents a new detection scheme for the detection of different types of sinkhole nodes for a hierarchical wireless sensor network HWSN. To the best of our knowledge, this is the first attempt to design such a detection scheme in HWSNs which can detect SMD, SDP, and SDL nodes. In our approach, the entire HWSN is divided into several disjoint clusters, and each cluster has a powerful high-end sensor node called a cluster head, which is responsible for the detection of different sinkhole attacker nodes if present in that cluster. We simulate our scheme using the widely-accepted NS2 simulator for measurement of various network parameters. The proposed scheme achieves around 95% detection rate and 1.25% false positive rate. These factors are significantly better than the previous related schemes. Furthermore, the computation and communication efficiency is achieved in our scheme. As a result, our scheme seems suitable for the sensitive critical applications, such as military applications. Copyright © 2016 John Wiley & Sons, Ltd.

[1]  Ali Farrokhtala,et al.  Detection of sinkhole attack in wireless sensor networks , 2013, 2013 IEEE International Conference on Space Science and Communication (IconSpace).

[2]  Michael R. Lyu,et al.  An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks , 2007, Comput. Commun..

[3]  Dharma P. Agrawal,et al.  An improved key distribution mechanism for large-scale hierarchical wireless sensor networks , 2007, Ad Hoc Networks.

[4]  Sherali Zeadally,et al.  Certificateless Public Auditing Scheme for Cloud-Assisted Wireless Body Area Networks , 2018, IEEE Systems Journal.

[5]  I. Sumaiya Thaseen,et al.  A hybrid anomaly detection model using G-LDA , 2014, 2014 IEEE International Advance Computing Conference (IACC).

[6]  Aline Carneiro Viana,et al.  Cryptographic protocols to fight sinkhole attacks on tree-based routing in Wireless Sensor Networks , 2009, 2009 5th IEEE Workshop on Secure Network Protocols.

[7]  Ning Liu,et al.  An Adaptive Approach to Detecting Black and Gray Hole Attacks in Ad Hoc Network , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.

[8]  Dharma P. Agrawal,et al.  Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks , 2008, IEEE Transactions on Mobile Computing.

[9]  Marimuthu Palaniswami,et al.  Hyperspherical cluster based distributed anomaly detection in wireless sensor networks , 2014, J. Parallel Distributed Comput..

[10]  G. Umamaheswari,et al.  Detection of Sinkhole Attack in Wireless Sensor Networks Using Message Digest Algorithms , 2011, 2011 International Conference on Process Automation, Control and Computing.

[11]  Min Song,et al.  Intrusion detection of sinkhole attacks in large-scale wireless sensor networks , 2010, 2010 IEEE International Conference on Wireless Communications, Networking and Information Security.

[12]  Mohsen Guizani,et al.  Two Tier Secure Routing Protocol for Heterogeneous Sensor Networks , 2007, IEEE Transactions on Wireless Communications.

[13]  Roberto Grossi,et al.  On computing the diameter of real-world undirected graphs , 2013, Theor. Comput. Sci..

[14]  Ashok Kumar Das An unconditionally secure key management scheme for large-scale heterogeneous wireless sensor networks , 2009, 2009 First International Communication Systems and Networks and Workshops.

[15]  Valerio Formicola,et al.  Enhancing Intrusion Detection in Wireless Sensor Networks through Decision Trees , 2013, EWDC.

[16]  Ashok Kumar Das A random key establishment scheme for multi-phase deployment in large-scale distributed sensor networks , 2012, International Journal of Information Security.

[17]  Ashok Kumar Das,et al.  A dynamic password-based user authentication scheme for hierarchical wireless sensor networks , 2012, J. Netw. Comput. Appl..

[18]  Ilkyeun Ra,et al.  Performance study of ad hoc routing protocols with gossip-based approach , 2009, SpringSim '09.

[19]  Manik Lal Das,et al.  Two-factor user authentication in wireless sensor networks , 2009, IEEE Transactions on Wireless Communications.

[20]  Nipun Bansal,et al.  Peer to Peer Networking and Applications , 2013 .

[21]  Eui-Nam Huh,et al.  A lightweight intrusion detection framework for wireless sensor networks , 2010, CMC 2010.

[22]  Robert H. Deng,et al.  Detecting node replication attacks in wireless sensor networks: A survey , 2012, J. Netw. Comput. Appl..

[23]  Yunhao Liu,et al.  On the Delay Performance in a Large-Scale Wireless Sensor Network: Measurement, Analysis, and Implications , 2015, IEEE/ACM Transactions on Networking.

[24]  Cigdem Sengul,et al.  A sinkhole resilient protocol for wireless sensor networks: Performance and security analysis , 2012, Comput. Commun..

[25]  Jitender S. Deogun,et al.  Proactive mitigation of impact of wormholes and sinkholes on routing security in energy-efficient wireless sensor networks , 2009, Wirel. Networks.

[26]  Sushil Jajodia,et al.  Localized Multicast: Efficient and Distributed Replica Detection in Large-Scale Sensor Networks , 2010, IEEE Transactions on Mobile Computing.

[27]  Ashok Kumar Das,et al.  A Secure and Efficient User Anonymity-Preserving Three-Factor Authentication Protocol for Large-Scale Distributed Wireless Sensor Networks , 2015, Wirel. Pers. Commun..

[28]  G. A. Vijayalakshmi Pai,et al.  Swarm intelligence based approach for sinkhole attack detection in wireless sensor networks , 2014, Appl. Soft Comput..

[29]  Yuxiang Wang,et al.  Construction of Tree Network with Limited Delivery Latency in Homogeneous Wireless Sensor Networks , 2014, Wirel. Pers. Commun..

[30]  Dharma P. Agrawal,et al.  Gaussian versus Uniform Distribution for Intrusion Detection in Wireless Sensor Networks , 2013, IEEE Transactions on Parallel and Distributed Systems.

[31]  Sherali Zeadally,et al.  Anonymous Authentication for Wireless Body Area Networks With Provable Security , 2017, IEEE Systems Journal.

[32]  Danny Dolev,et al.  On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).

[33]  Liu Qiang,et al.  Detection and defence of Sinkhole attack in Wireless Sensor Network , 2012 .

[34]  Ahmad Khonsari,et al.  Detection and mitigation of sinkhole attacks in wireless sensor networks , 2014, J. Comput. Syst. Sci..

[35]  Ashok Kumar Das,et al.  A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks , 2016, Peer-to-Peer Netw. Appl..

[36]  Noël Crespi,et al.  Large-scale mobile phenomena monitoring with energy-efficiency in wireless sensor networks , 2015, Comput. Networks.

[37]  Kotagiri Ramamohanarao,et al.  Hop-Count Monitoring: Detecting Sinkhole Attacks in Wireless Sensor Networks , 2007, 2007 15th IEEE International Conference on Networks.

[38]  M.F.A. Rasid,et al.  Low Energy Consumption MAC Protocol for Wireless Sensor Networks , 2008, 2008 Second International Conference on Sensor Technologies and Applications (sensorcomm 2008).

[39]  Vijay Laxmi,et al.  Comparing the Impact of Black Hole and Gray Hole Attack on LEACH in WSN , 2013, ANT/SEIT.

[40]  Mukesh Singhal,et al.  Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..

[41]  Ashok Kumar Das,et al.  An effective ECC-based user access control scheme with attribute-based encryption for wireless sensor networks , 2015, Secur. Commun. Networks.

[42]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[43]  Ashok Kumar Das An efficient random key distribution scheme for large-scale distributed sensor networks , 2011, Secur. Commun. Networks.

[44]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[45]  Tassos Dimitriou,et al.  Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks , 2007, ALGOSENSORS.

[46]  Avita Katal,et al.  Detection and prevention mechanism for Blackhole attack in Wireless Sensor Network , 2013, 2013 International Conference on Communication and Signal Processing.

[47]  Yunhao Liu,et al.  Topological detection on wormholes in wireless ad hoc and sensor networks , 2009, IEEE/ACM Transactions on Networking.

[48]  Mukesh Singhal,et al.  Security in wireless sensor networks: Research Articles , 2008 .

[49]  Narayan C. Debnath,et al.  Countering sinkhole and black hole attacks on sensor networks using Dynamic Trust Management , 2008, 2008 IEEE Symposium on Computers and Communications.

[50]  Yasir Saleem,et al.  Network Simulator NS-2 , 2015 .

[51]  Ashok Kumar Das,et al.  A secure and effective biometric‐based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor , 2017, Int. J. Commun. Syst..

[52]  Jian Shen,et al.  A Novel Routing Protocol Providing Good Transmission Reliability in Underwater Sensor Networks , 2015 .

[53]  Reza Rafeh,et al.  A novel agent-based approach to detect sinkhole attacks in wireless sensor networks , 2013, Comput. Secur..

[54]  Shu-Chin Wang,et al.  An Integrated Intrusion Detection System for Cluster-based Wireless Sensor Networks , 2011, Expert Syst. Appl..

[55]  Weisong Shi,et al.  Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs , 2012, IEEE Transactions on Dependable and Secure Computing.

[56]  Lidong Zhai,et al.  Sinkhole Attack Detection based on Redundancy Mechanism in Wireless Sensor Networks , 2014, ITQM.

[57]  Tassos Dimitriou,et al.  Launching a Sinkhole Attack in Wireless Sensor Networks; The Intruder Side , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.