Swarm Flooding Attack against Directed Diffusion in Wireless Sensor Networks

Автор: Ibrahim S. I. Abuhaiba, Huda B. Hubboub

Журнал: International Journal of Computer Network and Information Security(IJCNIS) @ijcnis

Статья в выпуске: 12 vol.4, 2012 года.

Бесплатный доступ

The objective of this paper is to study the vulnerabilities of sensor networks, design, and implement new approaches for routing attack. As one of the cornerstones of network infrastructure, routing systems are facing more threats than ever; they are vulnerable by nature and challenging to protect. We present a new attack, Swarm Flooding Attack, against Directed Diffusion based WSNs, which targets the consumption of sensors computational resources, such as bandwidth, disk space, or processor time. Two variants of swarm attack have been introduced: Bee and Ant. Both approaches are inspired from the natural swarming difference between bees and ants. In all cases, the strategy used to mount an attack is the same. An attack consists of a set of malicious user queries represented by interests that are inserted into the network. However, the two forms of attack vary in the synchronization aspects among attackers. These types of attacks are hard to defend against as illustrated. For each of the proposed attack models, we present analysis, simulation, and experimental measurements. We show that the system achieves maximal damage on system performance represented by many metrics.

Еще

Wireless sensor network, denial of service attack, directed diffusion, swarming, flooding

Короткий адрес: https://sciup.org/15011142

IDR: 15011142

Текст научной статьи Swarm Flooding Attack against Directed Diffusion in Wireless Sensor Networks

Published Online November 2012 in MECS

A typical wireless sensor network is expected to give a certain data that the user is actively enquiring about after some amount of time. Many attack schemes tend to stop the proper performance of sensor networks to delay or even prevent the delivery of data requested by user. Despite the fact that the term attack usually refers to an adversary’s attempt to disrupt, undermine, or destroy a network, a Denial-of-Service (DoS) attack refers to any event that diminishes or eliminates a network’s ability to perform its expected function [1]. Such a technique may be helpful in specific applications such as utilizing the best of these attacks to find the weak tips of presented protocols at different layers. These attacks consequently would expose weaknesses that lead to effective countermeasures. Understanding these vulnerabilities can develop techniques for identifying attacks that attempt to take advantage of them and implement mechanisms to mitigate these attacks. In other more serious applications, there are situations where network blocking is necessary to protect public safety. For example, in hostile environments disabling the communication capabilities of the enemy represents a high priority. Another example is to prevent cell phone detonation of bombs. Furthermore, denial of service attack can be used in legitimate scenarios to achieve such purpose at different layers of the protocol. However, we chose to exploit the routing layer which represents one of the famous techniques widely used for this.

Several schemes have been proposed for routing in WSNs that leverage on sensor network specific characteristics such as application requirements. Directed Diffusion DD [2] is one example of a generic scheme for managing the data communication requirements and thus routing in WSNs. As a sensory network protocol, Directed Diffusion is subject to many threats and risks. However, in what follows we are interested in identifying the vulnerabilities of DD due to its infrastructure architectural design (for example, its special control signals).

Although a large body of literatures dealt with Directed Diffusion vulnerabilities, the vast majority of such work was devoted to theoretically discuss DD security and the possible attack threats with no implementations of these attacks as it was the case in [3] and [4] where both papers investigate different misuse actions manipulated to attack AODV and TORA, respectively, to achieve certain attack objectives.

In [5], security in wireless sensor networks has been proposed; the authors present general classes of attacks, and analyze the security of nearly all the currently documented sensor routing protocols including DD. However, this work may be considered as an argument of DD security rather than a real simulation of an attack on DD based sensory network.

Similarly in [6], taxonomy of possible threats to DD is viewed. Some of these attacks are cloning attack, flow suppression, path influence, selective forwarding, and node inclusion/exclusion.

In his paper, Kalambour [7] addresses some of the security issues for routing in sensor networks by taking an example of the Directed Diffusion protocol for analysis of the attacks and general possible countermeasures. He classified the possible attacks on Directed Diffusion protocol under three categories: (1) Denial of Service attacks that has two forms to achieve either by jamming or spoofing negative reinforcement, (2) Modification and spoofing of routing information in which the attacker sends spoofed events at a high data rate to the sink node or base station in order to successfully being able to include itself in the path of the base station and observes all packets sent to the base station, and (3) Dropping or selective forwarding of data.

Список литературы Swarm Flooding Attack against Directed Diffusion in Wireless Sensor Networks

  • A. D. Wood, J. A. Stankovic, "Denial of service in sensor networks," IEEE Computer, Vol. 35, pp. 54-62, 2002.
  • C. Intanagonwiwat, R. Govindan, D. Estrin, "Directed diffusion: a scalable and robust communication paradigm for sensor networks", MobiCom 2000, pp. 56-67, 2000.
  • P. Ning, K. Sun, "How to misuse AODV: A case study of insider attacks against mobile ad-hoc routing protocols," Ad Hoc Networks, Vol. 3, pp. 795-819, 2005.
  • V. L. Chee, W. C. Yau, "Security analysis of TORA routing protocol," Lecture Notes in Computer Science, Vol. 4705, pp. 975-986, 2007.
  • C. Karlof, D. Wagner, "Secure routing in wireless sensor networks: Attacks and countermeasures," Ad Hoc Networks, Vol. 1, pp. 293-315, 2003.
  • V. R. Kumar, J. Thomas, A. Abraham, "Secure directed diffusion routing protocol for sensor networks using the LEAP protocol," NATO Security through Science Series - D: Information and Communication Security, Vol.6, pp. 183-203, 2006.
  • A. Kalambur, "Secure routing in wireless sensor networks: A study on directed diffusion," available at http://www.cs.sjsu.edu/~stamp/CS265/projects/Spr04/section1/papers/Kalambur.doc, 2004.
  • S. Moon, T. Cho, "Intrusion detection scheme against sinkhole attacks in directed diffusion based sensor networks," International Journal of Computer Science and Network Security, Vol. 9, pp. 118-122, 2009.
  • J. Kim, P. Bentley, C. Wallenta, M. Ahmed, S. Hailes, "Danger is ubiquitous: Detecting malicious activities in sensor networks using the dendritic cell algorithm," ICARIS 2006, pp. 390–403, 2006.
  • P. Yi, Z. Dai, S. Zhang, Y. Zhong, "A new routing attack in mobile ad hoc networks," International Journal of Information Technology, Vol. 11, pp. 83-94, 2005.
  • M. J. Warren, M. Dougall, K. Pascoe, "Swarming attacks and agents," available at http://igneous.scis.ecu.edu.au/proceedings/2002/papers_full/26.pdf, 2002.
  • C. Hartung, J. Balasalle, R. Han, "Node compromise in sensor networks: The need for secure systems," University of Colorado Technical Report CU-CS-990-05, 2005.
  • O. Younis, S. Fahmy, "Distributed clustering in ad hoc sensor networks: A hybrid, energy-efficient approach," INFOCOM, pp. 629-640, 2004.
  • W. B. Heinzelman, "Application-specific protocol architectures for wireless networks," PhD thesis, Massachusetts Institute of Technology, USA, 2000.
  • A. Cerpa, D. Estrin, "Ascent: Adaptive self-configuring sensor networks topologies," IEEE Transactions on Mobile Computing, Vol. 3, pp. 272-285, 2004.
  • L. Eschenauer, V. D. Gligor, "A key-management scheme for distributed sensor networks," CCS 2002, pp. 41-47, 2002.
  • M. G. Hinchey, R. Sterritt, C. Rouff, "Swarms and Swarm Intelligence," IEEE Computer Society, Vol. 40, pp. 111-113, 2007.
  • K. Fall, K. Varadhan, "NS notes and documentation, the VINT project," available at http://www.isi.edu/nsnam/ns/doc/ns_doc.pdf, 2011.
  • P. Pancardo, J. C. Dueñas, "A proposal for system architecture to integrate scarce-resources wireless sensor neworks into ubiquitous environments," available at http://ftp.informatik.rwth-aachen.de/Publications/CEUR-WS/Vol-208/paper23.pdf, 2006.
  • A. Pathan, H. Lee, C. Hong, "Security in wireless sensor networks: Issues and challenges", ICACT 2006, Vol. 2, pp. 1048-1054, 2006.
Еще
Статья научная