Sinkhole Attack Detection Scheme using Neighbors’ Information for LEAP based Wireless Sensor Networks

نویسندگان

  • Tae-ho Cho
  • J. A. Chaudhry
  • U. Tariq
  • M. A. Amin
  • B. G. Choi
  • E. J. Cho
  • J. H. Kim
  • C. S. Hong
چکیده

Intrinsic resource constraints and vulnerability to a variety of malicious attacks hinders the widespread deployment of wireless sensor networks (WSNs). One of the malicious attacks is the so-called sinkhole attack where one or more compromised nodes, pretending to be closer to the base station, disseminates a false advertisement. The event reporting nodes start forwarding their reports to these compromised nodes. These compromised nodes can take control of the network traffic, eavesdrop on real communication, and forge reports that are then forwarded to the base-station. In the localized encryption and authentication protocol (LEAP) key management protocol, compromised nodes can expose the keys to the adversary. Therefore, it is crucial to detect and evict compromised nodes instead of using a key sharing approach. In this paper, a fuzzy logic system-based method to detect the compromised nodes and to prevent sinkhole attacks is proposed. Proposed method use neighbor information (i.e., number of common neighbors and their parent node information) to detect compromised nodes. Experimental results demonstrate the validity of the proposed approach in that it provides maintained safeguards and reduces communication cost.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Survey of Detection of Sinkhole Attack in Wireless Sensor Network

Wireless Sensor Network (WSN) is emerging as a prevailing technology due to its wide range of applications in military and civilian domains. These networks are easily prone to security attacks. Unattended installation of sensor nodes in the environment causes many security threats in the wireless sensor networks. There are many possible attacks on sensor network such as selective forwarding, ja...

متن کامل

Hash Based Sinkhole Attack Detection Scheme For Wireless Sensor Networks

This paper investigates one of the most severe routing attacks in sensor networks, namely sinkhole attack. A compromised node tries to draw all or as much traffic as possible from a particular area, by making it look attractive to the surrounding nodes with respect to the underlying routing metric. The detection of sinkhole attack in wireless sensor networks is proposed using an enhanced double...

متن کامل

Intrusion Detection Scheme against Sinkhole Attacks in Directed Diffusion Based Sensor Networks

Wireless Sensor Networks (WSNs) detect and report interesting events when they occur in the target region. These networks are vulnerable to security breach due to wireless communication and lack of infrastructure. In sinkhole attacks, an attacker attracts network traffic by forging or replaying routing messages through compromised nodes. Thus attracted traffic is used for selective forwarding, ...

متن کامل

LPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring

Communication security of wireless sensor networks is achieved using cryptographic keys assigned to the nodes. Due to resource constraints in such networks, random key pre-distribution schemes are of high interest. Although in most of these schemes no location information is considered, there are scenarios that location information can be obtained by nodes after their deployment. In this paper,...

متن کامل

Unauthenticated event detection in wireless sensor networks using sensors co-coverage

Wireless Sensor Networks (WSNs) offer inherent packet redundancy since each point within the network area is covered by more than one sensor node. This phenomenon, which is known as sensors co-coverage, is used in this paper to detect unauthenticated events. Unauthenticated event broadcasting in a WSN imposes network congestion, worsens the packet loss rate, and increases the network energy con...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016