DOI QR코드

DOI QR Code

Interleaved Hop-by-Hop Authentication in Wireless Sensor Network Using Fuzzy Logic to Defend against Denial of Service Attack

인터리브드 멀티홉 인증을 적용한 무선 센서네트워크에서 퍼지로직을 이용한 서비스 거부 공격에 대한 방어 기법

  • 김종현 (성균관대학교 정보통신공학부) ;
  • 조대호 (성균관대학교 정보통신공학부)
  • Received : 2009.06.30
  • Accepted : 2009.09.08
  • Published : 2009.09.30

Abstract

When sensor networks are deployed in open environments, an adversary may compromise some sensor nodes and use them to inject false sensing reports. False report attack can lead to not only false alarms but also the depletion of limited energy resources in battery powered networks. The Interleaved hop-by-hop authentication (IHA) scheme detects such false reports through interleaved authentication. In IHA, when a report is forwarded to the base station, all nodes on the path must spend energies on receiving, authenticating, and transmitting it. An dversary can spend energies in nodes by using the methods as a relaying attack which uses macro. The Adversary aim to drain the finite amount of energies in sensor nodes without sending false reports to BS, the result paralyzing sensor network. In this paper, we propose a countermeasure using fuzzy logic from the Denial of Service(DoS) attack and show an efficiency of energy through the simulataion result.

무선 센서 네트워크는 열린 환경에 배치되기 때문에 노드는 공격자들로부터 포획당하고 허위 보고서를 삽입 될 수 있다. 허위 보고서 삽입 공격은 허위 경보를 유발할 뿐만 아니라 네트워크의 제한된 에너지를 고갈 시킨다. Interleaved hop-by-hop authentication(IHA)은 인터리브드 검증을 통하여 허위 보고서를 탐지하는 기법이다. 하지만 모든 센서 네트워크에서와 같이 IHA에서도 보고서를 BS로 전달 할 때 모든 전송 노드들은 보고서를 송/수신, 인증만으로도 에너지를 소비한다. 공격자는 이것을 이용함으로써 허위 보고서 배포 목적이 아닌 단지 에너지 소비만을 유도하여 결과적으로 네트워크의 마비를 초래하는 것을 목표로 서비스 거부 공격을 한다. 본 논문에서는 이러한 서비스 거부 공격에 대응하기 위하여 퍼지 로직 시스템를 이용하여 허위 보고서 재전송 공격을 방어하는 기법을 제안한다. 그리고 시뮬레이션을 통해 기존의 기법과 제안한 기법을 비교하여 에너지 효율성을 증명한다.

Keywords

References

  1. I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirici, "A survey on sensor networks," IEEE Communications Magazine, Vol. 40, No. 8, pp. 102-114, Aug. 2002. https://doi.org/10.1109/MCOM.2002.1024422
  2. J.N. Al-Karaki, and A.E. Kamal, "Routing techniques in wireless sensor networks: a survey," IEEE Wireless Communication Magazine, Vol. 11, No. 6, pp. 6-28, 2004. https://doi.org/10.1109/MWC.2004.1368893
  3. H. Yang, S. Lu, "Commutative Cipher Based En-route Filtering in Wireless Sensor Networks," in IEEE Vehicular Technology Conference(VTC) 2004-Fall Symposium on Wireless Technologies for Global Security, 2004
  4. Ye, F., Luo, H., Lu, S., Zhang, L. (2005), "Statistical Enroute Filtering of Injected False Data in Sensor Networks", IEEE Journals on Selected Areas in Communications, Vol. 23, No. 4, pp. 839-850. https://doi.org/10.1109/JSAC.2005.843561
  5. Yu, Z. Guan, Y. (2005), "A Dynamic En-route Scheme for Filtering False Data Injection in Wireless Sensor Networks", Proc. of SenSys, pp. 294-295, ACM.
  6. Yang, H., Lu, S. (2004), "Commutative Cipher Based Enroute Filtering in Wireless Sensor Networks", Proc. of VTC, pp. 1223-1227, IEEE.
  7. Zhu, S., Setia, S., Jajodia, S., Ning, P. (2004), "An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks", Proc. S&P, pp. 259-271.
  8. Thao P. Nghiema, and Tae Ho Cho, "A fuzzy-based interleaved multi-hop authentication scheme in wireless sensor networks", J. Parallel Distib. Comput. Vol. 69, pp. 441- 450. May. 2009. https://doi.org/10.1016/j.jpdc.2009.01.007
  9. H.Y Lee, T.H. Cho, "Fuzzy-Based Adaptive Threshold Determining Method for the Interleaved Authentication in Sensor Networks", Lect. Notes Artif. Int., Vol. 4293, pp. 112-121, Nov. 2006.
  10. Chris Karlof and David Wagner, "Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures," First IEEE International Workshop on Sensor Network Protocols and Applications, May 2003.
  11. F. Ye, H. Luo, S. Lu, "Statistical En-Route Filtering of Injected False Data in Sensor Networks," IEEE J. Sel. Area Comm., Vol. 23, No. 4, pp. 839-850, 2005. https://doi.org/10.1109/JSAC.2005.843561
  12. A. A. Elsamiee, The development of AWS AND introductory to the IWS, intelligent weather system, in: TECO 2006–WMO Technical Conf., 2006.
  13. M. Yusuf, T. Haider, Energy-aware fuzzy routing for wireless sensor networks, in: IEEE International Conf. on Emerging Technologies, 2005.