DOI QR코드

DOI QR Code

Vulnerability Analysis and Detection Mechanism against Denial of Sleep Attacks in Sensor Network based on IEEE 802.15.4

IEEE 802.15.4기반 센서 네트워크에서 슬립거부 공격의 취약성 분석 및 탐지 메커니즘

  • 김아름 (이화여자대학교 컴퓨터공학과) ;
  • 김미희 (미국 North Carolina State University) ;
  • 채기준 (이화여자대학교 컴퓨터공학과)
  • Published : 2010.02.28

Abstract

IEEE 802.15.4[1] has been standardized for the physical layer and MAC layer of LR-PANs(Low Rate-Wireless Personal Area Networks) as a technology for operations with low power on sensor networks. The standardization is applied to the variety of applications in the shortrange wireless communication with limited output and performance, for example wireless sensor or virtual wire, but it includes vulnerabilities for various attacks because of the lack of security researches. In this paper, we analyze the vulnerabilities against the denial of sleep attacks on the MAC layer of IEEE 802.15.4, and propose a detection mechanism against it. In results, we analyzed the possibilities of denial of sleep attacks by the modification of superframe, the modification of CW(Contention Window), the process of channel scan or PAN association, and so on. Moreover, we comprehended that some of these attacks can mount even though the standardized security services such as encryption or authentication are performed. In addition to, we model for denial of sleep attacks by Beacon/Association Request messages, and propose a detection mechanism against them. This detection mechanism utilizes the management table consisting of the interval and node ID of request messages, and signal strength. In simulation results, we can show the effect of attacks, the detection possibility and performance superiorities of proposed mechanism.

IEEE 802.15.4 표준기술[1]은 센서 네트워크에서 저전력을 위한 기술로 LR-WPANs(Low Rate-Wireless Personal Area Networks)의 물리 계층과 MAC계층을 규정한다. 이 표준은 무선 센서, 가상 선(Virtual Wire)과 같은 제한된 출력과 성능으로 간단한 단거리 무선 통신을 필요로 하는 폭넓은 응용에 활용되고 있지만 보안 측면의 연구는 현재 미비한 상태로 다양한 공격에 대한 취약점을 내포하고 있다. 본 논문에서는 802.15.4 MAC계층의 슬립거부(Denial of Sleep) 공격에 대한 취약성을 분석하고 이를 탐지하는 메커니즘을 제안한다. 분석 결과, 슈퍼프레임 구간 변경, CW(Contention Window)값 변경, 채널스캔 및 PAN 연합과정 등에서 슬립거부 공격의 가능성을 분석할 수 있었고, 이 과정 중 일부에서는 표준에서 정의한 인증과 암호화 기능이 적용되어도 공격 가능함을 알 수 있었다. 또한 본 논문에서는 분석된 취약점 중에 채널스캔 및 PAN 연합과정에서 Beacon/Association Request 메시지 위조를 통한 슬립거부 공격의 탐지 메커니즘을 제안한다. 제안된 메커니즘은 메시지 요청 간격, 요청 노드 ID, 신호 세기 등을 모니터링하여 공격을 식별하여 탐지한다. QualNet 시뮬레이션 툴을 사용하여 공격의 영향 및 제안된 탐지 메커니즘의 탐지 가능성과 성능의 우수성을 입증할 수 있었다.

Keywords

References

  1. IEEE Std 802.15.4, "Part 15.4:Wireless Medium Access Control(MAC) and Physical Layer(PHY) Specifications for Low-Rate Wireless Personal Area Networks(WPANs)," September, 2006.
  2. 김태연, "무선 센서 네트워크를 위한 새로운 키 사전 분배 구조", 정보처리학회논문지C, Vol.16-C, No.02, pp.0173-0188, 2009 년 4월. https://doi.org/10.3745/KIPSTC.2009.16-C.2.183
  3. 서재원, 김미희, 채기준, "의료 센서 네트워크에서의 효율적인 전송 구조 및 Key Provisioning을 사용한 키 관리 기법 연구", 정보처리학회논문지C, Vol.16-C, No.03, pp.0285-0298, 2009년 6월. https://doi.org/10.3745/KIPSTC.2009.16-C.3.285
  4. 조관태, 김용호, 이동훈, "센서 네트워크 내의 위조된 데이터 삽입 공격 방지를 위한 인증 방법", 정보처리학회논문지C, Vol.14-C, No.05, pp.0389-0394, 2007년 8월. https://doi.org/10.3745/KIPSTC.2007.14-C.5.389
  5. David Raymond, Randy Marchany, Michael Brownfield, Scott Midkiff., “Effects of Denial of Sleep Attacks on Wireless Sensor Network MAC Protocols,” Proc. 7th Ann. IEEE Systems, Man, and Cybernetics (SMC) Information Assurance Workshop (IAW), IEEE Press, pp.297-304, 2006.
  6. "QualNet 4.5 Product Tour," http://www.scalable-networks.com, Dec., 2006.
  7. Wenyuan Xu, Ke Ma, Wade Trappe, Yanyong Zhang, "Jamming sensor networks: attack and defense strategies," Network, IEEE, Vol.20, No.3, pp.41-47, 2006. https://doi.org/10.1109/MNET.2006.1637931
  8. Wenyuan Xu, Wade Trappe, Yanyong Zhang, Timothy Wood, “The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks,”Proc. 11th Ann. Int'l Conf. Mobile Computing and Networking, ACM Press, pp.46-57, 2005.
  9. Wenyuan Xu, Timothy Wood, Wade Trappe, Yanyong Zhang, "Channel surfing and spatial retreats: defenses against wireless denial of service," 3rd ACM workshop on Wireless security, pp.80-89, 2004.
  10. W. Ye, J. Heidemann, D. Estrin, "Medium Access Control with Coordinated Adaptive Sleeping for Wireless Sensor Networks,"IEEE/ACM Trans. Networking, Vol.12, No.3, pp.493-506, 2004. https://doi.org/10.1109/TNET.2004.828953
  11. J. Polastre, J. Hill, D. Culler, "Versatile Low Power Media Access for Wireless Sensor Networks," 2nd ACM Int'l Conf. Embedded Networked Sensor Systems, ACM Press, pp.95-107, 2004.
  12. T. VanDam, K. Langendoen, "An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Networks," 1st ACM Int'l Conf. Embedded Networked Sensor Systems, ACM Press, pp.171-180, 2003.
  13. David R. Raymond, Scott F. Midkiff, "Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses," IEEE Pervasive Computing, Vol.7, No.1, pp.74-81, 2008. https://doi.org/10.1109/MPRV.2008.6
  14. John Paul Walters, Zhengqiang Liang, Weisong Shi, Vipin Chaudhary "Wireless Sensor Network Security: A Survey," Security in Distributed, Grid, and Pervasive Computing, Auerbach Publications, CRC Press, 2006.
  15. Misic, V.B., Fang, J., Misic, J., "MAC layer security of 802.15.4-compliant networks," Proc. of IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005.
  16. Neal Patwari, Alfred O. HeroIII, Matt Perkins, Neiyer S. Correal and Robert J.O'Dea, "Relative Location Estimation in Wireless Sensor Networks," IEEE TRANSACTIONS ON SIGNAL PROCESSING 2002.
  17. Neal Patwari, Alfred O. Hero III, "Demonstration Distributed Signal Strength Location Estimation," ACM SenSys 2006.
  18. L. Sang and A. Arora, "Spatial signatures for lightweight security in wireless sensor networks," IEEE INFOCOM, pp.2137-2145, April, 2008.
  19. S. Mathur, W. Trappe, N. Mandayam, C. Ye, and A. Reznik, "Radio-telepathy: extracting a secret key from an unauthenticated wireless channel," ACM MobiCom, pp.128-139, 2008.
  20. P. J. Marron, M. Gauger, A. Lachenmann, D. Minder, O.Saukh, and K. Rothermel, "Flexcup: A flexible and efficient code update mechanism for sensor networks," European Workshop on Wireless Sensor Networks (EWSN), 2006.