Browse > Article

Detecting Inner Attackers and Colluded nodes in Wireless Sensor Networks Using Hop-depth algorithm  

Rhee, Kang-Hyeon (Dept. of Electronic Eng., College of Elec-Info Eng., Chosun University)
Publication Information
Abstract
Commonly, in the Sensor Network that composed with multiple nodes uses Ad-hoc protocol to communicate each other. Each sensed data packets are collected by base node and processed by Host PC. But the Ad-hoc protocol is too vulnerable to Sinkhole attack, where the intruder attracts surrounding nodes with unfaithful routing information, and then performs selective forwarding or changes the data passing through it. The Sinkhole attack increases overhead over the network and boosts energy consumption speed to decrease network's life time. Since the other attacks can be easily adopted through sinkhole attack, the countermeasure must be considered carefully. In this paper, we proposed the Hop-depth algorithm that detects intruder in Sinkhole attack and colluded nodes. First, the proposed algorithm makes list of suspected nodes and identifies the real intruder in the suspected node list through the Hop-depth count value. And recalculates colluder's path information to find the real intruder. We evaluated the performance of the proposed algorithm using NS2. We compared and analyzed the success ratio of finding real intruder, false positive ratio, false negative ratio, and energy consumption.
Keywords
Hop-depth; Sinkhole; malicious node; misdirecting;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Dorothy E. Denning, 'An Intrusion Detection Model,' in Proceeding of the IEEE Symposium on Security and Privacy., pp.118-131, 1986
2 W. B. Heinzelman, A. Chandrakasan, and H. Balakrishnan, 'An Application-Specific Protocol Architecture for wireless Microsensor Networks,' IEEE Transactions on Wireless Communications, vol. 1, no. 4, pp. 660-670, 2002   DOI   ScienceOn
3 N. Ye and Q. Chen, 'An Anomaly Detection Technique Based on a Chi-square Statistic for Detecting Intrusions into Information System,' Quality and Reliability Engineering International, vol. 17, no. 2, pp. 105-112, 2001   DOI   ScienceOn
4 D. Wagner, 'Resilent Aggregation in Sensor Networks,' in ACM Workshop on Security of Ad Hoc and Sensor Networks(SASN), pp. 78-97, Oct. 2004   DOI
5 J. Deng, R. Han, S. Mishra, 'Security Support In-Network Processing in Wireless Networks,' In Proceeding of 1st ACM Workshop on Security of Adhoc and Sensor Networks., 2003   DOI
6 C. Karlof, and D. Wagner, 'Secure Routing in Wireless Sensor Networks : Attack and Countermeasures,' In Elsevier's AdHoc Networks Journal, Special Issue on Sensor Network Application and Procotols., pp. 293-315, Sep. 2003
7 L. Lazos, R. Poovendran, C. Meadows, P. Syverson, and L. W. Chang , 'Preventing Wormhole Attacks in Wireless Ad Hoc Networks,' In IEEE Wireless and Communications and Networking Conference (WCNC)., pp. 1193-1199, Mar. 2005
8 Y.Zhang and W. Lee, 'Intrusion Detection in Wireless Ad-hoc Networks,' in proceeding of the 6th ACM MobiCom., pp. 275-283, 2000   DOI
9 Hongmel Deng, Wel LI, and Dharma P. Agrawal, 'Routing Security in Wireless Ad Hoc Networks,' In IEEE Communication magazine., pp. 70-75, Oct. 2002   DOI   ScienceOn