Browse > Article
http://dx.doi.org/10.13089/JKIISC.2021.31.1.83

Sleep Deprivation Attack Detection Based on Clustering in Wireless Sensor Network  

Kim, Suk-young (Korea University)
Moon, Jong-sub (Korea University)
Abstract
Wireless sensors that make up the Wireless Sensor Network generally have extremely limited power and resources. The wireless sensor enters the sleep state at a certain interval to conserve power. The Sleep deflation attack is a deadly attack that consumes power by preventing wireless sensors from entering the sleep state, but there is no clear countermeasure. Thus, in this paper, using clustering-based binary search tree structure, the Sleep deprivation attack detection model is proposed. The model proposed in this paper utilizes one of the characteristics of both attack sensor nodes and normal sensor nodes which were classified using machine learning. The characteristics used for detection were determined using Long Short-Term Memory, Decision Tree, Support Vector Machine, and K-Nearest Neighbor. Thresholds for judging attack sensor nodes were then learned by applying the SVM. The determined features were used in the proposed algorithm to calculate the values for attack detection, and the threshold for determining the calculated values was derived by applying SVM.Through experiments, the detection model proposed showed a detection rate of 94% when 35% of the total sensor nodes were attack sensor nodes and improvement of up to 26% in power retention.
Keywords
Wireless sensor network; Sleep deprivation attack; S-MAC; Energy efficiency;
Citations & Related Records
연도 인용수 순위
  • Reference
1 F. Stajano, "Security for Ubiquitous Computing," International Conference on I nformation Security and Cryptology. Springer, Berlin, Heidelberg, pp. 2-2, Dec. 2004.
2 F. Stajano and R. Anderson, "The Resurrecting Duckling: Security Issues in AdHoc Wireless Networks," International workshop on security protocols, pp. 172-194, Apr. 1999.
3 D. R. Raymond and S. F. Midkiff, "Denial-of-Service in Wireless Sensor Network s: Attacks and Defenses," IEEE Pervasive Computing, vol. 7, no. 2, pp. 74-81, 2008.   DOI
4 M. Rirretti, S.Zhu, N. Vijaykrishnan, P. Mcdaniel and M. Kandemir, "The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense," International Journal of Distributed Sensor Networks. vol. 2, no. 3, pp. 267-87, Jul. 2006.   DOI
5 Seong-hwan Jeong, Woo-jin. Jang and Chang-hun Lee, "Modeling and Performan ce Analysis of S-MAC Protocol in Tandem Sensor Networks," Korean Institute Of Industrial Engineers, pp. 436-442, May. 2007.
6 D.R Raymond, R.C. Marchany, M.I. Brownfield and S.F. Midkiff, "Effects of Den ial-of-Sleep Attacks on Wireless Sensor Network MAC Protocols," IEEE Transactions on vehicular technology, vol. 58, no. 1, pp. 367-380, Jan. 2009.   DOI
7 T. Bhattasali, R. Chaki and S. Sanyal, "Sleep Deprivation Attack Detection in Wireless Sensor Network," arXiv preprint arXiv:1203.0231, 2012.   DOI
8 Chan-young Yun, "Energy efficient S-MAC Protocol in Wireless Sensor Network." The Journal of Korean Institute of Communications and Information Sciences, 33(2), pp. 20-26, Feb. 2008.
9 A. Gallais, T.H. Hedli, V. Loscri and N. Mitton, "Denial-of-Sleep Attacks against IoT Networks," 2019 6th International Conference on Control, Decision and Information Technologies(CoDIT). IEEE, p p. 1025-1030, Apr. 2019.
10 Jae-hong Park, Kyeung-seek Lew and Yong-deak Kim, "Energy Efficient MAC Pr otocols based on S-MAC for Wireless Sensor Networks," Journal of the Institute of Electronics Engineers of Korea CI, 44(2), pp. 19-24, Mar. 2007.
11 S. Naik and N. Shekokar, "Conservation of energy in wireless sensor network by preventing denial of sleep attack," Procedia Computer Science 45. pp. 370-379, Mar. 2015.   DOI
12 G. Mahalakshmi and P. Subathra, "A Survey on Prevention Approaches for Denial of Sleep Attacks in Wireless Networks," Journal of Emerging Technologies in Web Intelligence, vol. 6, no. 1, pp. 106-110, 2014.
13 C. T. Hsueh, C. Y. Wen and Y. C. Ouyang, "A secure scheme against power exhausting attacks in hierarchical wireless sensor networks," IEEE Sensors Journal, vol. 15, no. 6, pp. 3590-3602, 2015.   DOI
14 W. Ye, J. Heidemann and D. Estrin, "An energy-efficient MAC protocol for wireless sensor networks," Proceedings. Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 3, pp. 1567-1576, 2002.
15 J. Granjal, E. Monteiro and J. S. Silva, "Security for the internet of things: A survey of existing protocols and open research issues," IEEE Communications Surveys & Tutorials, vol. 17, no. 3, pp. 1294-1312, 2015.   DOI
16 E. Gelenbe and Y. M. Kadioglu, "Energy Life-Time of Wireless Nodes with Network Attack and Mitigation," 2018 IEEE International Conference on Communications Workshops (ICC Workshops). IEEE, pp. 1-6, 2018.
17 S. Bandyopadhyay and E. J. Coyle, "An Energy-Efficient Hierarchical Clusterin g Algorithm for Wireless Sensor Networks," IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No. 03CH37428), vol. 3, pp. 1713-1723, 2003.
18 M. Brownfield, Y. Gupta and N. Davis, "Wireless Sensor Network Denial of Sleep Attack," Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop. IEEE, pp. 356-364, Jun. 2005.
19 D. R. Raymond and S. F. Midkiff, "Clustered Adaptive Rate Limiting: Defeating Denial-Of-Sleep Attacks In Wireless Sensor Networks," MILCOM 2007-IEEE military communications conference. IEEE, pp. 1-7, Oct. 2007.
20 C. Chen, L. Hui, Q. Pei, L. Ning and P. Qingquan, "An Effective Scheme for Defending Denial-of-Sleep Attack in Wireless Sensor Networks," 2009 Fifth International Conference on Information Assurance and Security. Vol. 2. IEEE, vol. 2, pp. 446-449, 2009.
21 W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, "Energy-Efficient Communication Protocol for Wireless Micro-sensor Networks," Proceedings of the 33rd Hawaii international conference on system sciences, vol. 8, pp. 3005-3014, Jan. 2000.
22 D. E. Boubiche and A. Bilami, "A Defense Strategy against Energy Exhausting Attacks in Wireless Sensor Networks," Journal Of Emerging Technologies In Web Intelligence, vol. 5, no. 1, Feb. 2013.
23 R.Fotohi, S.F. Bari and M. Yusefi, "Securing Wireless Sensor Networks Against Denial-of-Sleep Attacks Using RSA Cryptography Algorithm and Interlock Protocol," International Journal of Communication Systems. vol 33, no. 4, 2020.
24 C. T. Hsueh, C. Y. Wen and Y. C. Ouyang, "A secure scheme against power exhausting attacks in hierarchical wireless sensor networks," IEEE Sensors journal, vol. 15, no. 6, pp. 3590-3602, 2015.   DOI
25 W. Ye, J. Heidemann and D. Estrin, "An energy-efficient MAC protocol for wireless sensor networks," Proceedings. Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 3, pp. 1567-1576, Jun. 2002.
26 M. Gunasekaran and S. Periakaruppan, "GA‐DoSLD: genetic algorithm based denial‐of‐sleep attack detection in WSN," Security and Communication Networks, 2017.
27 D. G. Zhang, S. Zhou and T.M. Tang, "A low duty cycle efficient MAC protocol based on self‐adaption and predictive strategy," Mobile Networks and Applications. vol. 23, no. 4, pp. 828-839, 2018.   DOI
28 D. G. Zhang, H. L. Niu and S. Liu, "Novel PEECR‐based clustering routing approach," Soft Computing, vol 21, no. 24, pp. 7313-7323, 2017.   DOI
29 D. G. Zhang, C. Chen, Y.Y. Cui and T. Zhang, "New method of energy efficient subcarrier allocation based on evolutionary game theory," Mobile Networks and Applications, pp. 1-14, 2018.
30 T. V. Dam and K. Langendoen, "An adaptive energy-efficient MAC protocol for wireless sensor networks," Proceedings of the 1st international conference on Emb edded networked sensor systems, pp. 171-180, Nov. 2003.
31 J. Polastre, J. Hill, and D. Culler, "Versatile low power media access for wireless sensor networks," Proceedings of the 2nd international conference on Embedded networked sensor systems, pp. 95-107, Nov. 2004.
32 F. Adebayo, "Detecting Denial of Service attack in Wireless Sensor Networks," PhD Thesis, 2014.
33 D. Popescu, C. Dragana, F. stoican, L. Ichim and G. Stamatescu, "A Collaborative UAV-WSN Network for Monitoring Large Areas," Sensors, vol. 18. no. 12, 2018.