Browse > Article
http://dx.doi.org/10.13089/JKIISC.2022.32.6.1165

A Statistical Detection Method to Detect Abnormal Cluster Head Election Attacks in Clustered Wireless Sensor Networks  

Kim, Sumin (Korea National Defense University)
Cho, Youngho (Korea National Defense University)
Abstract
In WSNs, a clustering algorithm groups sensor nodes on a unit called cluster and periodically selects a cluster head (CH) that acts as a communication relay on behalf of nodes in each cluster for the purpose of energy conservation and relay efficiency. Meanwhile, attack techniques also have emerged to intervene in the CH election process through compromised nodes (inside attackers) and have a fatal impact on network operation. However, existing countermeasures such as encryption key-based methods against outside attackers have a limitation to defend against such inside attackers. Therefore, we propose a statistical detection method that detects abnormal CH election behaviors occurs in a WSN cluster. We design two attack methods (Selfish and Greedy attacks) and our proposed defense method in WSNs with two clustering algorithms and conduct experiments to validate our proposed defense method works well against those attacks.
Keywords
WSN Security; Abnormal Cluster Head Election; Greedy Attack; Selfish Attack;
Citations & Related Records
연도 인용수 순위
  • Reference
1 T. Rault, A. Bouabdallah and Y. Challal, "Energy efficiency in wireless sensor networks: A top-down survey", Comput. Netw., vol. 67, pp. 104-122, Jul. 2014.   DOI
2 M. M. Zanjireh and H. Larijani, "A survey on centralised and distributed clustering routing algorithms for WSNs", Proc. IEEE 81st Veh. Technol. Conf. (VTC Spring), pp. 1-6, May. 2015.
3 H. Rifa-Pous and J. Herrera-Joancomarti, "A fair and secure cluster formation process for ad hoc networks," Wireless Personal Communications, vol. 56, no. 3, pp. 625-636, Feb. 2011.   DOI
4 L. Buttyan and T. Holczer, "Private cluster head election in wireless sensor networks", Proc. IEEE 6th Int. Conf. Mobile Adhoc Sensor Syst., pp. 1048-1053, Oct. 2009.
5 W. R. Heinzelman, A. Chandrakasan and H. Balakrishnan, "Energy-efficient communication protocol for wireless microsensor networks", Proc. 33rd Annu. Hawaii Int. Conf. Syst. Sci., pp. 10-20, Jan. 2000.
6 O. Younis and S. Fahmy, "HEED: A hybrid energy-efficient distributed clustering approach for ad hoc sensor networks", IEEE Trans. Mobile Comput., vol. 3, no. 4, pp. 366-379, Oct. 2004.   DOI
7 T. Suh and Y. Cho, "An enhanced trust mechanism with consensus-based false information filtering algorithm against bad-mouthing attacks and false-praise attacks in WSNs," Electronics, vol. 8, no. 11, pp. 1359-1375, Nov. 2019.   DOI
8 L. B. Oliveira, H. C. Wong, M. Bern, R. Dahab and A. A. F. Loureiro, "SecLEACH-A random key distribution solution for securing clustered sensor networks", Proc. 5th IEEE Int. Symp. Netw. Comput. Appl., pp. 145-154, Jul. 2006.
9 O. Boyinbode, H. Le, A. Mbogho, M. Takizawa and R. Poliah, "A Survey on Clustering Algorithms for Wireless Sensor Networks," Proc. 13th Int. Conf. Netw.-Based Inf. Syst., pp. 358-364, Sep. 2010.
10 A. Saidi, K. Benahmed and N. Seddiki, "Secure cluster head election algorithm and misbehavior detection approach based on trust management technique for clustered wireless sensor networks," Ad Hoc Networks, Vol. 106, pp. 102215, Sep. 2020.   DOI