Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2007.14-C.3.229

Analysis of the Bogus Routing Information Attacks in Sensor Networks  

Lee, Myung-Jin (이화여자대학교 컴퓨터학과)
Kim, Mi-Hui (이화여자대학교 컴퓨터학과)
Chae, Ki-Joon (이화여자대학교 컴퓨터학과)
Kim, Ho-Won (한국전자통신연구원 정보보호연구단)
Abstract
Sensor networks consist of many tiny sensor nodes that collaborate among themselves to collect, process, analyze, and disseminate data. In sensor networks, sensor nodes are typically powered by batteries, and have limited computing resources. Moreover, the redeployment of nodes by energy exhaustion or their movement makes network topology change dynamically. These features incur problems that do not appear in traditional, wired networks. Security in sensor networks is challenging problem due to the nature of wireless communication and the lack of resources. Several efforts are underway to provide security services in sensor networks, but most of them are preventive approaches based on cryptography. However, sensor nodes are extremely vulnerable to capture or key compromise. To ensure the security of the network, it is critical to develop suity mechanisms that can survive malicious attacks from "insiders" who have access to the keying materials or the full control of some nodes. In order to protect against insider attacks, it is necessary to understand how an insider can attack a sensor network. Several attacks have been discussed in the literature. However, insider attacks in general have not been thoroughly studied and verified. In this paper, we study the insider attacks against routing protocols in sensor networks using the Ad-hoc On-Demand Distance Vector (AODV) protocol. We identify the goals of attack, and then study how to achieve these goals by modifying of the routing messages. Finally, with the simulation we study how an attacker affects the sensor networks. After we understand the features of inside attacker, we propose a detect mechanism using hop count information.
Keywords
Sensor Network; Inside Attack; Attack Detection; AODV; Bogus Routing Information;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Ning, P., Sun, K., 'How to misuse AODV: A case study of insider attacks against mobile ad-hoc routing protocol,' Proc. of Information Assurance Workshop, IEEE Systems, Man and Cybernetics Society, 2003   DOI
2 Karp, B., Kung, H., 'GPSR: Greedy Perimeter stateless Routing for Wireless Networks,' MobiCom, 2000   DOI
3 Douceur, J., 'The Sybil Attack,' 1st International Workshop on Peer-to-Peer Systems 2002   DOI
4 Newsome, J., Shi, E., Song, D., Perrig, A., 'The sybil attack in sensor networks: analysis & defenses,' Proc. of the third international symposium on Information processing in sensor networks, ACM, pp.259-268, 2004   DOI
5 Wood, A.D., Stankovic, J.A., Stankovic, 'Denial of service in sensor network,' Computer IEEE, Volume 35, pp.54-62, Oct., 2002   DOI   ScienceOn
6 Perkins, C., Delding-Royer, E., Das, S., 'Ad hoc On-Demand Distance Vector (AODV) Routing,' IETF RFC 3561, 2003
7 Karlof, C., Wagner, D., 'Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures,' First IEEE International Workshop on Sensor Network Protocols and Applications, May, 2003   DOI
8 Li, M., 'Secure Routing Protocols in Wireless Sensor Networks,' CSCE 990, UNL, Nov., 2004
9 김신효, 강유성, 정병호, 정교일, 'u-센서 네트워크 보안 기술 동향', 전자통신동향분석, 제20권 제1호, Feb., 2005   과학기술학회마을
10 Benjamin, J., Culpepper, H., Tseng, C., 'Sinkhole intrusion indicators in DSR MANETs,' Proc. First International Conference on Broad band Networks, pp.681-688, 2004   DOI
11 Blackert, W.J., Gregg, D.M., Castner, A.K., Kyle, E.M., Hom, R.L., Jokerst, R.M., 'Analyzing interaction between distributed denial of service attacks and mitigation technologies,' Proc. of DARPA Information Survivability Conference and Exposition, Volume 1, pp.26-36, Apr., 2003
12 Wang, B.T., Schulzrinne, H., 'An IP traceback mechanism for reflective DoS attacks,' Canadian Conference on Electrical and Computer Engineering, Volume 2, pp.901-904, May, 2004
13 Wood, A.D., Stankovic, J.A., 'Denial of service in sensor network,' Computer IEEE, Volume 35, pp.54-62, Oct., 2002   DOI   ScienceOn
14 The Network Simulator-ns-2, http://www.isi.edu/nsnam/ns
15 IEEE 802.15.4-2003 IEEE Standard for Information Technology-Part 15.4: Wireless Medium Access Control (MAC) and Physical layer (PHY) Specifications for Low Rate Wireless Personal Area Networks (LR-WPANS), 2003
16 Misic, V.B., Jun Fang, Misic, J., 'MAC layer security of 802.15.4-compliant networks,' Proc. of IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005   DOI
17 Liao, W.H., Tseng, Y.C., Sheu, J.P., 'GRID: A Fully Location-Aware Routing Protocol for Mobile Ad Hoc Networks,' Telecommunication Systems, 18(1):pp.37-60, 2001   DOI
18 Wireless and Mobility Extensions to ns-2, http://www.monarch.cs.cmu.edu/cmu-ns.html