Browse > Article

A Effective Sinkhole Attack Detection Mechanism for LQI based Routing in WSN  

Choi, Byung-Goo (경희대학교 컴퓨터공학과)
Cho, Eung-Jun (경희대학교 컴퓨터공학과)
Hong, Choong-Seon (경희대학교 컴퓨터공학과)
Abstract
In this paper, we propose a detection scheme for sinkhole attacks in wireless sensor networks. Sinkhole attack makes packets that flow network pass through attacker. So, Sinkhole attack can be extended to various kind of attacks. We analyze sinkhole attack methods in the networks that use LQI based routing. For the purpose of response to each attack method, we propose methods to detect attacks. Our scheme can work for those sensor networks which use LQI based dynamic routing protocol. And we show the detection of sinkhole attack can be achieved by using a few detector nodes.
Keywords
Sinkhole; Attack detection; Link quality indicator; Wireless sensor network; Dynamic routing protocol;
Citations & Related Records
연도 인용수 순위
  • Reference
1 C. Karlof and D. Wagner, "Secure routing in wireless sensor networks: attacks and countermeasures," Proc. First IEEE Int'l Workshop on Sensor Network Protocols and Applications, May 2003
2 Ioannis Krontiris, Tassos Dimitriou, Thanassis Giannetsos, and Marios Mpasoukos, "Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks," ALGOSENSORS 2007, LNCS 4837, pp. 150-161, 2008
3 Ji-Hoon Yun, Il-Hwan Kim, Jae-Han Lim, and Seung-Woo Seo, "WODEM: Wormhole Attack Defense Mechanism in Wireless Sensor Networks," ICUCT 2006, LNCS 4412, pp. 200-209, 2007
4 B. Yu, B. Xiao, "Detecting selective forwarding attacks in wireless sensor networks," Proceedings of the Second International Workshop on Security in Systems and Networks (IPDPS 2006 Workshop), pp. 1-8, 2006
5 K. Kim, S. Daniel Park, G. Montenegro, N. Kushalnagar, "6LoWPAN Ad Hoc On-Demand Distance Vector Routing (LOAD)," Internet-Draft (Expired), June 19, 2007
6 Edith C. H. Ngai, Jiangchuan Liu, Michael R. Lyu, "An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks," Computer Communications, Sept. 2007
7 C. Perkins, E. Belding-Royer, S. Das, "Ad hoc On-Demand Distance Vector Routing," RFC 3561, July 2003
8 IEEE Computer Society, "Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (WPANs)," IEEE 802.15.4 Standard, 2006