Browse > Article
http://dx.doi.org/10.5391/JKIIS.2016.26.4.267

Secure route determination method to prevent sinkhole attacks in INSENS based wireless sensor networks  

Song, Kyu-Hyun (College of Information and Communication Engineering, Sungkyunkwan University)
Cho, Tae-Ho (College of Software, Sungkyunkwan University)
Publication Information
Journal of the Korean Institute of Intelligent Systems / v.26, no.4, 2016 , pp. 267-272 More about this Journal
Abstract
Wireless sensor networks (WSNs) are vulnerable to external intrusions due to the wireless communication characteristics and limited hardware resources. Thus, the attacker can cause sinkhole attack while intruding the network. INSENS is proposed for preventing the sinkhole attack. INSENS uses the three symmetric keys in order to prevent such sinkhole attacks. However, the sinkhole attack occurs again, even in the presence of INSENS, through the compromised node because INSENS does not consider the node being compromised. In this paper, we propose a method to counter the sinkhole attack by considering the compromised node, based on the neighboring nodes' information. The goals of the proposed method are i) network reliability improvement and ii) energy conservation through effective prevention of the sinkhole attack by detecting compromised nodes. The experimental results demonstrate that the proposed method can save up to, on average, 19.90% of energy while increasing up to, on average, 71.50%, the report reliability against internal sinkhole attacks in comparison to INSENS.
Keywords
Wireless Sensor Networks; Network security; Sinkhole attacks; Intrusion tolerance; Secure routing;
Citations & Related Records
Times Cited By KSCI : 5  (Citation Analysis)
연도 인용수 순위
1 Jong-Kyun Jeong and In-Ho Ra. Asynchronous and adaptive massage passing scheme for wireless sensor networks. Journal of Korean Institute of Intelligent Systems 23(3), pp. 196-201. 2013.   DOI
2 Hyun-Tae Kim and In-Ho Ra. A fault-tolerant QoS routing scheme based on interference awareness for wireless sensor networks. Journal of Korean Institute of Intelligent Systems 22(2), pp. 148-153. 2012.   DOI
3 Hyuk Park and Tae Ho Cho. Partial path selection method in each subregion for routing path optimization in SEF based sensor networks. Journal of Korean Institute of Intelligent Systems 22(1), pp. 108-113. 2012.   DOI
4 Tae Hyoung Kim, Geuntaek Kang and Won Chang Lee. Clustering algorithm for efficient use of energy in wireless sensor network. Journal of Korean Institute of Intelligent Systems 20(1), pp. 36-41. 2010.   DOI
5 X. Du and H. Chen, "Security in wireless sensor networks," Wireless Communications, IEEE, vol. 15, pp. 60-66, 2008 .
6 J. Deng, R. Han and S. Mishra, "INSENS: Intrusion-tolerant routing for wireless sensor networks," Comput. Commun., vol. 29, pp. 216-230, 2006.   DOI
7 E. Shi and A. Perrig, "Designing secure sensor networks," Wireless Communications, IEEE, vol. 11, pp. 38-43, 2004 .
8 S. Zhu, S. Setia and S. Jajodia, "LEAP : Efficient security mechanisms for large-scale distributed sensor networks," ACM Transactions on Sensor Networks (TOSN), vol. 2, pp. 500-528, 2006.   DOI
9 Su-Man Nam and Tae-Ho Cho. Dynamic states consideration for next hop nodes selection method to improve energy efficiency in LEAP based wireless sensor networks. Journal of Korean Institute of Intelligent Systems 23(6), pp. 558-564. 2013.   DOI
10 (Accessed: Jan. 11, 2016). MICAz: wireless measurement system. Available: http://trl.iba.edu.pk/Memsic-set-2.pdf.
11 E. C. Ngai, J. Liu and M. R. Lyu, "An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks," Comput. Commun., vol. 30, pp. 2353-2364, 2007 .   DOI
12 N. Gandhewar and R. Patel, "Detection and prevention of sinkhole attack on AODV protocol in mobile adhoc network," in Computational Intelligence and Communication Networks (CICN), 2012 Fourth International Conference on, 2012, pp. 714-718.
13 I. Krontiris, T. Giannetsos and T. Dimitriou, "Launching a sinkhole attack in wireless sensor networks; the intruder side," in Networking and Communications, 2008. WIMOB'08. IEEE International Conference on Wireless and Mobile Computing, 2008, pp. 526-531.
14 Kyu-Hyun Song and Tae-Ho Cho. Improvement robust bidirectional verification scheme for detecting routing attacks in enhanced INSENS based seneor netowrks. 2015, .
15 F. Ye, H. Luo, S. Lu and L. Zhang, "Statistical en-route filtering of injected false data in sensor networks," Selected Areas in Communications, IEEE Journal on, vol. 23, pp. 839-850, 2005 .   DOI
16 K. Akkaya and M. Younis, "A survey on routing protocols for wireless sensor networks," Ad Hoc Networks, vol. 3, pp. 325-349, 2005.   DOI
17 I. F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci, "A survey on sensor networks," Communications Magazine, IEEE, vol. 40, pp. 102-114, 2002 .