Journal of Emerging Technologies in Web Intelligence, Vol 5, No 1 (2013), 18-27, Feb 2013
doi:10.4304/jetwi.5.1.18-27

A Defense Strategy against Energy Exhausting Attacks in Wireless Sensor Networks

Djallel Eddine Boubiche, Azeddine Bilami

Abstract


One of the most challenging issues in wireless sensor networks is resilience against malicious attacks. Since energy is the most precious resource for these networks, Denial of sleep attacks is recognized as one of the most serious threats. Such attacks exhaust power supply of sensor nodes and can reduce the sensor lifetime from years to days. Authentication and encryption solutions have been proposed to protect the network from denial of sleep attacks. Though, the resources constraint motivates the use of simpler solutions to the same security challenges. In this paper, we survey different types of denial of sleep attacks and we propose a cross layer energy efficient security mechanism to protect the network from these attacks. The cross layer interaction between network Mac and physical layers is mainly exploited to identify the intruders’ nodes and prevent sensor nodes from energy exhaust attacks. Simulation results indicate that our proposal is energy efficient and can significantly reduce the effect of denial of sleep attacks.


Keywords


Wireless sensor networks; Cross layer security; denial of sleep attacks

References


 

[1] F. Stajano, R. Anderson, "The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks," In ICISC, Springer-Verlag, 2000.
 
[2] Ye. Wei, J. Heidemann, and D. Estrin, "An Energy- Efficient MAC Protocol for Wireless Sensor Networks," IEEE INFOCOM, New York, Vol. 2, pp. 1567-1576, June 2002.
 
[3] M. Pirretti, S. Zhu, N. Vijaykrishnan, P. Mcdaniel, and M. Kandemir, "The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense," International Journal of Distributed Sensor Networks, 2: 267–287, 2006.
http://dx.doi.org/10.1080/15501320600642718
 
[4] L. Xiaoming, M. Spear, K. Levitt, N.S. Matloff, and S.F. Wu, "A Synchronization Attack and Defense in Energy-Efficient Listen-Sleep Slotted MAC Protocols," SECURWARE '08. Second International Conference on Emerging Security Information, Systems and Technologies, pp. 403-411, 2008.
 
[5] M. Brownfield, Y. Gupta, and N. Davis, "Wireless sensor network denial of sleep attack," In Proc. 6th Annu. IEEE SMC Inf. Assurance Workshop, pp. 356–364. 2005.
http://dx.doi.org/10.1109/IAW.2005.1495974
 
[6] Y.l. Law, "Link-layer Jamming Attacks on SMAC," Technical Paper, Univ. of Twente, NL, 2005.
 
 
[7] M. Stahlberg, "Radio Jamming attacks against two popular mobile networks," In Helsinki University of Tech. Seminar on Network Security, 2000.
 
 
[8] 3Com IEEE802.11b Wireless LANs Technical Paper.13p., referred 10.10.2000.
 
 
[9] C.C. Li, H.Q. Pei, and L. P. Ning, Qingquan, "An Effective Scheme for Defending Denial-of-Sleep Attack in Wireless Sensor Networks," Fifth International Conference on Information Assurance and Security. pp. 446-449. 2009.
 
[10] D.R. Raymond, R.C. Marchany, M.I. Brownfield, and S.F. Midkiff,, "Effects of Denial-of-Sleep Attacks on Wireless Sensor Network MAC Protocols," IEEE transactions on vehicular technology, VOL. 58, No. 1, pp. 367-380, January 2009.
 
 
[11] F. Rainer, and H. Hans-Joachim, "Fighting Insomnia: A Secure Wake-Up Scheme for Wireless Sensor Networks," Third International Conference on Emerging Security Information, Systems and Technologies, pp.191-196, 2009.
 
[12] J. Zhao, and K.E. Nygard, "A Two-Phase Security Algorithm for Hierarchical Sensor Networks," FUTURE COMPUTING 2011: The Third International Conference on Future Computational Technologies and Applications, pp. 144-120. 2011.
 
[13] A. Gabrielli, L.V. Mancini, S. Setia, and S. Jajodia, "Securing Topology Maintenance Protocols for Sensor Networks: Attacks and Countermeasures," IEEE Transactions on Dependable and Secure Computing, pp. 450 – 465, 2011.
http://dx.doi.org/10.1109/TDSC.2009.46
 
[14] V. Bhuse, and A. Gupta, "Anomaly intrusion detection in wireless sensor networks," Journal of High Speed Networks, vol. 15, no. 1, pp. 33–51, 2006.
 
[15] D. Boubiche, and A. Bilami, "HEEP (Hybrid Energy Efficiency Protocol) Based on Chain Clustering," Int. J. Sensor Networks, Volume 10 Issue 1/2, pp. 25 - 35, 2011.
http://dx.doi.org/10.1504/IJSNET.2011.040901
 
[16] W.R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, "An Application-Specific Protocol Architecture for Wireless Micro sensor Networks," IEEE Transactions on the wireless communications, Vol. 1, No 4, pp. 660-670, 2002.
http://dx.doi.org/10.1109/TWC.2002.804190
 
[17] Nils Hoeller, Christoph Reinke, Jana Neumann, Sven Groppe. Dynamic Approximative Caching Scheme for Energy Conservation in Wireless. Sensor Networks. Journal of Networking Technology, 2 (1); p. 10-21.(2011).
 
[18] Chang Su, Lili Zheng, Xiaohai Si, Fengjun Shang. Low Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks. Journal of Digital Information Management, 10 (2): pp. 114-120. (2012).
 
[19] Zouhair El-Bazzal, Khaldoun El-Ahmadieh, Ali Chamas Al Ghouwaye. Performance Enhancement of AODV Routing Protocol in Mobile Ad hoc Networks, Journal of Information Technology Review, 3 (2), pp. 47-57. (2012).
 
[20] Mande Xie, Guoping Zhang. The Design and Challenges of Online Reprogramming System for Wireless Sensor Networks. Journal of Digital Information Management, 9 (6): pp. 255-260 (2011).
 
[21] Mohammadreza Balouchestani, Kaamran Raahemifar, Sridhar Krishnan. Robust Wireless Sensor Networks with Compressed Sensing Theory. Journal of Networking Technology, 3 (2): PP. 109-119. (2012).


Full Text: PDF


Journal of Emerging Technologies in Web Intelligence (JETWI, ISSN 1798-0461)

Copyright @ 2006-2014 by ACADEMY PUBLISHER – All rights reserved.