Open Access Open Access  Restricted Access Subscription or Fee Access

An Efficient Identification of Malicious Packet Dropping In Wireless Sensor Networks

A.S. Hemavarthinee, T.R. Vedhavathy, M. Bakyalakshmi

Abstract


In the wireless sensor networks, sensor nodes monitor the environment detect the event of interest , produce data and it involves in forwarding the data towards a sink, which could be a gateway ,base station , storage node or querying user. In such hostile environment it lacks physical protection and it is subjected to various attacks. Dropping packets and modifying packets are most common attacks that can be launched by an attacker to disturb the communication in wireless sensor networks. In this paper, we proposed a node categorization algorithm to indentify the nodes which are suspicious droppers/modifiers. Node categorization algorithm performs better, when compared to PNM scheme (Probabilistic Nested Marking Scheme).In our proposed scheme, a routing tree rooted at the sink is first established. Each packet is encrypted and padded so as to hide the source of the packet. The packet mark is small number of extra bits is added in each packet, such that the sink can recover the source of the packet and then find out dropping ratio associated with every sensor node. The routing tree dynamically changes in each round so that the behaviour of sensor node can be observed in different scenarios. So we are implementing this scheme which is effective in identifying both packet droppers and modifiers. It is being compatible with existing false packet filtering schemes that is, it can be deployed together with the false packet filtering schemes. In addition to identifying intruder filters, it also detects the filter modified packets immediately after the modification.


Keywords


Packet Dropping, Packet Modification, Wireless Sensor Networks.

Full Text:

PDF

References


V. Bhuse, A. Gupta, and L. Lilien, “DPDSN: Detection of

Packet-Dropping Attacks for wireless Sensor Networks,” Proc. FourthTrusted Internet Workshop, 2005.

H. Chan and A. Perrig, “Security and Privacy in Sensor Networks,”Computer, vol. 36, no. 10, pp. 103-105, Oct. 2003.

S. Marti, T. Giuli, K. Lai, and M. Baker, “Mitigating Routing

Misbehavior in Mobile Ad Hoc Networks,” Proc. ACM MobiCom,2000.

I.Khalil and S. Bagchi, “MISPAR: Mitigating Stealthy Packet Droppingin Locally-Monitored Multi-Hop Wireless Ad Hoc Networks,” Proc.Fourth Int’l Conf. Security and Privacy in Comm.Networks(SecureComm ’08), 2008.

X. Zhang, A. Jain, and A. Perrig, “Packet-Dropping AdversaryIdentification for Data Plane Security,” Proc. ACM CONEXTConf.(CoNEXT ’08), 2008.

C. Karlof and D. Wagner, “Secure Routing in Wireless Sensor Networks:Attacks and Countermeasures,” Proc. IEEE First Int’lWorkshop SensorNetwork Protocols and Applications, 2003.

J.M. Mccune, E. Shi, A. Perrig, and M.K. Reiter, “Detection ofDenial-of-Message Attacks on Sensor Network Broadcasts,” Proc. IEEESymp. Security and Policy, 2005.

B. Yu and B. Xiao, “Detecting Selective Forwarding Attacks in Wireless Sensor Networks,” Proc. 20th Int’l Symp. Parallel and Distributed Processing (IPDPS), 2006.

M. Just, E. Kranakis, and T. Wan, “Resisting Malicious Packet Dropping in Wireless Ad Hoc Networks,” Proc. Int’l Conf. Ad-Hoc Networks and Wireless (ADHOCNOW ’03), 2003.

T.H. Hai and E.N. Huh, “Detecting Selective Forwarding Attacksi n Wireless Sensor Networks Using Two-Hop Neighbor Knowledge, ”Proc. IEEE Seventh Int’l Symp. Network Computing and Applications (NCA ’08), 2008.

R. Roman, J. Zhou, and J. Lopez, “Applying Intrusion Detection Systems to Wireless Sensor Networks,” Proc. IEEE Third Consumer Comm. Networking Conf. (CCNC), 2006.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.