ArticlePDF Available

Attacks classification and security mechanisms in Wireless Sensor Networks

Authors:
  • Ministry of Education and Higher Education - Qatar
  • Imam Abdulrahman Bin Faisal University

Abstract and Figures

This paper proposes a new classification model distinguishing four classes of attacks in Wireless Sensor Networks (WSNs) namely: attacks based on the protocol stack, on the capability of the attacker, on the attack impacts and on the attack target. Then, it presents and classifies the most known attacks in WSNs based the proposed model. Simulations implemented under the NS3 simulator prove that the network lifetime can decrease by more than 45% in the presence of attacks. Afterwards, it discusses the main security methods and protocols of management and distribution of encryption keys used to ward off different types of attacks. Obtained results confirm that these security methods must be adapted to the specific characteristics of WSNs to achieve the intended objectives.
Content may be subject to copyright.
www.astesj.com 229
Attacks classification and security mechanisms in Wireless Sensor Networks
Amine Kardi1,*, Rachid Zagrouba2
1Faculty of Mathematical, Physical and Natural Sciences of Tunis, University of Tunis El Manar, 2092 El Manar, Tunisia
2College of Computer Science and Information Technology, Imam Abdulrahman Bin Faisal University, P.O. Box 1982, Dammam
31441, Saudi Arabia
A R T I C L E I N F O
A B S T R A C T
Article history:
Received: 12 September, 2019
Accepted: 16 November, 2019
Online: 05 December, 2019
This paper proposes a new classification model distinguishing four classes of attacks in
Wireless Sensor Networks (WSNs) namely: attacks based on the protocol stack, on the
capability of the attacker, on the attack impacts and on the attack target. Then, it presents
and classifies the most known attacks in WSNs based the proposed model. Simulations
implemented under the NS3 simulator prove that the network lifetime can decrease by more
than 45% in the presence of attacks. Afterwards, it discusses the main security methods and
protocols of management and distribution of encryption keys used to ward off different types
of attacks. Obtained results confirm that these security methods must be adapted to the
specific characteristics of WSNs to achieve the intended objectives.
Keywords:
Wireless Sensor Networks
Routing attacks
Cryptography
Security
NS3 simulator
1. Introduction
With the widespread use of WSNs[
1
][
2
], composed of a small
and low-powered communicating devices usually deployed in
hostile environments, and due to their resources constraints,
security factors become crucial and challenging with the
appearance of a variety of attacks targeting these networks
[
3
][
4
][
5
]. The main contribution of this paper is to provide a survey
of these attacks and of the security techniques which will facilitate
the design of WSNs for researchers and routing protocol
programmers.
The rest of the paper is organized as follows: Security
requirements for WSNs are discussed in Section 2. Section 3
introduces our proposed taxonomy and discusses each category of
attacks. Section 4 presents the main attacks in WSNs and analyzes
them using NS3 simulator. The basic security mechanisms in
WSNs are presented in Section 5 then followed by the analysis and
findings in section 6. Lastly; we conclude the paper and highlight
our future work in section 7.
2. Security requirements for WSNs
Due to the lack of a wired communication medium, the limited
resources of sensors and the properties of the deployment [
6
][
7
],
WSNs, deployed mostly in hostile environments with mission-
critical tasks, have several security challenges which are more
complex than with other types of networks. As an ad hoc network,
security requirements for WSNs include the standard security
metrics known as CIAA (Confidentiality, Integrity, Authentication
and Availability) in addition to the security requirements specific
to this type of network which aim to protect the information and
resources from attacks and misbehavior. In the following we
discuss the security properties and requirements we would like to
achieve in order to establish a reliable communication in WSNs
and to provide secure services [
8
].
2.1. Standard security requirements
As with other types of networks, standard security
requirements are needed in WSNs such as:
Confidentiality: This is the most important issue in network
security which guards data from eavesdroppers. It ensures that
a given message remains hidden and cannot be used by
anyone other than the desired receiver. It protects packets
from undertaking traffic analysis, passive attackers and
modification. The standard approach for achieving this
requires use of encryption techniques [
9
].
Integrity: Data integrity is needed to ensure the reliability of
data parquets. In fact, sent packets must be protected from
modification (adding, altering, deleting, damaging or losing)
by malicious intermediate nodes or by wireless channel
disturbance during the transmission [
10
].
ASTESJ
ISSN: 2415-6698
*Amine Kardi, Tunis, (+216.96.27.90.33),Email : amine.kardi@fst.utm.tn
Advances in Science, Technology and Engineering Systems Journal Vol. 4, No. 6, 229-243 (2019)
www.astesj.com
Special Issue on Multidisciplinary Sciences and Engineering
K. Amine et al. / Advances in Science, Technology and Engineering Systems Journal Vol. 4, No. 6, 229-243 (2019)
www.astesj.com 230
Authentication: all applications require data authentication
which ensures the reliability of the message by giving the
ability of each communication host to identify its origin and
to verify the other’s identity to counter to packet injection or
spoofing and to all malicious routing information. Critical
characteristics of sensor nodes and the wireless nature of the
communication medium in WSNs make extremely
challenging to ensure authentication in these networks [
11
].
Availability: Availability affects several sides in the sensor
network. In fact, it determines whether a node can use the
resources if needed, whether data and services are available
for on-demand use and whether the network is always
available to ensure communication even in the presence of
malicious attacks. A loss of availability may have serious
impacts and threat the entire network, e.g. it may open a
backdoor for malicious invasion in some cases and sensed
information may become useless or of lower value, but also
providing availability can hurt the network lifetime especially
with limited energy resources [
12
].
2.2. Specific security requirements
Node characteristics and deployment environments make
WSNs vulnerable to special attacks and subsequently several
security requirements specific to this type of networks are needed
such as:
Authorization: ensures that only authorized nodes can
manipulate data (provide, update...) in the network and
prevents unauthorized access to resources [
13
].
Nonrepudiation: it prevents a node from denying sending a
message it has previously sent through the network [
14
].
Data freshness: implies that used data are recent and valuable
and cannot be replayed by a malicious actor, under any
circumstances, after abandonment to prevent, i.e. overloading
the network by sending previously captured packets.
Timestamps and time-related counters can be used to ensure
data freshness [
15
].
Transparency: after leaving the network a sensor node
should not be able to replay old packets or to read any future
messages in the same way as a joining node should not be able
to reload or to read any previously transmitted message in
order to protect the network from malicious injected nodes
[
16
].
Self-Organization: In the absence of an overall network
management infrastructure, sensor nodes which have the
ability of self- organization may encounter several hazards
and risks threatening the safety and operation of the entire
network [
17
].
Time Synchronization: due to its limited energy resources,
sensor nodes may be turned off for periods of time in the form
of a smart sleep in order to conserve energy and, in some
application, the end-to-end delay of some packets is of a great
extent that is why collaborative sensor nodes require a
synchronization system which must be ensured by a secure
synchronization protocol to deal with attacks that attempt to
affect proper synchronization between nodes [
18
].
Secure Localization: In several applications, sensor networks
are designed to locate faults. Consequently, the network must
be able to accurately and automatically locate each sensor
node that is why location information must be handled in a
secure manner to avoid attacks taking advantage of the
security weaknesses of this information [
19
].
Anonymity: malicious actors do not have to decrypt the
source node of a packet in order to secure nodes and the
sensing area which can be affected by erroneous data [
20
].
Survivability: Network services and functionalities must be
maintained even with the low levels required in the case of
failures, attacks and compromised or destroyed nodes [
21
].
According to these security requirements, it's obvious that
attacks in WSNs can be of different types and can affect the entire
network system such as nodes, packets, data, paths, routing etc.
The following section presents our proposed taxonomy.
3. Taxonomy of attacks in WSNs
Because of its specific characteristics, WSNs are vulnerable to
various types of attacks. These attacks are of different mechanisms,
techniques and goals which makes necessary to find and adopt a
well-defined taxonomy in order to facilitate design and
development of WSNs for researchers and protocol programmers.
According to the security requirements mentioned above, and
taking into account the mechanisms and parameters of attacks; we
propose a new taxonomy which divides attacks in WSNs into four
major classes namely: attacks based on the protocol stack, based
on the capability of the attacker, based on the attack impacts
and based on the attack target as shown in figure 1.
A detail overview of each security attack class is discussed in
the rest of this section.
3.1. Attacks based on protocol stack
The protocol stack used by nodes in a wireless sensor network
consists of the Physical Layer, Data Link Layer, Network Layer,
Transport Layer, Application Layer, power management plane,
mobility management plane and task management plane as shown
in figure 2. It ensures the energy efficiency in the network,
manages the use of the wireless medium with the routing task and
facilitates synchronization and cooperative efforts between sensor
nodes.
Each level on the protocol stack takes on a set of tasks and
guarantees a set of services. Therefore, it will be targeted by
several attacks.
Physical Layer:
This layer ensures the data transmission services which encompass
the selection of access channels, radiofrequency regulation and
deflection, signal processing and data encryption to increase the
communications reliability. The importance of this layer exposes
it to a variety of attacks targeting data privacy, resource depletion,
signal and communications interruption, and so on [
22
].
Data Link Layer:
This layer is responsible of physical addressing, error detection
and/or correction, data streams multiplexing, medium access and
K. Amine et al. / Advances in Science, Technology and Engineering Systems Journal Vol. 4, No. 6, 229-243 (2019)
www.astesj.com 231
Figure 1: Security attacks in WSNs: A taxonomy
flow control as well as ensuring reliable point-to-point and point-
to-multipoint connections in the network. The medium access
control (MAC) protocol must support mobility and be able to
handle collisions and to achieve energy efficiency in the network.
The importance of this layer makes it vulnerable to several types
of attacks sources of collisions, resource exhaustion, and network
destruction [
23
].
Network Layer:
This layer is in charge of routing the data supplied by its upper
layer. It is very important task encompasses packets routing and
forwarding, addresses assignment and energy management. These
axial and fundamental tasks attract several attacks aimed at
absorbing the network traffic, disrupting communication,
exhausting resources, intercepting paths and injecting malicious
packets [
24
].
Transport Layer:
The transport layer ensures the management of end-to-end
reliable delivery of packets connections and the establishment of
end-to-end connection in addition to flow and congestion control.
It is especially needed when the system is planned to communicate
with external networks. Several attacks target this layer in order to
reduce the network's availability, to degrade or even prevent data
exchange and to waste energy [
25
].
Application Layer:
This layer contains user applications which oversee the sensing
tasks. It manipulates user data with a set of application protocols,
and it is a target of attacks aiming at affecting the synchronization
of communications and data confidentiality.
The power management plane and the mobility management
plane are responsible, respectively, for the management of energy
resources and the mobility of nodes in order to achieve maximum
energy efficiency and stability of communications. The task
management plane manages the sensing tasks and ensures
synchronization between sensor nodes [
26
].
Figure 2: The protocol stack of sensor networks
3.2. Attacks based on the capability of the attacker
Based on the capability of the attacker, attacks in WSNs can be
subdivided into two classes: Location capability and Attacking
Taxonomy
of attacks in
WSNs
Based On
the
Protocol
Stack
Physical
Layer
Data Link
Layer
Network
Layer
Transport
Layer
Application
Layer
Based on
the
capability
of the
attacker
Location
capability
Outsider
attacks
Insider
attacks
Attacking
devices's
capability
Mote-class
attacks
Laptop-
class
attacks
Based on
the attack
impacts
Interruption
Interception
Modification
Fabrication
Reloading
Packets
Resources
depletion
Based on
the attack
target
User
Hardware
Software
Information
Physical Layer
Data Link Layer
Network Layer
Transport Layer
Application
Layer
Power management plane
Mobility management plane
Task management plane
K. Amine et al. / Advances in Science, Technology and Engineering Systems Journal Vol. 4, No. 6, 229-243 (2019)
www.astesj.com 232
device’s capability. Each of these classes is further divided into
two broad subclasses according to the relative capabilities of the
attacker which are respectively: Outsider/ Insider attacks and
Mote-class/ Laptop-class attacks. In the following we detail each
of these subclasses.
Outsider/ insider attacks
Based on the location capability of attackers, attacks in WSNs
can be classified into Insider and Outsider attacks. We are talking
about insider attacks when a legitimate nodes belonging to the
network and which are actually part of it are compromised and
participates in unintended and/or unauthorized ways in the attack
contrary to outsider attacks which are launched only from outside
the networks application environment and performed by external
nodes which do not belong to the WSN. Insider attacks are more
severe when compared with outside attacks since compromised
nodes contains secret information and may not be detected due to
the possesses privileged access rights they had. These attacks
target the entire network and affect the resources, data,
communications and even the existence of the network. Some
papers refer to internal and external attacks [
27
].
Mote-class/ laptop-class attacks
Based on the Attacking device’s capability, attacks in WSNs
can be classified into Mote-class and laptop-class attacks. In mote-
class attacks, attackers use malicious nodes with similar techniques
capabilities and hardware proprieties to the network nodes in order
to execute malicious codes aiming to affect the network
functionalities (data, routing, paths, energy management...).
Contrariwise, attackers use more powerful devices with great
transmission range, processing power, and energy supply than the
network's sensor nodes in laptop-class attacks e.g., a laptop which
results in launching more serious attacks and consequently lead to
more serious damage to the target network [
28
].
3.3. Attacks based on the attack impacts
Based on the attack impacts, attacks in WSNs can be
subdivided into six classes: Interruption, Interception,
Modification, Fabrication, Reloading Packets and Resources
depletion. In the following we detail each of these four classes.
Interruption
The attacker aims, through some techniques, to interrupt the
network’s functionalities. These attacks are varied and can target
nodes, sinks, paths, routing task, resources depletion etc. which
threaten services availability. Even in the presence of an attack, the
network must be capable of maintaining its functionalities without
interruption [
29
].
Interception
These attacks are used when the attacker intended to eavesdrop
on the network information. This threatens message confidentiality,
network services availability and may result in the depletion of
resources [
30
].
Modification
These attacks threaten data integrity. Attackers intend to
eavesdrop to information and to tamper with it in various ways:
Injection, removal, modification etc. in order to disrupt the
network functionalities and threaten the accuracy of services and
treatments [
31
].
Fabrication
These attacks are manifested by the injection of erroneous data
into the WSN. Attacker aims to threaten message authenticity and
network availability through the depletion of the energy resources
of the network especially with wireless communications which are
very energy intensive [
32
].
Reloading Packets
In some cases, the attacker seeks to reload and read previously
transmitted packets from a compromised node or from buffers of
active nodes which threatens data confidentiality and packets
transparency. These packets can be injected back into the network,
which threatens messages freshness and wastes energy [
33
].
Resources depletion
In a WSN, resources depletion leads to the complete collapse
of the network. Attackers aim to waste limited energy resources of
nodes using various processing and transmission tasks [
34
].
3.4. Attacks based on the attack target
Attacks in a WSN can target different actors and components
of the network which are users, hardware, software and
information [
35
]. In the following we detail each of these targets.
User
Various users of a WSN like humans, robots etc. can be
targeted by malicious attacks aiming to have an authorized access
to the network system through legitimate compromised identifiers.
These attacks seek to take control of the network, to use it for
personal tasks, to use information or to destroy it.
Hardware
Attacks targeting hardware in WSNs tend to compromise
nodes for malicious intent, waste limited energy resources or
destroy equipment. A compromised node may contain secret
information and may be used for unauthorized access to the
network.
Software
Attacks targeting software in WSNs aim to eavesdrop
information, control the network and disrupt the services and
functionalities.
Information
Attacks targeting information in WSNs are various e.g. the
attacker can falsify the data supposed to be sensed in the sensing
area, in other cases, sensed data can be targeted by attacks, packets
in transit, authentication parameters etc. Attackers aim at affecting
the network functionalities, services availability and data
confidentiality.
Each of these classes helps to analyze and study attacks in
WSNs from different perspectives. We detail, in the following
section, the most known attacks and countermeasures to counter
their effects.
4. Attacks in WSNs
Generally, attacks under these four classes, can be either active
or passive. A passive attack is an attack that aims to gets exchanged
K. Amine et al. / Advances in Science, Technology and Engineering Systems Journal Vol. 4, No. 6, 229-243 (2019)
www.astesj.com 233
data in the network without interrupting the communication to
remains hidden and not be discovered. Passive attackers listen and
collect data that can be used later to start other types of attacks.
While active attacks involve some modifications in the data stream.
In fact, it seeks to modify, fabricate, inject a false stream or
intercept the data or the communication to disrupt the normal
functionality of the network. In the active mode the attacker is
more aggressive and aims to damage the entire network [
36
].
4.1. The most known attacks:
Among the most known attacks in WSNs we find:
Jamming:
Jamming attack [
37
] takes advantages of the sensitivity of the
wireless medium to interferences and results in a denial of service
in the network. Attacker identifies the radio frequencies used by
the targeted WSN and tries to disrupt or block communications by
emitting signals (unnecessary information) in the same frequencies
that inhibit communication (messages transmission and/or
reception) between nodes. This interference may be temporary,
intermittent or permanent and can affect all or part of the network
depending on the radio range of the jamming source which can
have the same characteristics as the network nodes as it can be
more powerful. Jamming can be of different types: it can be
constant if it targets and corrupts data packets in transit, deceptive
when sending a constant data stream in the network, random when
injected data streams are dispersed over time and reactive if the
jamming source sends a jam signal following the detection of
traffic. Jamming can target different layers: It can interfere with
radio frequency signals at the physical layer, as it can take
advantages of the medium access control protocol causing
malicious collisions at the link layer as it can target the network
layer by injecting malicious packets. Defense techniques
[
38
][
39
][
40
] against Jamming attack involve spread-spectrum
techniques for radio communication such as frequency hopping to
switch between many frequency channels, authentication
mechanisms to detect malicious and replayed packets, the use of
secure medium access control protocols etc.
Tampering or destruction [
41
]:
WSNs are highly vulnerable to physical attacks as they are
often deployed in unprotected areas. A Tampering attack will be
triggered after physically capturing the node and aims to retrieve
cryptographic material as encryption keys and the program code
stored within a node which can be used later to trigger other types
of attacks such as modifying routing information, creating
duplicate data packets, tampering routing services etc. or to
manipulate the captured node by installing a new code causing an
abnormal behavior of the compromised sensor, controlled by the
attacker, in order to disrupt the network. Destruction attack
consists of removing the sensor from the network by destroying it
resulting in isolated areas and even the destruction of the entire
network. Defense techniques against this attack are based on the
principle of considering the situation in which sensor nodes are
compromised such as tamper-proofing the physical package of
nodes.
Continuous Channel Access (Exhaustion):
Exhaustion [
42
] belongs to DoS attacks. It aims to exhaust the
batteries of the nodes in order to reduce the network lifetime. It
consists to disrupt the Media Access Control protocol, by
continuously injecting unnecessary packets in the network and
requesting or transmitting data over the channel entail the waste of
node energy in unnecessary retransmissions. A possible solution
to this attack is the Rate Limiting at the MAC admission control
which allows ignoring corrupted packets and excessive malicious
requests [
43
] [
44
].
Collision:
Collision attack [
45
], similar to the continuous channel attack,
can be caused by malicious nodes by transmitting packets in the
network in order to block / delay the communication between
nodes which results, in addition to the throughput, in a waste of
energy and a loss of data. It is difficult to detect Collision attack in
WSNs because it is a short time attack using malicious packets
which are similar to legitimate packets. Researches, such as [
46
],
proposed several Collision detection techniques such as error-
correcting codes.
Unfairness:
Unfairness attack [
47
] is a partial or a weak form of DOS
attack that can result in marginal performance degradation. Based
on other attacks such as collision and exhaustion, collision attack
decreases significantly the utility and efficiency of services. In fact,
attackers request continuously to access to the channel which
results in undermining communication and limiting channel
capacity. One of the countermeasures to such an attack is time-
division multiplexing [
48
] allowing each node to transmit only in
a specific time slot.
Interrogation [
49
]:
To soften the problem of frame collisions introduced by the
hidden node problem, several MAC protocols use the RTS/CTS
handshake [
50
]. Attackers take advantages of this synchronization
mechanism by repeatedly sending RTS packets leading to CTS
responses from neighboring nodes. To counter this type of attack,
nodes can use several mechanisms such as anti-replay protection
and link layer authentication [
51
].
Sybil Attack [
52
]:
As shown in figure 3 Sybil Attacks allow malicious nodes to
have multiple identities by using the identities of the nodes targeted
by the attack in order to participate in distributed algorithms such
as election to take advantage of legitimate nodes to endorse the
creation of several routes passing through the malicious node. This
attack is located between the link and the network layers and it
aims to degrade the integrity of data, the security level of and the
use of resources. Among these attacks we can found Data
Aggregation attacks aiming to falsify the aggregated message and
Voting attacks affecting routing path and node selection. Several
researches, such as [
53
] [
54
], sought to counter this attack using
different mechanism such as public key cryptography and digital
signatures.
Sinkhole:
Sinkhole attack [
55
] belongs to DoS attacks in WSNs. As
shown in figure 4, the attacker (malicious node) must appear to
other nodes as being very attractive by presenting optimal routes
in order to attract packets as much as possible to control most of
K. Amine et al. / Advances in Science, Technology and Engineering Systems Journal Vol. 4, No. 6, 229-243 (2019)
www.astesj.com 234
the data circulating in the network. Consequently, malicious node
acts as a base station by attracting data packets and preventing
them from continuing their path creating a kind of well or black
hole in the network. The attacker, having a strategic routing
location in the network, manipulates packets as desired, causing
the suspension of the network routing service and the depletion of
critical resources of nodes. Geo-routing protocols, using localized
information and routing traffic through the physical location of
nodes, are resistant to sinkhole attacks.
Figure 3: Sybil Attack
Figure 4: Sinkhole attack
Hello Flood [
56
]:
The presence of laptop-class attackers and the limited
transmission range of sensors led to the appearance of the Hello
flood attacks. This attack takes advantages of the powerful signal
of the attacking device to broadcast the information of an optimal
route to all the nodes which will update their local tables. When a
targeted node wants to communicate, it will not be able to use this
route because the attacker, which is the imaginary neighbor, is out
of range which results in the waste of energy from the sensors
which leads to a malfunction of the network. Security mechanisms
such as cryptography and source authentication, used to verify the
bidirectionality of a path before taking action received over it, are
used to counter this type of attacks.
Node Capture:
In most applications, sensor nodes are highly vulnerable to
physical attacks as they are often deployed in open areas easily
accessible to attackers which raise the possibility of node capture
to be used in tampering attacks. Researches such as [
57
] show that
even a single node capture led to take over the entire network by
attackers which makes the resilience against node capture attacks
one of the most challenging issues in WSNs [
58
].
Selective Forwarding:
Routing protocols assume that nodes will faithfully relay the
packets that pass through them. We talk about Selective
Forwarding attack when attacker may create malicious nodes and
can violate this rule by removing all or some of these incoming
packets randomly (neglectful node) or by giving high priority to its
own messages (greedy node). Multipath routing, braided paths and
random selection of paths to destination are a possible defense
against this type of attack [
59
] [
60
].
Black Hole Attack:
This attack can be considered as a form of selective forwarding
attack dropping all incoming packets, it consists of inserting a new
node or compromising a network node which falsifies the routing
information to broadcast itself as the shortest path to oblige a
maximum of neighbors to modify their routing tables in order to
force the data to pass through it. This information will be destroyed
which makes the malicious node as a well or black hole in the
network. When attacker is placed on a strategic routing location in
the network such as sinks or base stations the attack cause a
network partition, packets loss, resource exhaustion and even the
suspension of the routing services of the entire network. Black hole
attack often targets hierarchical architectures and more specifically
aggregator nodes. Multiple paths routing presents a defense against
black hole attack [
61
] [
62
].
Wormhole Attacks [
63
]:
Also known as tunneling, it is one of the most severe attacks.
As shown in Figure 5, it requires at least two malicious nodes
linked by a powerful radio link or by a wire link. In a wormhole
attack, information received by a malicious node in one side of the
network are encapsulated and relayed to be reintroduced by
another malicious node on the other side of the network, revealing
that the message originates from a close node. Encapsulation can
be done in two ways: "Multi-hop encapsulation" aiming to hide
intermediate nodes located between the two attackers to make the
paths through the malicious node appear shorter which facilitates
the creation of sinkholes with protocols using the number of hops
as main metric of paths selection and "direct communication" in
which paths going through the attackers are faster because they are
composed of a single hop and can be used against protocols using
the first discovered path and those based on paths latency. This
type of attacks can considerably disrupt a location system by
introducing erroneous reference points. It can be further divided
into three classes: Half Open Wormhole, Closed Wormhole, and
Open Wormhole. Several mechanisms for detecting and defending
against wormhole attacks are presented such as WRHT [
64
].
Figure 5: Wormhole attack
K. Amine et al. / Advances in Science, Technology and Engineering Systems Journal Vol. 4, No. 6, 229-243 (2019)
www.astesj.com 235
Spoofed, Altered, or Replayed Routing Information [
65
]:
routing information in transit are targeted by several attacks,
they can be spoofed, altered, or replayed. Malicious nodes can
attract or repel the network traffic, inject false and misleading
packets, overflow routing tables and create routing loops which
result in disrupting the network traffic, partitioning the
communication system and even destruction on the entire network.
Several researches, such as [
66
], aim to counter these attacks using
counters, timestamps, encryption and various authentication
techniques.
Misdirection [
67
]:
This active attack consists in misdirecting the data packets. In
fact, instead of sending the packets in a correct direction, malicious
nodes redirect them in a wrong direction through which the right
destination is unreachable. Targeted node, flooded without any
useful information, suffers from a waste of resources. Some
security mechanisms [
68
] such as smart sleep [
69
] avoids this
attack.
Homing [
70
]:
This attack aims to locate critical nodes in the network
providing essential services such as cluster heads and key
managers by monitoring and analyzing the network traffic and
nodes activities in order to eavesdrop their activities, take control
of the network and extract sensitive data. To prevent homing
attacks, protocols designers use different types of cryptographic
schemes, algorithms and hide management messages [
71
] [
72
].
Flooding [
73
]:
This attack aims to provoke a denial of service in order to
decreases network lifetime. Indeed, one or several malicious nodes
propagate many connection requests and carry out a regular
massive sending to a strong emission power until exhausting the
resources required the connection or reaching a maximum limit in
order to saturate the network and prevent legitimate nodes from
establishing communications which exhaust the resources
(memory and energy) and reduce availability. One proposed
solution to this attack is to demonstrate the commitment to this
connection or to put a limit on the number of connections from a
particular node [
74
] [
75
].
De-synchronization Attacks [
76
]:
It is a part of the resource depletion attacks. The attacker causes
missed frames by distorting, changing or increasing the sequence
number of exchanged packets between end points. By receiving
the modified packets, the destination deduces that the packets have
been lost and requests the forwarding of these packets to the
senders which disrupts the synchronization of communications
and led to a considerable waste of energy of legitimate sensors by
attempting to recover from errors which never really existed.
Packets authentication is one of the main solutions to counter this
attack [
77
] [
78
].
Overwhelm attack [
79
]:
It is a part of QoS attacks. It consumes network bandwidth
causing resource depletion by forwarding large amounts of data
packets due to an exaggerated stimulation of sensors. A good
adjustment of sensors and stimulation parameters, rate-limiting
and efficient data-aggregation algorithms help to counter this
attack [
80
].
Path-based DOS attack [
81
]:
In this attack malicious nodes inject spurious or replayed
packets in the network which waste energy resources and
bandwidth on the path to the base station. Hence, legitimate nodes
are prevented from sending packets to the base station.
Authentication techniques and anti-replay protection counter this
attack [
82
].
Deluge (reprogram) attack [
83
]:
This attack uses one or more compromised nodes that the attacker
reprograms them and then reinsert them on the network as
malicious nodes working in his service. Deluge attack aims to
disrupt the network and the application by causing an abnormal
behavior of nodes. Indeed, these nodes run malicious codes in
order to steal secret or sensitive information, attempt to disrupt the
normal operation of the entire system and take control of large
portions of a network. Several researches such as [
84
], introduce
various techniques to counter this type of attacks.
Table 1 classifies the previously detailed routing attacks on
WSNs according to our taxonomy proposed in the previous section.
4.2. Simulation results
4.2.1. Network model
To show the effect of these attacks on WSNs, we used the NS3
simulator to simulate the effect of Jamming and Hello Flood
attacks on a WSN using LEACH protocol [
85
].
As indicated in Table2, the adopted network model consists of 100
nodes randomly deployed in 100m * 100m area with unlimited
power sink centered in the field as shown in Figure 6.
Figure 7: Nodes distribution
4.2.2. Results and discussion
In this section, the following metrics are used to evaluate the
effect of Jamming and Hello Flood attacks:
- Network lifetime (Alive nodes Versus Rounds + Dead nodes
Versus Rounds)
- Stability /instability periods
- Remaining energy Versus Rounds
We start with the evaluation of the network lifetime.
K. Amine et al. / Advances in Science, Technology and Engineering Systems Journal Vol. 4, No. 6, 229-243 (2019)
www.astesj.com 236
Table 2: Network parameters
Parameters
Values
Network size
100m * 100m
Number of nodes
100
Sink location
50,50
Packet size
4000 bits
Initial energy
0.5 J
Energy Dissipation (Efs)
10 pJ/bit/m²
Energy for transmission (ETx)
50 nJ
Energy for reception (ERx)
50 nJ
Data Aggregation
5 nJ/bit/report
Number of rounds
2000
Network lifetime
The network lifetime is one of the main metrics to be
considered to evaluate the efficiency of the network. It is the period
between the beginning of the network and the death of last node.
The two complementary Figures 8.a) and 8.b) respectively show
the evolution of the number of alive and dead nodes in the network
using LEACH protocol with and without the presence of attacks.
As shown in Figure 8, the network lifetime using LEACH
protocol without undergoing attacks is about 1560 rounds, while it
does not exceed 1080 rounds in the presence of Hello Flood attack
and 820 rounds with Jamming attack. Using a powerful signal,
Hello flood attack broadcast the information of an optimal
imaginary route according to which the sensors update their local
Types
Attacks
Based On
Protocol Stack
Based on the
capability of
the attacker
Based on the
attack impact
Based on
the attack
target
Pas
sive
/acti
ve
P
L
D
L
L
N
L
T
L
A
L
LC
DC
I
R
P
I
T
C
M
F
R
P
R
D
U
H
S
I
P
A
O
I
M
L
Jamming
*
*
*
*
*
*
*
*
*
*
*
Tampering or
destruction
*
*
*
*
*
*
*
*
*
Continuous
Channel Access
(Exhaustion)
*
*
*
*
*
*
*
*
Collision
*
*
*
*
*
*
*
*
*
*
Unfairness
*
*
*
*
*
*
*
*
*
*
Interrogation
*
*
*
*
*
*
*
*
Sybil Attack
*
*
*
*
*
*
*
*
*
*
*
*
Sinkhole
*
*
*
*
*
*
*
*
*
*
*
*
*
Hello Flood
*
*
*
*
*
*
*
*
*
*
Node Capture
*
*
*
*
*
*
*
*
*
*
*
*
*
*
Selective
Forwarding
*
*
*
*
*
*
*
*
*
*
*
Black Hole Attack
*
*
*
*
*
*
*
*
*
*
*
Wormhole Attacks
*
*
*
*
*
*
*
*
*
*
Spoofed, Altered,
or Replayed
Routing
Information
*
*
*
*
*
*
*
*
*
*
*
*
*
*
Misdirection
*
*
*
*
*
*
*
*
*
*
Homing
*
*
*
*
*
*
Flooding
*
*
*
*
*
*
*
*
*
De-
synchronization
Attacks
*
*
*
*
*
*
*
*
*
*
Overwhelm attack
*
*
*
*
*
*
*
*
Path-based DOS
attack
*
*
*
*
*
*
*
*
*
*
*
Deluge
(reprogram) attack
*
*
*
*
*
*
*
*
*
*
*
*
*
PL: Physical Layer
DLL: Data Link Layer
NL: Network Layer
TL: Transport Layer
AL: Application Layer
LC: Location
Capability
O: Outsider
I: Insider
DC: Device Capability
M: Mote Class
L: Laptop Class
IRP: Interruption
ITC: Interception
M: Modification
F: Fabrication
RP: Reloading Packets
RD: Resources
Depletion
U: Users
H: Hardware
S: Software
I: Information
P: Passive
A: Active
Table1: Comparison table of routing attacks in WSNs
K. Amine et al. / Advances in Science, Technology and Engineering Systems Journal Vol. 4, No. 6, 229-243 (2019)
www.astesj.com 237
tables. This technique led to a waste of energy and to a malfunction
of the network. As explained earlier in this survey, deceptive
Jamming attack, used in this simulation, consist in sending a
constant data stream in the network which leads to overloading the
antennas of the sensors and therefore to a great loss of energy and
the disappearance of the network in a short time.
Figure 8-a: Alive nodes VS. rounds
Figure 8-b: Dead nodes VS. rounds
Figure 8: Network lifetime
Stability / instability period
A stability period triggers with the beginning of the network
until the death of the first node which declares the beginning of an
instability period. This instability period extends until the death of
all nodes in the network. Figure 9 shows the stability and instability
periods of the network using LEACH protocol with and without
the presence of attacks.
As shown in Figure 9, the stability period almost reached
790rounds without attacks, but it does not exceed 320 rounds in
the presence of Hello flood attack and 255 rounds with Jamming
attack. In the same way, the instability period is about 773 rounds
in the absence of attacks but does not surpass 760 rounds with
Hello flood attack and 565 rounds in the presence of Jamming
attack. This is obviously explained by the effect of the attacks on
the consumption of energy.
Figure 9: Stability and instability periods
Figure 10: Residual Energy VS. Time
Remaining energy
The residual energy, shown in Figure 10, results from the
evolution of the number of nodes in the network. The curves show
0
10
20
30
40
50
60
70
80
90
100
0500 1000 1500 2000
Alive nodes
Rounds
LEACH without attacks
LEACH with Hello flood attack
LEACH with Jamming attack
0
10
20
30
40
50
60
70
80
90
100
0500 1000 1500 2000
Dead nodes
Rounds
LEACH without attacks
LEACH with Hello flood attack
LEACH with Jamming attack
0
100
200
300
400
500
600
700
800
900
Stability instability
LEACH
LEACH with Hello flood attack
LEACH with Jamming attack
0
5
10
15
20
25
30
35
40
45
50
0500 1000 1500 2000
Residual Energy
Rounds
LEACH without attacks
LEACH with Jamming attack
LEACH with Hello flood attack
K. Amine et al. / Advances in Science, Technology and Engineering Systems Journal Vol. 4, No. 6, 229-243 (2019)
www.astesj.com 238
the acute effect of the attacks on the residual energy of the network
where half of the energy is consumed before reaching 500 rounds
in the presence of attacks. The evolution of energy in this way
leads to the formation of several isolated areas and subsequently
affects the efficiency of the network.
In the following section, we present the main security
mechanisms used to counter these attacks.
5. Basic security mechanisms in WSNs
In the absence of strong security architecture, WSNs are targets
of several attacks that we presented previously in this paper. Most
of these attacks take advantage of cryptographic system failures to
derive the initial data (clear) or to find the used keys. We are
talking here about cryptanalysis. In this section, we talk about
cryptography and the cryptographic systems used to secure the
WSNs [
86
] [
87
].
Indeed, the cryptanalysis targets the encryption keys which are
based on cryptographic systems. These systems, that can be either
symmetric, asymmetric or hybrid, take care of the management
and distribution of the encryption keys [
88
] [
89
]. In the following,
we detail each of these classes.
5.1. Symmetric Cryptography in WSNs
Symmetric cryptography, shown in Figure 11, is the oldest
form of encryption where the same key is used between two
communicating nodes to encrypt and decrypt the data using a
symmetric encryption algorithm. In modern security techniques,
even symmetric encryption algorithms can be public. The major
disadvantage of this solution is that the pre-loaded key in the nodes
could lead to compromise the entire network through
compromised nodes. One of the proposed solutions to overcome
this limit is to establish symmetric encryption schemes based on
pair-wise keys rather than a single global key [
90
] [
91
].
Figure 11: Symmetric cryptography
5.2. Asymmetric Cryptography in WSNs
Contrary to symmetric cryptography, asymmetric
cryptography, also known as public-key cryptography, too heavy
used in WSNs, uses a pair of keys instead of one (public and
private). Asymmetric keys are generated in pairs. The message
encrypted by the public key will be decrypted by the private key.
Indeed, the public key of a node B, published between two
communicating nodes is used by the node A to encrypt a message
that will be decrypted by the node B through its secret private key
as shown in Figure 12 and vice versa. This encryption mechanism
allows not only the encryption of information but also the
guarantee the authentication of the nodes by using the signatures
and digital certificates. Slowness and resources consumption are
the major drawbacks of this encryption mechanism [
92
].
Figure 12: Asymmetric cryptography
5.3. Hybrid Cryptography in WSNs
Hybrid cryptography is a cryptographic system that combines
and benefits from the two cryptographic systems: asymmetric and
symmetric. Generally, asymmetric encryption, greedy in time and
resources, is used only to exchange a secret key in order to use
symmetric encryption afterwards.
5.4. Elliptic curve cryptography in WSNs
Elliptic Curve Cryptography (ECC) is becoming increasingly
popular as a security solution for WSNs. This technique is an
approach of public-key cryptography, it is based on elliptic curve
theory to create faster, smaller and more efficient encryption keys
with quite less key size and very low computational overhead. In
fact, the ECC generates keys through the properties of the elliptic
curve equation and the discrete logarithm of an elliptic curve must
be calculated for the decryption process which is much more
difficult than factoring.
5.5. Comparison of symmetric and asymmetric cryptographic
systems
Encryption algorithms can be evaluated in different parameters.
Table 3, provided by National Institute of Standards and
Technology NIST compares the encryption key size for RSA, ECC
(asymmetric) and AES (symmetric) shows the development of key
size compared to the security of an 80-bit symmetric key [
93
].
Table 3: Comparison of key length (bits) of the well-known symmetric and
asymmetric techniques [NIST]
Symmetric (AES)
RSA
ECC
80
1024
160
112
2048( x 2 )
224( x 1.4)
128
3072( x 3 )
256 ( x 1.6 )
192
7680( x 7.5 )
384( x 2.4 )
256
15360( x 15 )
521( x 3.2 )
Researchers agree that symmetric methods are faster and
require small keys e.g. a key size of 3072 bits with RSA, which is
equivalent to 256 bits with ECC, offers the same level of security
as a key of only 128 bits with AES. However, for a network of N
nodes, N-1 symmetric keys must be stored in each node, which
exceeds the memory capacity of sensors in networks that can
contain thousands of nodes as well as the key distribution problem.
Figure 13, developed from experiments done using MATLAB
R2015a [92] compares the energy consumed by RSA-1024 and
ECC-160 for signatures generation and verification, and the energy
cost of key exchanges excluding authentication and certificate
verification. It shows that RSA is characterized by a very
expensive signature operation and a small verification cost
contrary to ECDSA signatures which are significantly cheaper
than RSA. In the same way, key exchanging costs are significantly
cheaper with ECDSA than with RSA.
K. Amine et al. / Advances in Science, Technology and Engineering Systems Journal Vol. 4, No. 6, 229-243 (2019)
www.astesj.com 239
As a result, the ECC has emerged as it offers keys that can be
much smaller than those required by the RSA algorithm, and at the
same time of size close to symmetrical solutions. These
characteristics make this technique more suitable for WSNs and
IoT applications but not optimal in its general form [
94
] [
95
].
Figure 13: Energy cost of digital signature and key exchange using RSA-1024
and ECDSA-160
Figure 14: Methods of management and distribution of encryption keys in WSNs
5.6. Management of encryption keys in WSNs
Key management in WSNs is one of the most difficult aspects
when configuring a security cryptographic system whether in a
symmetric, asymmetric or hybrid-based method. This task
includes the generation, distribution, verification and storage of
encryption keys so that each node will be equipped with a set of
secret keys or private/public pair of keys according to the adopted
system in a secure, private and safe manner.
Several management classifications and key distribution have
been proposed in the literature based on various technical and
functional criteria [
96
]. We propose in this work a new
classification based on the three previously proposed encryption
methods (symmetric, asymmetric and hybrid) as shown in Figure
14. In the following we detail each of these key distribution
methods.
5.7. Management of encryption key in symmetric patterns
The establishment of a common key between nodes in a WSNs
to securely communicate in a symmetric cryptographic-based
model is as follows: Before the nodes are deployed, the memory
of each node is initially equipped with several keys in a Key Pre-
distribution phase then it is the routing protocol that deals with the
common key management between the nodes after the deployment
in a key discovery process which makes it possible to constitute
secure paths between nodes. The pre-distribution of these keys can
be random or through an intermediary trust element of the network.
5.7.1. Random keys
The random pre-distribution of keys can be guaranteed by
probabilistic, deterministic or hybrid methods. In the following we
detail each of these methods
5.7.1.1. Deterministic methods
Deterministic methods require a large storage capacity because
several encryption keys deterministically generated are stored in
the memory of each node. They allow each node to establish a
unique key known as “pair-wise key” with any other node of the
network to establish a secure communication. Among the
proposed mechanisms we quote the deterministic method
proposed by Liu et al. [
97
] which is based on virtual spaces (logical
grids) containing the identifiers of the nodes. Thus, many groups
of sensor nodes are formed based on the positions of the nodes.
The pre-distribution of two encryption keys is thus necessary: “in-
group pre-distribution” making it possible to establish a unique
shared key (pair-wise key) between two nodes of the same group
and “cross-group pre-distribution” to establish a unique shared key
between two different groups.
5.7.1.2. Probabilistic methods
In probabilistic methods, each node in the network is equipped
with several encryption keys randomly chosen by the network
administrator before being deployed. Common keys are thus
installed in the memories of the nodes with a certain probability.
In [
98
], Jones et al. propose a secure probabilistic architecture
based on a probabilistic key distribution method. Indeed, each
sensor is loaded with a set of “m” encryption keys, randomly
selected from a set of “k” keys with a probability of matching "p"
between nodes. After deployment, the BS splits the network into
independent sectors and secret keys are distributed by the BS to
ensure secure communication.
0
20
40
60
80
100
120
140
160
180
200
220
240
260
280
300
320
Signature
generation
Signature
Verification
Client Key
Exchange
Server Key
Exchange
Energy (mJ)
RSA-1024 ECDSA-160
Methods of
management
and
distribution
of
encryption
keys in
WSNs
Symmetric
Trust Center
(Trusted key)
Random keys
Deterministic
Probabilistic
Hybrid
Asymmetric
Pubic Key
Infrastructure
(PKI)
Node identity
Hybrid
K. Amine et al. / Advances in Science, Technology and Engineering Systems Journal Vol. 4, No. 6, 229-243 (2019)
www.astesj.com 240
5.7.1.3. Hybrid methods
Hybrid pre-distribution methods combined and benefits from
the two previous methods, depending on the application to increase
connectivity between nodes while ensuring secure communication.
5.7.2. Trust Center
In this key pre-distribution model, a Trust Center e.g. the BS is
used either to store a copy of pre-loaded keys or to derive
encryption keys from a trusted key pre-loaded into the nodes. In a
Zigbee topology managed by the protocol stack known as ZigBee
[
99
] based on the IEEE 802.15.4 standard, the nodes can play three
roles: coordinator, routers, and sensors. The coordinator, placed in
a particular position in the network, plays the role of a Trust Center
(TC) and distributes keys that can be Link Key (LK), Network Key
(NK) or Master Key (MK) shared by one node respectively with
another node, with the entire network and for the establishment of
the key LK.
5.8. Management of encryption key in asymmetric patterns
Another way to establish a common key between two nodes or
a group of nodes in a WSN to secure communications is to use
schemes based on asymmetric systems as already explained. In the
following we detail the most know methods.
5.8.1. Public Key Infrastructure
Public Key Infrastructure (PKI) based specifically on
cryptography, are a set of protocols and services aiming to secure
communication in a network through various techniques such as
authentication, digital certificates, digital signatures etc. The Micro
Public Key Infrastructure (micro-PKI) method proposed by
Munivel et al. [
100
] for WSNs is based on two keys: a public key
loaded in each node before the deployment used to identify with
the BS and a private key used by the BS to decrypt the data sent by
the nodes. The PKI in this method ensures identification between
the nodes as well as with the BS.
5.8.2. Node identity
These methods seek to provide the same cryptographic services
as a PKI based solely on the node identity information in the
creation and establishment of cryptographic keys shared between
each pair of nodes in the network. These methods are known in
cryptography as the Identity-Based Non-Interactive Key
Distribution Scheme (ID-NIKDS) [
101
]. Among these methods
we quote the method proposed by Oliveira et al. [
102
] where each
node of the network has a unique identifier and a private key. A
unique secret key shared with another node of the network is
derived by knowing only its identifier.
References
[1] YADAV, Devendra, SINGAM, Jayanthu, DAS, Santos, et al. A Critical
Review on Slope Monitoring Systems with a Vision of Unifying WSN and
IoT. IET Wireless Sensor Systems, 2019.
[2] PRABHU, Boselin, BALAKUMAR, N., et ANTONY, A. Johnson. Wireless
Sensor Network Based Smart Environment Applications. 2017.
[3] SHAHZAD, Furrakh, PASHA, Maruf, et AHMAD, Arslan. A Survey of
Active Attacks on Wireless Sensor Networks and their
Countermeasures. arXiv preprint arXiv:1702.07136, 2017.
5.9. Management of encryption key in hybrid patterns
Hybrid cryptography is a system that combines the symmetric
and asymmetric cryptography. It benefits from their advantages to
ensure a high level of security in particular situations as mentioned
previously in this work. The Transport Layer Security (TLS) [
103
]
combines the two cryptographic systems. Indeed, as asymmetric
cryptographic operations are very expensive, it is only used in the
key distribution then a symmetric algorithm is used for the bulk
encryption of the data.
In the following section, we summarize and discuss the results
obtained in this survey.
6. Analysis and Findings
The specific characteristics of WSNs, usually deployed in
hostile environments make these networks targeted by various
types of attacks which can target all components of the network
such as nodes, routes, packets etc. Simulation results show that the
network lifetime can decrease by more than 45% as in the presence
of Jamming attack. These conditions lead us to discuss the existing
security techniques which, despite their proven effectiveness with
other types of networks, cannot be directly adapted to the limited
resources of sensors and a new security mechanism taking
advantage of existing solutions must be proposed.
7. Conclusion and future work
As an involving field, WSNs usually used in unattended
environments and characterized by limited resources become
vulnerable to several types of attacks targeting all network
components such as nodes, packets and routing protocols etc. In
this paper, we aim to facilitate the design and implementation of
reliable and secure routing protocols for researchers. So, we
summarize the security requirements for WSNs then we propose a
new taxonomy distinguishing four possible categories of attacks
namely: attacks based on the protocol stack, based on the
capability of the attacker, based on the attack impacts and based on
the attack target. Then, we classify and analyze the most known
attacks based on the proposed model and using the NS3 simulator.
Thereafter, we present and discuss the basic security methods and
protocols of management and distribution of encryption keys in
WSNs.
Security Mechanisms in WSNs, used to counter these attacks
in order to keep the network running smoothly will be the objective
of our future work aiming to propose a new security method which
will be adapted to the specific properties of WSNs and able to
counter the majority of these attacks.
[4] SENGAR, P. et BHARDWAJ, N. A Survey on Security and Various Attacks
in Wireless Sensor Network. International Journal of Computer Sciences and
Engineering, 2017, vol. 5, no 4, p. 78-84.
[5] MITTAL, Vikas, GUPTA, Sunil, et CHOUDHURY, Tanupriya. Comparative
Analysis of Authentication and Access Control Protocols Against Malicious
Attacks in Wireless Sensor Networks. In : Smart Computing and Informatics.
Springer, Singapore, 2018. p. 255-262.
[6] BANA, Suman et BAGHLA, Silki. Wireless sensor network. International
Journal of Engineering Science, 2016, vol. 1706.
[7] Kardi, A., Zagrouba, R., & Alqhtani, M. (2018, May). Hierarchical Routing
Techniques in Wireless Sensor Networks. In International Symposium on
K. Amine et al. / Advances in Science, Technology and Engineering Systems Journal Vol. 4, No. 6, 229-243 (2019)
www.astesj.com 241
Web and Wireless Geographical Information Systems (pp. 77-84). Springer,
Cham.
[8] TOMIĆ, Ivana et MCCANN, Julie A. A Survey of Potential Security Issues
in Existing Wireless Sensor Network Protocols. IEEE Internet of Things
Journal, 2017, vol. 4, no 6, p. 1910-1923.
[9] CUI, Jie, SHAO, Lili, ZHONG, Hong, et al. Data aggregation with end-to-
end confidentiality and integrity for large-scale wireless sensor
networks. Peer-to-Peer Networking and Applications, 2017, p. 1-16.
[10] ORACEVIC, Alma, DILEK, Selma, et OZDEMIR, Suat. Security in internet
of things: A survey. In : Networks, Computers and Communications (ISNCC),
2017 International Symposium on. IEEE, 2017. p. 1-6.
[11] DAS, Ashok Kumar. A secure and effective biometric‐based user
authentication scheme for wireless sensor networks using smart card and
fuzzy extractor. International Journal of Communication Systems, 2017, vol.
30, no 1.
[12] MENDEZ, Diego M., PAPAPANAGIOTOU, Ioannis, et YANG, Baijian.
Internet of things: Survey on security and privacy. arXiv preprint
arXiv:1707.01879, 2017.
[13] PRITCHARD, Sean W., HANCKE, Gerhard P., et ABU-MAHFOUZ, Adnan
M. Security in Software-Defined Wireless Sensor Networks: Threats,
Challenges and Potential Solutions. In : IEEE Int. Conf. of Ind. Informat.,
Emden, Germany. 2017.
[14] SHAHZAD, Furrakh, PASHA, Maruf, et AHMAD, Arslan. A Survey of
Active Attacks on Wireless Sensor Networks and their
Countermeasures. arXiv preprint arXiv:1702.07136, 2017.
[15] ZHU, Liehuang, ZHANG, Zijian, et XU, Chang. Secure data aggregation in
wireless sensor networks. In : Secure and Privacy-Preserving Data
Communication in Internet of Things. Springer, Singapore, 2017. p. 3-31.
[16] MATHEW, Prabha Susy, PILLAI, Anitha S., et PALADE, Vasile.
Applications of IoT in Healthcare. In : Cognitive Computing for Big Data
Systems Over IoT. Springer, Cham, 2018. p. 263-288.
[17] TOMIĆ, Ivana et MCCANN, Julie A. A Survey of Potential Security Issues
in Existing Wireless Sensor Network Protocols. IEEE Internet of Things
Journal, 2017, vol. 4, no 6, p. 1910-1923.
[18] ZHANG, Anran et BAI, Fengshan. An energy efficient and dynamic time
synchronization protocol for wireless sensor networks. In : Seventh
International Conference on Electronics and Information Engineering.
International Society for Optics and Photonics, 2017. p. 103221X.
[19] LI, Peng, YU, Xiaotian, XU, He, et al. Research on secure localization model
based on trust valuation in wireless sensor networks. Security and
Communication Networks, 2017, vol. 2017.
[20] LI, Xiong, NIU, Jianwei, KUMARI, Saru, et al. A three-factor anonymous
authentication scheme for wireless sensor networks in internet of things
environments. Journal of Network and Computer Applications, 2018, vol. 103,
p. 194-204.
[21] ALIBERTI, Giulio, DI PIETRO, Roberto, et GUARINO, Stefano. Epidemic
data survivability in Unattended Wireless Sensor Networks: New models and
results. Journal of Network and Computer Applications, 2017, vol. 99, p. 146-
165.
[22] ZHANG, Junqing, DUONG, Trung Q., WOODS, Roger, et al.Securing
Wireless Communications of the Internet of Things from the Physical Layer,
An Overview. Entropy, 2017, vol. 19, no 8, p. 420.
[23] DENER, Murat et BAY, Omer Faruk. Practical Implementation of an
Adaptive Detection-Defense Unit against Link Layer DoS Attacks for
Wireless Sensor Networks. Security and Communication Networks, 2017, vol.
2017.
[24] SAINI, Rakesh Kumar, RITIKA, Ritika, et VIJAY, Sandip. Data Flow in
Wireless Sensor Network Protocol Stack by using Bellman-Ford Routing
Algorithm. Bulletin of Electrical Engineering and Informatics, 2017, vol. 6,
no 1, p. 81-87.
[25] KİRAZ, Ayhan et ÇAKIROĞLU, Murat. ALORT: a transport layer protocol
using adaptive loss recovery method for WSN. Sādhanā, 2017, vol. 42, no 7,
p. 1091-1102.
[26] LI, Xiaomin, LI, Di, WAN, Jiafu, et al. A review of industrial wireless
networks in the context of industry 4.0. Wireless networks, 2017, vol. 23, no
1, p. 23-41.
[27] CHOI, Jaewoo, BANG, Jihyun, KIM, LeeHyung, et al. Location-based key
management strong against insider threats in wireless sensor networks. IEEE
Systems Journal, 2017, vol. 11, no 2, p. 494-502.
[28] TYAGI, Akshat, KUSHWAH, Juhi, et BHALLA, Monica. Threats to security
of Wireless Sensor Networks. In : Cloud Computing, Data Science &
Engineering-Confluence, 2017 7th International Conference on. IEEE, 2017.
p. 402-405.
[29] GRGIC, Kresimir, MENDELSKI, Vedran, et ZAGAR, Drago. Security
framework for visual sensors and smart camera networks.
In : Telecommunications (ConTEL), 2017 14th International Conference on.
IEEE, 2017. p. 131-138.
[30] JAITLY, Sunakshi, MALHOTRA, Harshit, et BHUSHAN, Bharat. Security
vulnerabilities and countermeasures against jamming attacks in Wireless
Sensor Networks: A survey. In : Computer, Communications and Electronics
(Comptelix), 2017 International Conference on. IEEE, 2017. p. 559-564.
[31] SHAHZAD, Furrakh, PASHA, Maruf, et AHMAD, Arslan. A Survey of
Active Attacks on Wireless Sensor Networks and their
Countermeasures. arXiv preprint arXiv:1702.07136, 2017.
[32] BHUSHAN, Bharat et SAHOO, Gadadhar. Recent Advances in Attacks,
Technical Challenges, Vulnerabilities and Their Countermeasures in Wireless
Sensor Networks. Wireless Personal Communications, 2017, p. 1-41.
[33] SENNIAPPAN, Vijayalakshmi et SUBRAMANIAN, Jayashree. Threshold-
based Energy Efficient Clustering Protocol for Corrosion Risk Monitoring of
Reinforced Concrete. International Journal of Computer Applications, 2017,
vol. 157, no 6.
[34] RAMACHANDRAN, Shyamala et SHANMUGAM, Valli. Impact of DoS
Attack in Software Defined Network for Virtual Network. Wireless Personal
Communications, 2017, vol. 94, no 4, p. 2189-2202.
[35] DESNITSKY, Vasily et KOTENKO, Igor. Modeling and Analysis of IoT
Energy Resource Exhaustion Attacks. In : International Symposium on
Intelligent and Distributed Computing. Springer, Cham, 2017. p. 263-270.
[36] SHAHZAD, Furrakh, PASHA, Maruf, et AHMAD, Arslan. A Survey of
Active Attacks on Wireless Sensor Networks and their
Countermeasures. arXiv preprint arXiv:1702.07136, 2017.
[37] VADLAMANI, Satish, EKSIOGLU, Burak, MEDAL, Hugh, et al. Jamming
attacks on wireless networks: A taxonomic survey. International Journal of
Production Economics, 2016, vol. 172, p. 76-94.
[38] SHABANA, Kalsoom, FIDA, Nigar, KHAN, Fazlullah, et al. Security issues
and attacks in Wireless Sensor Networks. International Journal of Advanced
Research in Computer Science and Electronics Engineering (IJARCSEE),
2016, vol. 5, no 7, p. pp: 81-87.
[39] ZHU, Jia, ZOU, Yulong, et ZHENG, Baoyu. Physical-Layer Security and
Reliability Challenges for Industrial Wireless Sensor Networks. IEEE Access,
2017..
[40] BHAVATHANKAR, Prasenjit, SARKAR, Subhadeep, et MISRA, Sudip.
Optimal decision rule-based ex-ante frequency hopping for jamming
avoidance in wireless sensor networks. Computer Networks, 2017.
[41] DINKER, Aarti Gautam et SHARMA, Vidushi. Attacks and challenges in
wireless sensor networks. In : Computing for Sustainable Global
Development (INDIACom), 2016 3rd International Conference on. IEEE,
2016. p. 3069-3074.
[42] DINKER, Aarti Gautam et SHARMA, Vidushi. Attacks and challenges in
wireless sensor networks. In : Computing for Sustainable Global
Development (INDIACom), 2016 3rd International Conference on. IEEE,
2016. p. 3069-3074.
[43] DENER, Murat et BAY, Omer Faruk. Practical Implementation of an
Adaptive Detection-Defense Unit against Link Layer DoS Attacks for
Wireless Sensor Networks. Security and Communication Networks, 2017, vol.
2017.
[44] MISHRA, Alekha Kumar. Security Threats in Wireless Sensor Networks.
Handbook of Research on Advanced Wireless Sensor Network Applications,
Protocols, and Architectures, 2016, p. 307.
[45] JAN, Mian Ahmad et KHAN, Muhammad. Denial of Service Attacks and
Their Countermeasures in WSN. IRACSTInternational Journal of Computer
Networks and Wireless Communications (IJCNWC), 2013, vol. 3.
[46] REN, Ju, ZHANG, Yaoxue, ZHANG, Kuan, et al. Adaptive and channel-
aware detection of selective forwarding attacks in wireless sensor networks.
IEEE Transactions on Wireless Communications, 2016, vol. 15, no 5, p. 3718-
3731.
[47] MOHAMMADI, Shahriar et JADIDOLESLAMY, Hossein. A comparison of
link layer attacks on wireless sensor networks. arXiv preprint
arXiv:1103.5589, 2011.
[48] NEWAZ, SH Shah, CUEVAS, Ángel, LEE, Gyu Myoung, et al. Improving
energy saving in time-division multiplexing passive optical networks. IEEE
Internet Computing, 2013, vol. 17, no 1, p. 23-31.
[49] SINGLA, Aashima et SACHDEVA, Ratika. Review on security issues and
attacks in wireless sensor networks. International Journal of Advanced
Research in Computer Science and Software Engineering, 2013, vol. 3, no 4.
[50] KAUR, Ramandeep et SHARMA, Reecha. An Analysis of RTS/CTS
Mechanism for Data Transfer In Wireless Network: A Review. 2016.
[51] GHEORGHE, Laura, RUGHINIS, Razvan, DEACONESCU, Razvan, et al.
Authentication and anti-replay security protocol for wireless sensor networks.
In : Systems and Networks Communications (ICSNC), 2010 Fifth
International Conference on. IEEE, 2010. p. 7-13.
[52] LI, Xun, HAN, Guangjie, QIAN, Aihua, et al. Detecting Sybil attack based
on state information in Underwater Wireless Sensor Networks. In : Software,
Telecommunications and Computer Networks (SoftCOM), 2013 21st
International Conference on. IEEE, 2013. p. 1-5.
K. Amine et al. / Advances in Science, Technology and Engineering Systems Journal Vol. 4, No. 6, 229-243 (2019)
www.astesj.com 242
[53] JAN, Mian Ahmad, NANDA, Priyadarsi, HE, Xiangjian, et al. A Sybil Attack
Detection Scheme for a Centralized Clustering-based Hierarchical Network.
In : Trustcom/BigDataSE/ISPA, 2015 IEEE. IEEE, 2015. p. 318-325.
[54] JAN, Mian Ahmad, NANDA, Priyadarsi, HE, Xiangjian, et al. A sybil attack
detection scheme for a forest wildfire monitoring application. Future
Generation Computer Systems, 2016.
[55] SHAFIEI, Hosein, KHONSARI, Ahmad, DERAKHSHI, H., et al. Detection
and mitigation of sinkhole attacks in wireless sensor networks. Journal of
Computer and System Sciences, 2014, vol. 80, no 3, p. 644-653.
[56] SINGH, Virendra Pal, UKEY, Aishwarya S. Anand, et JAIN, Sweta. Signal
strength based hello flood attack detection and prevention in wireless sensor
networks. International Journal of Computer Applications, 2013, vol. 62, no
15.
[57] LIN, Chi et WU, Guowei. Enhancing the attacking efficiency of the node
capture attack in WSN: a matrix approach. The Journal of Supercomputing,
2013, vol. 66, no 2, p. 989-1007.
[58] TAHIR, Ruhma et MCDONALD-MAIER, Klaus. Improving resilience
against node capture attacks in wireless sensor networks using icmetrics. In :
Emerging Security Technologies (EST), 2012 Third International Conference
on. IEEE, 2012. p. 127-130.
[59] REN, Ju, ZHANG, Yaoxue, ZHANG, Kuan, et al. Adaptive and channel-
aware detection of selective forwarding attacks in wireless sensor networks.
IEEE Transactions on Wireless Communications, 2016, vol. 15, no 5, p. 3718-
3731.
[60] SHAHZAD, Furrakh, PASHA, Maruf, et AHMAD, Arslan. A Survey of
Active Attacks on Wireless Sensor Networks and their Countermeasures.
arXiv preprint arXiv:1702.07136, 2017.
[61] BASKAR, Radhika, RAJA, PC Kishore, JOSEPH, Christeena, et al. Sinkhole
Attack in Wireless Sensor Networks-Performance Analysis and Detection
Methods. Indian Journal of Science and Technology, 2017, vol. 10, no 12.
[62] ALJUMAH, Abdullah et AHANGER, Tariq Ahamed. Futuristic Method to
Detect and Prevent Blackhole Attack in Wireless Sensor Networks.
International Journal of Computer Science and Network Security (IJCSNS),
2017, vol. 17, no 2, p. 194.
[63] SHAHZAD, Furrakh, PASHA, Maruf, et AHMAD, Arslan. A Survey of
Active Attacks on Wireless Sensor Networks and their Countermeasures.
arXiv preprint arXiv:1702.07136, 2017.
[64] SINGH, Rupinder, SINGH, Jatinder, et SINGH, Ravinder. WRHT: A Hybrid
Technique for Detection of Wormhole Attack in Wireless Sensor Networks.
Mobile Information Systems, 2016, vol. 2016.
[65] MULLA, Ms Raisa I. et PATIL, Rahul. Review of Attacks on Wireless Sensor
Network and their Classification and Security. Imperial Journal of
Interdisciplinary Research, 2016, vol. 2, no 7.
[66] DINKER, Aarti Gautam et SHARMA, Vidushi. Attacks and challenges in
wireless sensor networks. In : Computing for Sustainable Global
Development (INDIACom), 2016 3rd International Conference on. IEEE,
2016. p. 3069-3074.
[67] YOUNIS ABDULLAH, Maan, HUA, Gui Wei, et ALSHARABI, Naif.
Wireless sensor networks misdirection attacker challenges and solutions. In :
Information and Automation, 2008. ICIA 2008. International Conference on.
IEEE, 2008. p. 369-373.
[68] SAINI, Meenu, KUMAR, Rajan, et al. To Propose a Novel Technique for
Detection and Isolation of Misdirection Attack in Wireless Sensor Network.
Indian Journal of Science and Technology, 2016, vol. 9, no 28.
[69] ABDALZAHER, Mohamed S., SEDDIK, Karim, ELSABROUTY, Maha, et
al. Game Theory Meets Wireless Sensor Networks Security Requirements
and Threats Mitigation: A Survey. Sensors, 2016, vol. 16, no 7, p. 1003.
[70] KURBAH, Rangstone Paul et SHARMA, Bobby. Survey On Issues In
Wireless Sensor Networks: Attacks and Countermeasures. International
Journal of Computer Science and Information Security, 2016, vol. 14, no 4, p.
262.
[71] AGRAWAL, Dharma Prakash. Authentication, Encryption, and Secured
Communication. In : Embedded Sensor Systems. Springer Singapore, 2017.
p. 393-413.
[72] SARANYA, K., SATHYA, D., et KUMAR, P. Ganesh. A Survey On
Intrusion Detection System In Wireless Sensor Networks. International
Journal of Advance Research, Ideas and Innovations in Technology. 2017, vol.
3, no 1, p. 692-703
[73] MANOHAR, Ram Pradheep et BABURAJ, E. Detection of Stealthy Denial
of Service (S-DoS) Attacks in Wireless Sensor Networks. International
Journal of Computer Science and Information Security, 2016, vol. 14, no 3, p.
343.
[74] ACHARJYA, D. P. et AHMED, N. Syed Siraj. Recognizing Attacks in
Wireless Sensor Network in View of Internet of Things. In : Internet of Things:
Novel Advances and Envisioned Applications. Springer International
Publishing, 2017. p. 149-172.
[75] MANSOURI, Djamel, MOKDAD, Lynda, BEN‐OTHMAN, Jalel, et al.
Dynamic and adaptive detection method for flooding in wireless sensor
networks. International Journal of Communication Systems, 2017.
[76] SHAHID, Jahanzeb, SALEEM, Shahzad, et QURESHI, Muhammad Nauman.
DOS Attacks on WSN and Their Classifications With Countermeasures-A
Survey. NUST Journal of Engineering Sciences, 2016, vol. 9, no 2.
[77] CAPOSSELE, Angelo T., CERVO, Valerio, PETRIOLI, Chiara, et al.
Counteracting Denial-of-Sleep Attacks in Wake-up-radio-based Sensing
Systems. In : Sensing, Communication, and Networking (SECON), 2016 13th
Annual IEEE International Conference on. IEEE, 2016. p. 1-9.
[78] GOPE, Prosanta, LEE, Jemin, et QUEK, Tony QS. Resilience of DoS Attacks
in Designing Anonymous User Authentication Protocol for Wireless Sensor
Networks. IEEE Sensors Journal, 2016, vol. 17, no 2, p. 498-503.
[79] GARCIA-FONT, Victor, GARRIGUES, Carles, et RIFÀ-POUS, Helena.
Attack Classification Schema for Smart City WSNs. Sensors, 2017, vol. 17,
no 4, p. 771.
[80] DINKER, Aarti Gautam et SHARMA, Vidushi. Attacks and challenges in
wireless sensor networks. In : Computing for Sustainable Global
Development (INDIACom), 2016 3rd International Conference on. IEEE,
2016. p. 3069-3074.
[81] DENG, Jing, HAN, Richard, et MISHRA, Shivakant. Defending against path-
based DoS attacks in wireless sensor networks. In : Proceedings of the 3rd
ACM workshop on Security of adhoc and sensor networks. ACM, 2005. p.
89-96.
[82] DHAKNE, A. R. et CHATUR, P. N. Detailed Survey on Attacks in Wireless
Sensor Network. In : Proceedings of the International Conference on Data
Engineering and Communication Technology. Springer Singapore, 2017. p.
319-331.
[83] SARANYA, K., SATHYA, D., et KUMAR, P. Ganesh. A Survey On
Intrusion Detection System In Wireless Sensor Networks. In the proceeding
of the 2nd International Conference on Engineering Technology, Science and
Management Innovation (ICETSMI- 2017)- India, January 2017. P, 158-165
[84] SAINI, Meenu, KUMAR, Rajan, et al. To Propose a Novel Technique for
Detection and Isolation of Misdirection Attack in Wireless Sensor Network.
Indian Journal of Science and Technology, 2016, vol. 9, no 28.
[85] ZHENSHAN, Bao, BO, Xue, et WENBO, Zhang. HT-LEACH: An improved
energy efficient algorithm based on LEACH. In : Mechatronic Sciences,
Electric Engineering and Computer (MEC), Proceedings 2013 International
Conference on. IEEE, 2013. p. 715-718.
[86] RADHAPPA, Harish, PAN, Lei, XI ZHENG, James, et al.Practical overview
of security issues in wireless sensor network applications. International
Journal of Computers and Applications, 2017, p. 1-12.
[87] HE, Daojing, CHAN, Sammy, et GUIZANI, Mohsen. Cyber Security
Analysis and Protection of Wireless Sensor Networks for Smart Grid
Monitoring. IEEE Wireless Communications, 2017, vol. 24, no 6, p. 98-103.
[88] SINGH, Pooja et CHAUHAN, R. K. A Survey on Comparisons of
Cryptographic Algorithms Using Certain Parameters in WSN. International
Journal of Electrical and Computer Engineering, 2017, vol. 7, no 4, p. 2232.
[89] ZHANG, Ping, WANG, Shaokai, GUO, Kehua, et al. A secure data collection
scheme based on compressive sensing in wireless sensor networks. Adhoc
Networks, 2018, vol. 70, p. 73-84.
[90] CHELLI, Kahina. Security issues in wireless sensor networks: attacks and
countermeasures. In : Proceedings of the World Congress on Engineering.
2015. p. 1-3.
[91] LI, Juan. A Symmetric Cryptography Algorithm in Wireless Sensor Network
Security. International Journal of Online Engineering (iJOE)
[92] CHELLI, Kahina. Security issues in wireless sensor networks: attacks and
countermeasures. In : Proceedings of the World Congress on Engineering.
2015. p. 1-3.
[93] KARDI, Amine, ZAGROUBA, Rachid, et ALQAHTANI, Mohammed.
Performance Evaluation of RSA and Elliptic Curve Cryptography in Wireless
Sensor Networks. In : 2018 21st Saudi Computer Society National Computer
Conference (NCC). IEEE, 2018. p. 1-6.
[94] LI, Xiong, NIU, Jianwei, BHUIYAN, Md ZakirulAlam, et al. A robust ECC-
based provable secure authentication protocol with privacy preserving for
industrial internet of things. IEEE Transactions on Industrial Informatics,
2018, vol. 14, no 8, p. 3599-3609.
[95] IQBAL, Ummer et SHAFI, Saima. A Provable and Secure Key Exchange
Protocol Based on the Elliptical Curve DiffeHellman for WSN.
In : Advances in Big Data and Cloud Computing. Springer, Singapore, 2019.
p. 363-372.
[96] BOJANOVA, Irena, BLACK, Paul E., et YESHA, Yaacov. Cryptography
classes in bugs framework (BF): Encryption bugs (ENC), verification bugs
(VRF), and key management bugs (KMN). In : Software Technology
Conference (STC), 2017 IEEE 28th Annual. IEEE, 2017. p. 1-8.
K. Amine et al. / Advances in Science, Technology and Engineering Systems Journal Vol. 4, No. 6, 229-243 (2019)
www.astesj.com 243
[97] LIU, Donggang, NING, Peng, et DU, Wenliang. Group-based key
predistribution for wireless sensor networks. ACM Transactions on Sensor
Networks (TOSN), 2008, vol. 4, no 2, p. 11.
[98] JONES, K., WADAA, Ashraf, OLARIU, Stephan, et al. Towards a new
paradigm for securing wireless sensor networks. In : Proceedings of the 2003
workshop on New security paradigms. ACM, 2003. p. 115-121.
[99] http://www.zigbee.org/.
[100] MUNIVEL, E. et AJIT, G. M. Efficient public key infrastructure
implementation in wireless sensor networks. In : Wireless Communication
and Sensor Computing, 2010. ICWCSC 2010. International Conference on.
IEEE, 2010. p. 1-6.
[101] MALEH, Yassine et EZZATI, Abdellah. An advanced Study on
Cryptography Mechanisms for Wireless Sensor Networks. arXiv preprint
arXiv:1609.05323, 2016.
[102] OLIVEIRA, Leonardo B., ARANHA, Diego F., GOUVÊA, Conrado PL, et
al. TinyPBC: Pairings for authenticated identity-based non-interactive key
distribution in sensor networks. Computer Communications, 2011, vol. 34, no
3, p. 485-493.
[103] DIERKS, Tim. The transport layer security (TLS) protocol version 1.2. IETF
RFC 5246, August 2008.
... У роботі [5] запропоновано класифікацію атак у БСМ за чотирма ознаками, проте авторами не враховуються специфіка застосування БСМ у тактичній ланці управління військами. ...
Article
Сьогодні активно застосовуються безпроводові сенсорні мережі для розвідки і спостереження, оперативного збору інформації про обстановку, що передається до пунктів управління для аналізу та прийняття рішень у реальному часі. Вирішення питань захисту інформації під час використання сенсорів постають на перший план у процесі ведення бойових дій. Метою статті є удосконалення класифікації атак у безпроводових сенсорних мережах тактичної ланки управління військами на основі проведеного аналізу існуючих вразливостей для забезпечення безпеки таких мереж. Під час написання статті застосовано теоретичні методи, а саме аналіз досліджень і публікацій за тематикою розвитку та впровадження безпроводових сенсорних мереж у воєнній сфері, аналіз існуючих атак на такі мережі та синтез класифікації атак на безпроводові сенсорні мережі тактичної ланки управління військами. Зазначений методологічний підхід дає змогу розробити методи протидії атакам та удосконалити механізми захисту безпроводових сенсорних мереж тактичної ланки управління. У роботі проведено аналіз вразливостей, що визначаються особливостями архітектури безпроводових сенсорних мереж і протоколами їх функціонування. Описано основні та додаткові вимоги з безпеки таких мереж. Наведено удосконалену класифікацію атак у безпроводових сенсорних мережах за такими ознаками як характер дій, рівень моделі відкритих систем, мета впливу, об’єкт управління, позиціонування відносно мережі, тип атакуючого пристрою. На основі запропонованої класифікації проведено аналіз існуючих атак у безпроводових сенсорних мережах тактичної ланки управління військами. Новизною роботи є те, що проведено удосконалення класифікації атак на мобільні радіомережі за порушенням конфіденційності, цілісності, доступності, автентифікації та виснаження ресурсів. Вперше запропоновано класифікацію атак за впливом на різні об’єкти системи управління (підсистемами управління моніторингом, топологією, маршрутизацією, енергоресурсами вузлів, радіоресурсами, якістю обслуговування). Відповідно до запропонованої класифікації розкрито сутність атак на безпроводові сенсорні мережі тактичної ланки управління військами та запропоновано механізми захисту від них. Проаналізовані вразливості та наведена класифікація сприяють поглибленню наукових знань стосовно безпеки систем управління безпроводових сенсорних мереж тактичної ланки управління військами. Прикладне використання ознак класифікації атак сприятиме розробленню архітектури побудови (функціональної моделі) підсистеми управління безпекою з урахуванням особливостей характеристик, методів побудови та організації безпроводових сенсорних мереж.
... In a misdirection attack, the attackers change the route of the packet delivery to a node different from the target node. 99 Sensor nodes along the path experience resource loss as a result of traffic being redirected in a particular way. ...
Article
Full-text available
Wireless sensor networks (WSNs) are a major part of the telecommunications sector. WSN is applied in many aspects, including surveillance battlefields, patient medical monitoring, building automation, traffic control, environmental monitoring, and building intrusion monitoring. The WSN is made up of a vast number of sensor nodes, which are interconnected through a network. However, despite the growing usage of applications that rely on WSNs, they continue to suffer from restrictions, such as security issues and limited characteristics due to low memory and calculation power. Security issues lead to a lack of communication between sensors, wasting more energy. The need for efficient solutions has increased, especially with the rise of the Internet of Things, which relies on the effectiveness of WSNs. This review focuses on security issues by reviewing and addressing diverse types of WSN assaults that happened on each layer of the WSN that were published in security issues in the previous 3 years. As a consequence, this paper gives a taxonomy of security threats for each layer and different algorithmic solutions that numerous researchers who seek to counter this attack have explored. This study also presents a framework for constructing an intrusion detection system in the WSN by emphasising the drawbacks of each approach suggested by researchers to defend against specific forms of assault. In order to diminish the impact of this attack, this summary shows which attacks the majority of researchers have dealt with as well as which ones they have not yet addressed in their academic work.
... IoT is the result of the development and combination of different technologies. It encompasses almost all areas [2] of current Information Technology such as smart cities, computer systems, connected vehicles, etc. And exploits other advanced technologies [3,4] such as Cloud Computing, Big Data, or even the blockchains. ...
Article
Full-text available
The Internet of Things is a major development in information technology that increasingly dominates and reigns in the computer systems market. However, due to the threat of cyber attacks, the security of IoT is still one of the major issues holding back the evolution of this technology. For this, the authentication of objects is very important in IoT. In this paper, we propose a lightweight authentication protocol for the IoT Based Wireless Sensor Networks, called AuthenIoT. The objective is to provide mutual authentication services for connected objects. This protocol must take into account the constraints of the objects and the used communication technologies. To achieve such protocol, we opted for WSNs as an IoT use case. Furthermore, we demonstrate that the proposed scheme provides an efficient security for connected devices and that its computation and communication costs are suitable for extremely low-cost IoT devices.
... But, because of their limited characteristics, WUR-GWSNs become targeted by several types of attacks that aim to deplete the energy resources of sensors to collapse networks or attack the integrity of data. One of these attacks is those called deny of sleep attacks (Kardi and Zagrouba, 2019;Premkumar and Sundararajan, 2020;Khan et al., 2020;Alrehili et al., 2020;Jun and Haoyang, 2020). This paper studies these attacks, surveys the recent proposed solutions and proposes a new security mechanism in different sections organised as follow: Section 2 presents the related works, discusses the DoSL attacks and the proposed solutions. ...
Article
Full-text available
This paper proposes the distributed cooperation model (DCM) based hierarchical smart routing protocol (HSRP) to counter the denial of sleep (DoSL) attacks in Green Wireless Sensor Networks (GWSNs). DCM solution combined with the Dynamic Elliptic Curves-RSA (DECRSA) algorithm is used to provide high security level and protect Wake-Up Radio (WUR) for GWSNs against DoSL attack targeting the energy resources of sensors. The used distributed schema ensures the load balancing in the network through the selection of a new Supervisor Node at the beginning of each round based on a special equation taking into account different metrics such as the remaining energy and the number of neighbour nodes. Simulation results conducted under the NS3 simulator show that the proposed DCM helps to effectively protect the GWSNs against the DoSL attacks and improves the network lifetime by more than 60% when three malicious nodes are used. Obtained results show also that the DCM extends either the period of stability and instability to the maximum and helps to counter the fall in the number of alive nodes which cause the problem of isolated area.
... But, because of their limited characteristics, WUR-GWSNs become targeted by several types of attacks that aim to deplete the energy resources of sensors to collapse networks or attack the integrity of data. One of these attacks is those called deny of sleep attacks (Kardi and Zagrouba, 2019;Premkumar and Sundararajan, 2020;Khan et al., 2020;Alrehili et al., 2020;Jun and Haoyang, 2020). This paper studies these attacks, surveys the recent proposed solutions and proposes a new security mechanism in different sections organised as follow: Section 2 presents the related works, discusses the DoSL attacks and the proposed solutions. ...
Article
Full-text available
This paper proposes the distributed cooperation model (DCM) based hierarchical smart routing protocol (HSRP) to counter the denial of sleep (DoSL) attacks in Green Wireless Sensor Networks (GWSNs). DCM solution combined with the Dynamic Elliptic Curves-RSA (DECRSA) algorithm is used to provide high security level and protect Wake-Up Radio (WUR) for GWSNs against DoSL attack targeting the energy resources of sensors. The used distributed schema ensures the load balancing in the network through the selection of a new Supervisor Node at the beginning of each round based on a special equation taking into account different metrics such as the remaining energy and the number of neighbor nodes. Simulation results conducted under the NS3 simulator show that the proposed DCM helps to effectively protect the GWSNs against the DoSL attacks and improves the network lifetime by more than 60% when three malicious nodes are used. Obtained results show also that the DCM extends either the period of stability and instability to the maximum and helps to counter the fall in the number of alive nodes which cause the problem of isolated area.
... Followingfigure 2shows the five layers and three planes of WSN communication architecture. The details shown in figure Communication Architecture[6] ...
Article
Full-text available
The development in technology has resulted in development of multifunctional, small, lower priced, lower power consuming and multifunctional sensor nodes in wireless sensor networks (WSNs). The factors considered in design of the nodes are scalability, energy consumption, transmission range, environment etc. These nodes carry out activities like sensing, processing, information transmission and communication. The most of battery consumption is done by transmission of signals during communication process. So, saving energy is a foremost factor in the WSN. The routing scheme is extremely important for appropriate delivery of packets. This paper presents a review on some energy efficient routing protocols which are considering security measures as well, to improve security of nodes in WSN and targets to design approaches that needs less energy consumption during communication.
Chapter
In the past few years, numerous machine learning techniques have been employed in IoT networks to develop Intrusion Detection Systems (IDS) that differentiate abnormal activities caused by malicious intruders from the typical network behavior. Due to the large volume of data produced by IoT devices, it is challenging to perform real-time classification of data to find any abnormal patterns. Single classifier-based approaches are considered to be simple and straightforward but may not be able to capture all the relevant information in the data, leading to suboptimal performance. To overcome the weaknesses of single classifiers, it is often beneficial to use an ensemble of classifiers, such as a random forest or a gradient-boosted trees model, which can capture a wider range of patterns in the data and lead to improved performance. However, ensemble models can be computationally expensive to train especially when using large numbers of base classifiers making it difficult to scale the models to large datasets, such as of IoT. This paper presents a detailed empirical analysis of the comparative performance of single classifier versus ensemble models for intrusion detection in IoT networks by utilizing two benchmark datasets in the Internet of Things: NSL-KDD and UNSW-NB15. It has been observed that under certain conditions, the performance of single classifier-based IDS surpasses the ensemble stacking approaches. Moreover, training/testing dataset selection has a major impact on overall validation and testing performance of the models. Based on the empirical observations, we use a novel method known as ensemble stacking approach that outperforms the baselines for the selected datasets. The research provides a detailed insight into the impact of various classifiers and dataset features on the performance of IDS in IoT environments.KeywordsInternet of ThingsIntrusion DetectionEnsemble LearningMachine LearningSingle Classifiers
Article
Full-text available
The rapid developments in wireless multimedia sensor networks (WMSNs) have increased the demand for an efficient method of safeguarding multimedia data from attackers. As data are transmitted over a wireless medium, the authentication process needs to be provided with some efficient detection and prevention methods. The Sybil attack is one of the most common and involves replicating the identity of an original node in the network and behaving like a true node in order to retrieve/destroy information using this fake identity. An efficient enhanced random password comparison technique is proposed to detect and prevent Sybil attacks. The results of simulations indicate that the proposed method detects this type of attack more efficiently than existing methods. In addition to early detection, our application increases the throughput and reduces the average delay with an enhanced true detection rate. The identification of this malicious activity in its initial phases increases the efficiency of the system in terms of the data transmission process.
Article
Full-text available
Wireless Sensor Network (WSN) is a prominent technology which is a group of sensor nodes. Wirelessly based on constant network infrastructure and have ability to handled critical situation like commercial application and battlefields. Security is a main threat in wireless sensor network. The main idea is to make sensor node cheap and easily deployed everywhere to create an omnipresent network with geographical distribution. Wireless sensor network become demanding because of its service towards wide range of applications. Wireless sensor network consist of low computation capability, small memory, limited energy, susceptible to physical capture, infrastructure etc. In this paper I survey the Wireless Sensor network , various of attacks in WSN and their classification and security.
Article
Full-text available
Slope stability is one of the major geological concerns in open-cast mines. The mining area slopes needs to be regularly monitored to detect occurrence of any slope failure prior to any catastrophe. An early warning system solves this purpose preventing loss of significant mass of human lives as well as property. This is a critical scrutiny which renders various techniques and methodologies regarding Slope monitoring of open-cast mine. Wireless sensor network has been standing out as a productive competent tool for monitoring the tangible environmental structures by sensing the differences, processing this raw data and finally communicating the result to the web from where it can be referred for researches and predicting mechanisms. Internet of Things comes into picture for communicating the sensed and processed data from the sensors to the application where it can be further analyzed. In recent scenario power issue is of great concern associated with deploying a real-time monitoring system. This review depicts how WSN can be adopted and preferred to any other technologies used in slope monitoring due to its advantages it brings. Moreover, collaborative operation of WSN with IoT results in a more systematic, robust, energy-efficient, cost-effective real-time monitoring approach.
Article
Full-text available
The Wireless Sensor Networks (WSNs) have spread its roots in almost every application. Owing to their scattered nature of sensor nodes, they are more prone to attacks. There are certain applications e.g. military, where sensor data’s confidentiality requirement during transmission is essential. Cryptography has a vital role for achieving security in WSNs.WSN has resource constraints like memory size, processing speed and energy consumption which bounds the applicability of existing cryptographic algorithms for WSN. Any good security algorithms has higher energy consumption by the nodes, so it’s a need to choose most energy-efficient cryptographic encryption algorithms for WSNs. This paper surveys different asymmetric algorithms such as RSA, Diffie-Hellman, DSA, ECC, hybrid and DNA cryptography. These algorithms are compared based on their key size, strength, weakness, attacks and possible countermeasures in the form of table.
Article
Data collection is one of the most important research topics in wireless sensor networks. Compressive sensing can break through the classical Shannon–Nyquist boundary and reduce the total energy consumption. Random walk technology has a significant advantage in the energy balance. Random walk based compressive sensing data collection mechanism is a combination of these two technologies, which reinforce complementary advantages. However, the traditional scheme faces two challenges, i.e., large transmission energy consumption caused by the overlong multi-hop transmission path and the low recovery accuracy caused by poorly designed compressive sensing measurement. In this paper, we propose a ring topology based compressive sensing data collection scheme (RTCS). The total number of hops is reduced by a ring topology based random walk. The recovery accuracy is improved by the dual compensation based compressive sensing measurement. The theoretical analysis, as well as the experimental evaluation obtained from two different network deployment environments, demonstrates that the proposed scheme can achieve the performance superior to the most closely related work.
Chapter
Internet of Things or IoT is an ecosystem of different physical objects provided with unique identifiers embedded with electronics, software, sensors and network connectivity which enables these objects to collect and exchange data without human intervention. The different technologies comprising IoT are Wireless sensor network, Cloud Computing, Micro-electromechanical systems (MEMS), Semantic technologies and future Internet. This concept makes it possible for the devices to be connected all the time everywhere, so it can also be referred to as Internet of Everything. Health care or Healthcare is the improvement of health in human beings by diagnosis, treatment and prevention of diseases, injury, and accidents, physical and mental impairments. It helps in the general physical, mental health and well being of people around the world. It comprises all the work done by Health professional in improving the primary care, secondary care and tertiary care of public. This chapter focuses on how the capabilities of Internet of things (IoT) can be leveraged in providing better Healthcare. In this chapter, various applications of IoT in healthcare as well as the challenges in the implementation are highlighted.
Article
Wireless sensor networks are widely used in applications to monitor and communicate data. Even though the wireless sensor networks have been broadly used in critical applications, security and privacy issues are major concern. The attackers can gain considerably easy access into a wireless sensor networks and inject malicious data. Wireless sensor networks are considered to be vulnerable to the attacks. The aim of this research is to review the practical scenarios and applications, expose the security vulnerabilities and issues associated with wireless sensor networks specific to applications. The need for research in this area is high since it provides a broad scope to investigate problems and issues in current applications.
Article
span style="color: black; font-family: 'Times New Roman',serif; font-size: 10pt; mso-fareast-font-family: 宋体; mso-themecolor: text1; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA;" lang="EN-US">In order to study the symmetric cryptography algorithm, which plays an essential role in ensuring the information security, AES (Advanced Encryption Standard) basic theory is discussed, and AES protocol processor for a small area based on wireless sensor network is designed. In addition, an iterative encryption and decryption AES structure is designed to achieve the non-linear transformation. And then, the wireless sensor network security is analyzed, and the results showed that in the process of encryption and decryption, making use of multiplexing and sharing technologies can help to obtain a low cost compact structure. And more importantly, it has great advantages in the resources compared with the same kind of designed structures. Based on the above findings, it is concluded that AES algorithm has good performances in wireless sensor networks and it can be widely applied.</span
Chapter
The major goal of this analysis is to compare and find out the appropriate protocol for research. According to our analysis, the access control method and authentication used in the wireless sensor networks in some protocols is costlier in the security and message exchange. In analysis, we find out that various security solutions are based on public key cryptography which is highly expensive, susceptible to replay and denial of service attacks. Most of access control protocols depend on the key pre-distribution mechanisms which are combined together with either a one-way key chain or a pseudorandom function. The solution for the access control inculcates various vulnerabilities of the mechanism on which it is developed and its security features also rely on the same. This paper provides detailed analysis over improvements for all the recent protocols that cover the shortcomings of each other.