Detecting Inner Attackers and Colluded nodes in Wireless Sensor Networks Using Hop-depth algorithm

Hop-depth 알고리즘을 이용한 무선 센서 네트워크상에서의 내부공격자 및 공모노드 검출

  • Rhee, Kang-Hyeon (Dept. of Electronic Eng., College of Elec-Info Eng., Chosun University)
  • 이강현 (조선대학교 전자정보공과대학 전자공학과)
  • Published : 2007.01.25

Abstract

Commonly, in the Sensor Network that composed with multiple nodes uses Ad-hoc protocol to communicate each other. Each sensed data packets are collected by base node and processed by Host PC. But the Ad-hoc protocol is too vulnerable to Sinkhole attack, where the intruder attracts surrounding nodes with unfaithful routing information, and then performs selective forwarding or changes the data passing through it. The Sinkhole attack increases overhead over the network and boosts energy consumption speed to decrease network's life time. Since the other attacks can be easily adopted through sinkhole attack, the countermeasure must be considered carefully. In this paper, we proposed the Hop-depth algorithm that detects intruder in Sinkhole attack and colluded nodes. First, the proposed algorithm makes list of suspected nodes and identifies the real intruder in the suspected node list through the Hop-depth count value. And recalculates colluder's path information to find the real intruder. We evaluated the performance of the proposed algorithm using NS2. We compared and analyzed the success ratio of finding real intruder, false positive ratio, false negative ratio, and energy consumption.

다수의 노드로 구성된 무선센서네트워크는 Ad-hoc 방식으로 노드간 통신이 이루어지며, 센싱데이터는 베이스노드로 취합되어진 후 Host PC에 의해 처리되어지게 된다. 하지만 Ad-hoc 방식의 네트워크는 잘못된 라우팅 정보를 전달하거나 데이터를 중간에 소실 및 변경시키는 싱크홀 공격에 대해 취약할 수밖에 없다. 이러한 싱크홀 공격은 네트워크의 오버헤드를 가중시키고 전체 네트워크의 배터리 소모를 가속화 시켜 전체 네트워크의 수명을 단축시키고 또한 다른 공격을 적용하기가 용이하므로 싱크홀 공격에 대한 대응방법은 신중하게 고려되어져야 한다. 본 논문은 이러한 싱크홀 공격이 일어났을 때 공격노드와 주변의 공모노드를 검출해 낼 수 있는 Hop-depth 알고리즘을 제안하였다. 제안된 알고리즘은 홉 깊이가 변경되는 공격의심 노드들을 검색한 후 주변의 공모노드의 경로 값을 재계산한 후 실제 공격이 이루어지는 노드를 검출해 낸다. 제안된 알고리즘의 성능평가는 NS2를 사용하여 이루어 졌으며 원 공격노드 검출성공률, 양성오류율 및 음성오류율, 에너지 소비효율 값을 비교분석하였다.

Keywords

References

  1. Hongmel Deng, Wel LI, and Dharma P. Agrawal, 'Routing Security in Wireless Ad Hoc Networks,' In IEEE Communication magazine., pp. 70-75, Oct. 2002 https://doi.org/10.1109/MCOM.2002.1039859
  2. Dorothy E. Denning, 'An Intrusion Detection Model,' in Proceeding of the IEEE Symposium on Security and Privacy., pp.118-131, 1986
  3. Y.Zhang and W. Lee, 'Intrusion Detection in Wireless Ad-hoc Networks,' in proceeding of the 6th ACM MobiCom., pp. 275-283, 2000 https://doi.org/10.1145/345910.345958
  4. C. Karlof, and D. Wagner, 'Secure Routing in Wireless Sensor Networks : Attack and Countermeasures,' In Elsevier's AdHoc Networks Journal, Special Issue on Sensor Network Application and Procotols., pp. 293-315, Sep. 2003
  5. L. Lazos, R. Poovendran, C. Meadows, P. Syverson, and L. W. Chang , 'Preventing Wormhole Attacks in Wireless Ad Hoc Networks,' In IEEE Wireless and Communications and Networking Conference (WCNC)., pp. 1193-1199, Mar. 2005
  6. J. Deng, R. Han, S. Mishra, 'Security Support In-Network Processing in Wireless Networks,' In Proceeding of 1st ACM Workshop on Security of Adhoc and Sensor Networks., 2003 https://doi.org/10.1145/986858.986870
  7. D. Wagner, 'Resilent Aggregation in Sensor Networks,' in ACM Workshop on Security of Ad Hoc and Sensor Networks(SASN), pp. 78-97, Oct. 2004 https://doi.org/10.1145/1029102.1029116
  8. N. Ye and Q. Chen, 'An Anomaly Detection Technique Based on a Chi-square Statistic for Detecting Intrusions into Information System,' Quality and Reliability Engineering International, vol. 17, no. 2, pp. 105-112, 2001 https://doi.org/10.1002/qre.392
  9. W. B. Heinzelman, A. Chandrakasan, and H. Balakrishnan, 'An Application-Specific Protocol Architecture for wireless Microsensor Networks,' IEEE Transactions on Wireless Communications, vol. 1, no. 4, pp. 660-670, 2002 https://doi.org/10.1109/TWC.2002.804190