• DocumentCode
    2809940
  • Title

    A Synchronization Attack and Defense in Energy-Efficient Listen-Sleep Slotted MAC Protocols

  • Author

    Lu, Xiaoming ; Spear, Matt ; Levitt, Karl ; Matloff, Norman S. ; Wu, S. Felix

  • Author_Institution
    Dept. of Comput. Sci., UC Davis, Davis, CA
  • fYear
    2008
  • fDate
    25-31 Aug. 2008
  • Firstpage
    403
  • Lastpage
    411
  • Abstract
    As wireless motes are battery powered, many listen-sleep Medium Access Control (MAC) protocols have been proposed to reduce energy consumption. Security issues related to the design of these protocols have, however, largely been ignored. In this paper, we present a novel attack (the synchronization attack) on listen-sleep MAC protocols. This attack can cause 100% message loss and approximately 30% higher energy drain throughout either a cluster or the entire network, with only a single constrained malicious node modifying its schedule. We show this attack can be applied to many slotted listen-sleep protocols such as Sensor MAC (S-MAC), its enhanced version Global Schedule Adoption (GSA), Timeout MAC (T-MAC), Dynamic Sensor-MAC (DSMAC), and Mobile S-MAC (MS-MAC). We propose a heuristically near-optimal threshold-based scheme to defend against large scale synchronization attack. Depending on the traffic rate, our defense can limit the message delay to at most 20% and the message drop to at most 12%. We performed extensive simulations to show the attack and its defense. Our theoretical analysis proves these results in a general listen-sleep framework. An important impact of this work is that without a reliable MAC layer, higher layer secure protocols cannot be developed, e.g. secure routing depends on a reliable exchange of messages and our attack disrupts this exchange.
  • Keywords
    access protocols; synchronisation; telecommunication network reliability; telecommunication security; wireless sensor networks; defense; dynamic sensor-MAC; energy-efficient listen-sleep slotted MAC protocol; global schedule adoption; message delay; mobile S-MAC; optimal threshold-based scheme; secure routing; sensor MAC; synchronization attack; timeout MAC; wireless sensor network; Access protocols; Batteries; Communication system security; Dynamic scheduling; Energy consumption; Energy efficiency; Large-scale systems; Media Access Protocol; Traffic control; Wireless application protocol; MAC protocal; energy efficiency; sensor networks; synchronization attack; synchronization defense;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Emerging Security Information, Systems and Technologies, 2008. SECURWARE '08. Second International Conference on
  • Conference_Location
    Cap Esterel
  • Print_ISBN
    978-0-7695-3329-2
  • Electronic_ISBN
    978-0-7695-3329-2
  • Type

    conf

  • DOI
    10.1109/SECURWARE.2008.45
  • Filename
    4622614