Title :
Countering sinkhole and black hole attacks on sensor networks using Dynamic Trust Management
Author :
Roy, Suman Deb ; Singh, Sneha Aman ; Choudhury, Subhrabrata ; Debnath, N.C.
Author_Institution :
Nat. Inst. Of Technol., Durgapur
Abstract :
Wireless sensor networks consisting of spatially distributed autonomous devices required to survive in unprotected environments. They are always susceptible to attack by malicious behavior of its routers (nodes) or external enemy nodes which could negatively affect secured routing and QoS and hence, vital wireless multimedia applications. In recent times, a lot of specific severe attacks have been proposed that makes such networks highly vulnerable, such as Sinkholes, the Black hole Attack, etc. However, currently, most security protocols are based on resisting a single attack without a systematic defense against dual and continuous attacks. There is a high possibility that the enemy would try several methods i.e. multiple attacks to compromise the same system in case a particular attack is thwarted. In this paper, we use our dynamic trust management system [DTMS] to propose methods that could counter two such severe attacks on sensor networks. Our major intent is to analyze an attackerpsilas strategy, develop DTMS and show that it is integrated enough to counter both the threats single-handedly. This ensures that network architectures and protocols do not require redefinition for every specific attack. As a consequence, significant time, effort and cost is saved in refraining from relaying the network with different defenses for different attacks every time.
Keywords :
multimedia communication; quality of service; telecommunication network management; telecommunication network routing; telecommunication security; wireless sensor networks; QoS; black hole attacks; dynamic trust management; external enemy nodes; quality of service; security protocols; sinkhole attacks; wireless multimedia applications; wireless sensor networks; Communication system security; Counting circuits; Environmental management; Equations; Intelligent sensors; Protocols; Quality of service; Routing; Technology management; Wireless sensor networks; Black holes; Sinkholes; dynamic trust management; multiple attacks; sensors;
Conference_Titel :
Computers and Communications, 2008. ISCC 2008. IEEE Symposium on
Conference_Location :
Marrakech
Print_ISBN :
978-1-4244-2702-4
Electronic_ISBN :
1530-1346
DOI :
10.1109/ISCC.2008.4625768