DocumentCode
3270301
Title
Detecting sinkhole attack and selective forwarding attack in wireless sensor networks
Author
Tumrongwittayapak, Chanatip ; Varakulsiripunth, Ruttikorn
Author_Institution
Fac. of Eng., King Mongkut´´s Inst. of Technol. Ladkrabang, Bangkok, Thailand
fYear
2009
fDate
8-10 Dec. 2009
Firstpage
1
Lastpage
5
Abstract
Security in Wireless Sensor Networks (WSNs) is especially challenging and quite different from traditional network security mechanisms. There are two major reasons. Firstly, there are severe constraints on these devices namely their minimal energy, computational and communicational capabilities. Secondly, there is an additional risk of physical attacks such as node capture and tampering. Moreover, cryptography based techniques alone are insufficient to secure WSNs. Hence, intrusion detection techniques must be designed to detect the attacks. Further, these techniques should be lightweight because of resource-constrained nature of WSNs. In this paper, we present a new approach of robust and lightweight solution for detecting the Sinkhole attack and the Selective Forwarding attack based on Received Signal Strength Indicator (RSSI) readings of messages. The proposed solution needs collaboration of some Extra Monitor (EM) node apart from the ordinary nodes. We use RSSI value from four EM nodes to determine the position of all sensor nodes which the Base Station (BS) is origin position (0,0). Later, we use this information as weight from the BS. Another functions of EM nodes are eavesdropper and monitor all traffics, in order to detect the Selective Forwarding attack in the network. Our solution is lightweight in the sense that monitor nodes were not loaded any ordinary nodes or BS and not cause a communication overhead.
Keywords
security of data; telecommunication security; wireless sensor networks; base station; cryptography; intrusion detection techniques; physical attacks; received signal strength indicator; selective forwarding attack; sinkhole attack detection; wireless sensor networks security; Airports; Bandwidth; Electronic mail; Information security; Monitoring; Routing protocols; Sensor phenomena and characterization; Sensor systems; Surveillance; Wireless sensor networks; detecting sinkhole & selective forwarding attacks; intruder detection; security in wireless sensor netwoks; wireless sensor networks;
fLanguage
English
Publisher
ieee
Conference_Titel
Information, Communications and Signal Processing, 2009. ICICS 2009. 7th International Conference on
Conference_Location
Macau
Print_ISBN
978-1-4244-4656-8
Electronic_ISBN
978-1-4244-4657-5
Type
conf
DOI
10.1109/ICICS.2009.5397594
Filename
5397594
Link To Document