Title :
Detecting sinkhole attack and selective forwarding attack in wireless sensor networks
Author :
Tumrongwittayapak, Chanatip ; Varakulsiripunth, Ruttikorn
Author_Institution :
Fac. of Eng., King Mongkut´´s Inst. of Technol. Ladkrabang, Bangkok, Thailand
Abstract :
Security in Wireless Sensor Networks (WSNs) is especially challenging and quite different from traditional network security mechanisms. There are two major reasons. Firstly, there are severe constraints on these devices namely their minimal energy, computational and communicational capabilities. Secondly, there is an additional risk of physical attacks such as node capture and tampering. Moreover, cryptography based techniques alone are insufficient to secure WSNs. Hence, intrusion detection techniques must be designed to detect the attacks. Further, these techniques should be lightweight because of resource-constrained nature of WSNs. In this paper, we present a new approach of robust and lightweight solution for detecting the Sinkhole attack and the Selective Forwarding attack based on Received Signal Strength Indicator (RSSI) readings of messages. The proposed solution needs collaboration of some Extra Monitor (EM) node apart from the ordinary nodes. We use RSSI value from four EM nodes to determine the position of all sensor nodes which the Base Station (BS) is origin position (0,0). Later, we use this information as weight from the BS. Another functions of EM nodes are eavesdropper and monitor all traffics, in order to detect the Selective Forwarding attack in the network. Our solution is lightweight in the sense that monitor nodes were not loaded any ordinary nodes or BS and not cause a communication overhead.
Keywords :
security of data; telecommunication security; wireless sensor networks; base station; cryptography; intrusion detection techniques; physical attacks; received signal strength indicator; selective forwarding attack; sinkhole attack detection; wireless sensor networks security; Airports; Bandwidth; Electronic mail; Information security; Monitoring; Routing protocols; Sensor phenomena and characterization; Sensor systems; Surveillance; Wireless sensor networks; detecting sinkhole & selective forwarding attacks; intruder detection; security in wireless sensor netwoks; wireless sensor networks;
Conference_Titel :
Information, Communications and Signal Processing, 2009. ICICS 2009. 7th International Conference on
Conference_Location :
Macau
Print_ISBN :
978-1-4244-4656-8
Electronic_ISBN :
978-1-4244-4657-5
DOI :
10.1109/ICICS.2009.5397594