Advertisement

Attacks and Countermeasures in Sensor Networks: A Survey

  • Kai Xing
  • Shyaam Sundhar Rajamadam Srinivasan
  • Major Jose “Manny” Rivera
  • Jiang Li
  • Xiuzhen Cheng
Chapter

Abstract

A wireless sensor network (WSN) comprises a large number of sensors that collaboratively monitor various environments. The sensors all together provide global views of the environments that offer more information than those local views provided by independently operating sensors. There are numerous potential applications of WSNs in various areas such as residence, industry, military, and many others. For instance, people can use WSNs to build intelligent house, to gather machine information for real-time control in factories, and to track enemy movements in battle fields.

Keywords

Wireless Sensor Network Medium Access Control Medium Access Control Protocol Intrusion Detection System Medium Access Control Layer 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    J. ibriq and I. Mahgoub, “Cluster-based routing in wireless sensor networks: issues and challenge,” in SPECS’04, 2004, pp. 759–766.Google Scholar
  2. 2.
    Y. Xu, J. Heideemann, and D. Estrin, “Energy conservation by adaptive clustering for ad-hoc networks,” in Poster session of MobiHoc’02, 2002.Google Scholar
  3. 3.
    Y. Xu, J. Heidemann, and D. Estrin, “Adaptive energy-conserving routing for multihop ad hoc networks,” may 2000, submitted for publication.Google Scholar
  4. 4.
    M. Franklin, Z. Galil, and M. Yung, “Eavesdropping games: a graph-theoretic approach to privacy in distributed systems,” J. ACM, vol. 47, no. 2, pp. 225–243, 2000.MathSciNetMATHCrossRefGoogle Scholar
  5. 5.
    M. Abadi and J. Jürjens, “Formal eavesdropping and its computational interpretation,” in TACS ’01: Proceedings of the 4th International Symposium on Theoretical Aspects of Computer Software. London, UK: Springer, 2001, pp. 82–94.Google Scholar
  6. 6.
    K. D. Murray, Security Scrapbook Espionage and Privacy News of the Week. [Online]. Available: http://www.spybusters.com/SS0210.html
  7. 7.
  8. 8.
    L. Hu and D. Evans, “Using directional antennas to prevent wormhole attacks,” in Network and Distributed System Security Symposium(NDSS), 2004.Google Scholar
  9. 9.
    R. R. Choudhury, X. Yang, N. H. Vaidya, and R. Ramanathan, “Using directional antennas for medium access control in ad hoc networks,” in MobiCom ’02: Proceedings of the 8th annual international conference on Mobile computing and networking. New York: ACM, 2002, pp. 59–70.Google Scholar
  10. 10.
    S. Yi, Y. Pei, and S. Kalyanaraman, “On the capacity improvement of ad hoc wireless networks using directional antennas,” in MobiHoc ’03: Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing. New York: ACM, 2003, pp. 108–116.Google Scholar
  11. 11.
    M. Takai, J. Martin, R. Bagrodia, and A. Ren, “Directional virtual carrier sensing for directional antennas in mobile ad hoc networks,” in MobiHoc ’02: Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing. New York: ACM, 2002, pp. 183–193.Google Scholar
  12. 12.
    R. Ramanathan, “On the performance of ad hoc networks with beamforming antennas,” in MobiHoc ’01: Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing. New York: ACM, 2001, pp. 95–105.Google Scholar
  13. 13.
    L. Zhou and Z. J. Haas, “Securing ad hoc networks,” IEEE Network, vol. 13, no. 6, pp. 24–30, 1999.CrossRefGoogle Scholar
  14. 14.
    J.-P. Hubaux, L. Buttyán, and S. Capkun, “The quest for security in mobile ad hoc networks,” in MobiHoc ’01: Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing. New York: ACM, 2001, pp. 146–155.Google Scholar
  15. 15.
    “Providing robust and ubiquitous security support for mobile ad hoc networks,” in ICNP ’01: Proceedings of the Ninth International Conference on Network Protocols (ICNP’01). IEEE Computer Society, 2001, p. 251.Google Scholar
  16. 16.
    H. Chan, A. Perrig, and D. Song, “Random key predistribution schemes for sensor networks,” in SP ’03: Proceedings of the 2003 IEEE Symposium on Security and Privacy. Washington, DC: IEEE Computer Society, 2003, p. 197.Google Scholar
  17. 17.
    L. Eschenauer and V. D. Gligor, “A key-management scheme for distributed sensor networks,” in CCS ’02: Proceedings of the 9th ACM conference on Computer and communications security. New York: ACM, 2002, pp. 41–47.Google Scholar
  18. 18.
    D. Liu and P. Ning, “Establishing pairwise keys in distributed sensor networks,” in CCS ’03: Proceedings of the 10th ACM conference on Computer and communications security. New York: ACM, 2003, pp. 52–61.Google Scholar
  19. 19.
    H. Chan and A. Perrig, “Pike: Peer intermediaries for key establishment in sensor networks,” in IEEE Infocom, 2005.Google Scholar
  20. 20.
    W. Du, J. Deng, Y. S. Han, and P. K. Varshney, “A pairwise key pre-distribution scheme for wireless sensor networks,” in CCS ’03: Proceedings of the 10th ACM conference on Computer and communications security. New York: ACM, 2003, pp. 42–51.Google Scholar
  21. 21.
    R. Blom, “Non-public key distribution,” in Advances in Cryptology: Proceedings of Crypto ’82, 1982, pp. 231–236.Google Scholar
  22. 22.
    L. Ma, X. Cheng, F. Liu, M. Rivera, F. An, and J. Li, “ikms: An in-situ key management scheme for wireless sensor networks,” 2005.Google Scholar
  23. 23.
    F. Liu, X. Cheng, and L. Ma, “S-kms: A self-configured key management scheme for sensor networks,” 2005.Google Scholar
  24. 24.
    [Online]. Available: http://www.eweek.com/encyclopedia term/0,2542,t=MAC+layeri= 46426,00.aspGoogle Scholar
  25. 25.
    V. Gupta, S. Krishnamurthy, and M. Faloutsos, “Denial of service attacks at the mac layer in wireless ad hoc networks.” [Online]. Available: http://www.cs.ucr.edu/∼krish/milcom_vik.pdfGoogle Scholar
  26. 26.
    I. A. Jean-Pierre, “Denial of service resilience in ad hoc networks.” [Online]. Available: http://lcawww.epfl.ch/Publications/aad/aadHK04.pdf
  27. 27.
    A. D. Wood and J. A. Stankovic, “Denial of service in sensor networks,” Computer, vol. 35, no. 10, pp. 54–62, 2002.CrossRefGoogle Scholar
  28. 28.
    P. Michiardi and R. Molva, “Prevention of denial of service attacks and selfishness in mobile ad hoc networks,” in Institut Eurecom Research Report RR-02-063, 2002.Google Scholar
  29. 29.
    A. A. Cardenas, S. Radosavac, and J. S. Baras, “Detection and prevention of mac layer misbehavior in ad hoc networks,” in Proceedings of the 2nd ACM workshop on security of ad hoc and sensor networks, 2004.Google Scholar
  30. 30.
    E. D. Cardenas, “Mac spoofing–an introduction,” 2003. [Online]. Available: http://www.giac.org/practical/GSEC/Edgar_Cardenas_GSEC.pdf
  31. 31.
    J. R. Douceur, “The sybil attack,” in IPTPS ’01: Revised Papers from the First International Workshop on Peer-to-Peer Systems. London: Springer, 2002, pp. 251–260.Google Scholar
  32. 32.
    J. Newsome, E. Shi, D. Song, and A. Perrig, “The sybil attack in sensor networks: analysis & defenses,” in IPSN’04: Proceedings of the third international symposium on Information processing in sensor networks. New York: ACM, 2004, pp. 259–268.Google Scholar
  33. 33.
    P. Kyasanur and N. H. Vaidya, “Detection and handling of mac layer misbehavior in wireless networks.” in DSN, 2003, pp. 173–182.Google Scholar
  34. 34.
    S. Marti, T. J. Giuli, K. Lai, and M. Baker, “Mitigating routing misbehavior in mobile ad hoc networks,” in MobiCom ’00: Proceedings of the 6th annual international conference on Mobile computing and networking. New York: ACM, 2000, pp. 255–265.Google Scholar
  35. 35.
    Y. Zhang, W. Lee, and Y.-A. Huang, “Intrusion detection techniques for mobile wireless networks,” Wirel. Netw., vol. 9, no. 5, pp. 545–556, 2003.CrossRefGoogle Scholar
  36. 36.
    Y. Zhang and W. Lee, “Intrusion detection in wireless ad-hoc networks,” in MobiCom ’00: Proceedings of the 6th annual international conference on Mobile computing and networking. New York: ACM, 2000, pp. 275–283.Google Scholar
  37. 37.
    P. Michiardi and R. Molva, “Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks,” in Proceedings of the IFIP TC6/TC11 6th joint working conference on communications and multimedia security. Deventer, The Netherlands, The Netherlands: Kluwer, B.V., 2002, pp. 107–121.Google Scholar
  38. 38.
    F. K. Andreas, “Sensors for detection of misbehaving nodes in manets.” [Online]. Available: http://medien.informatik.uni-ulm.de/forschung/publikationen/dimva2004.pdf
  39. 39.
    J. Konorski, “Multiple access in ad-hoc wireless lans with noncooperative stations.” in NETWORKING, 2002, pp. 1141–1146.Google Scholar
  40. 40.
    M. Cagalj, S. Ganeriwal, I. Aad, and J.-P. Hubaux, “On cheating in csma/ca ad hoc networks,” in EPFL Technical Report, 2004.Google Scholar
  41. 41.
    A. Seshadri, A. Perrig, L. van Doorn, and P. K. Khosla, “Swatt: Software-based attestation for embedded devices.” in IEEE Symposium on Security and Privacy, 2004, pp. 272–282.Google Scholar
  42. 42.
    C. R. Murthy and B. S.Manoj, “Transport layer and security protocols for ad hoc wireless networks,” in Ad Hoc Wireless Networks – Architectures and Protocols, 2004.Google Scholar
  43. 43.
    C. E. Perkins and E. M. Royer, “Ad-hoc on-demand distance vector routing,” in WMCSA ’99: Proceedings of the Second IEEE Workshop on Mobile Computer Systems and Applications. IEEE Computer Society, 1999, p. 90.Google Scholar
  44. 44.
    C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: Attacks and countermeasures,” Elsevier’s AdHoc Networks Journal, Special Issue on Sensor Network Applications and Protocols, vol. 1, no. 2–3, pp. 293–315, September 2003.Google Scholar
  45. 45.
    D. Ganesan, B. Krishnamachari, A. Woo, D. Culler, D. Estrin, and S. Wicker, “An empirical study of epidemic algorithms in large scale multihop wireless networks,” 2002.Google Scholar
  46. 46.
    Y. Hu, A. Perrig, and D. Johnson, “Wormhole detection in wireless ad hoc networks,” 2002. [Online]. Available: citeseer.ist.psu.edu/hu02wormhole.html
  47. 47.
    D. Ganesan, R. Govindan, S. Shenker, and D. Estrin, “Highly-resilient, energy-efficient multipath routing in wireless sensor networks,” SIGMOBILE Mob. Comput. Commun. Rev., vol. 5, no. 4, pp. 11–25, 2001.CrossRefGoogle Scholar
  48. 48.
    W. Lou, W. Liu, and Y. Fang, “Spread: Enhancing data confidentiality in mobile ad hoc networks,” in IEEE INFOCOM, 2004.Google Scholar
  49. 49.
    P. Papadimitratos and Z. J. Haas, “Secure data transmission in mobile ad hoc networks,” in WiSe ’03: Proceedings of the 2003 ACM workshop on Wireless security. New York: ACM, 2003, pp. 41–50.Google Scholar
  50. 50.
    K. Hoeper and G. Gong, “Models of authentication in ad hoc networks and their related network properties,” in Tech Reports, 2004. [Online]. Available: http://www.cacr.math.uwaterloo.ca/techreports/2004/cacr2004-03.pdf
  51. 51.
    J. Binkley and W. Trost, “Authenticated ad hoc routing at the link layer for mobile systems,” Wirel. Netw., vol. 7, no. 2, pp. 139–145, 2001.MATHCrossRefGoogle Scholar
  52. 52.
    H. Vogt, “Exploring message authentication in sensor networks,” in 1st European Workshop on Security in Ad Hoc and Sensor Networks (ESAS 2004), 2004.Google Scholar
  53. 53.
    S. Zhu, S. Setia, S. Jajodia, and P. Ning, “An interleaved hop-byhop authentication scheme for filtering false data injection in sensor networks,” 2004.Google Scholar
  54. 54.
    A. Perrig, R. Szewczyk, V. Wen, D. E. Culler, and J. D. Tygar, “SPINS: security protocols for sensor netowrks,” in Mobile Computing and Networking, 2001, pp. 189–199. [Online]. Available: citeseer.ist.psu.edu/perrig01spins.html
  55. 55.
    Y.-C. Hu, D. B. Johnson, and A. Perrig, “Sead: Secure efficient distance vector routing in mobile wireless ad hoc networks,” in 4th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA ’02), jun 2002, pp. 3–13. [Online]. Available: citeseer.ist.psu.edu/hu02sead.html
  56. 56.
    Y.-C. Hu, A. Perrig, and D. B. Johnson, “Ariadne: A secure on-demand routing protocol for ad hoc networks,” in Proceedings of the Eighth Annual International Conference on Mobile Computing and Networking (MobiCom 2002), Sept. 2002, (in press). [Online]. Available: citeseer.ist.psu.edu/article/hu02ariadne.html
  57. 57.
    Y. Hu, A. Perrig, and D. Johnson, “Packet leashes: A defense against wormhole attacks in wireless ad hoc networks,” 2001. [Online]. Available: citeseer.ist.psu.edu/hu01packet.html
  58. 58.
    W. Wang and B. Bhargava, “Visualization of wormholes in sensor networks,” in WiSe ’04: Proceedings of the 2004 ACM workshop on Wireless security. ACM, 2004, pp. 51–60.Google Scholar
  59. 59.
    E. Shi and A. Perrig, “Designing secure sensor networks,” IEEE Wireless Communications, vol. 11, no. 6, pp. 38–43, 2004.CrossRefGoogle Scholar
  60. 60.
    A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler, “Spins: security protocols for sensor networks,” Wirel. Netw., vol. 8, no. 5, pp. 521–534, 2002.MATHCrossRefGoogle Scholar
  61. 61.
    J. Elson and D. Estrin, “Time synchronization for wireless sensor networks,” in IPDPS ’01: Proceedings of the 15th International Parallel & Distributed Processing Symposium. Washington, DC: IEEE Computer Society, 2001, p. 186.Google Scholar
  62. 62.
    G. Khanna, A. Masood, and C. N. Rotaru, “Synchronization attacks against 802.11,” in Networks and Distributed Systems Symposium (NDSS) Workshop, 2005.Google Scholar
  63. 63.
    M. Ding, D. Chen, K. Xing, and X. Cheng, “Localized fault-tolerant event boundary detection in sensor networks,” in Proceedings of IEEE INFOCOM, Miami, FL, March 2005.Google Scholar
  64. 64.
    T. Palpanas, D. Papadopoulos, V. Kalogeraki, and D. Gunopulos, “Distributed deviation detection in sensor networks,” SIGMOD Rec., vol. 32, no. 4, pp. 77–82, 2003.CrossRefGoogle Scholar
  65. 65.
    J. Staddon, D. Balfanz, and G. Durfee, “Efficient tracing of failed nodes in sensor networks,” in WSNA ’02: Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications. New York: ACM, 2002, pp. 122–130.Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2010

Authors and Affiliations

  • Kai Xing
    • 1
  • Shyaam Sundhar Rajamadam Srinivasan
  • Major Jose “Manny” Rivera
  • Jiang Li
  • Xiuzhen Cheng
  1. 1.School of Computer Science and Technology, Suzhou Institute for Advanced StudyUniversity of Science and Technology of ChinaHefeiChina

Personalised recommendations