Skip to main content

Energy Saving Replay Attack Prevention in Clustered Wireless Sensor Networks

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8039))

Abstract

Nodes in a wireless sensor network (WSN) are susceptible to various attacks primarily due to their nature of deployment and unguarded communication. Therefore, protecting such networks from attacks is a major challenge. We propose a scheme where sink, the resource-rich node, keeps track of attack threat based on statistics of network traffic. If any threat is apprehended, the sink and nodes together start analysis on each node’s contribution towards the network traffic to confirm the attack (if any) and identify the attacked node. Unlike existing attack prevention scheme, which incorporates securing mechanism starting from the network in operation, the present scheme starts secure communication only when it detects attack thereby reducing securing overheads significantly. As there is energy constraint in WSN, the main objective of this work is to reduce energy consumption while keeping the network secured. The other objective is to reduce attack detection time concomitantly so that the network can start secure communication before the attack causes any significant damage in the network. Performance of the scheme is compared with one of the state-of-the-art scheme. Qualitative analysis is done considering the performance metrics of communication, computation and storage overheads while quantitative analysis is done considering energy consumption, detection time and detection probability as performance metrics. Results confirm significant improvement over the competing scheme in respect to all the overheads.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ghosal, A., Halder, S., DasBit, S.: A Dynamic TDMA Based Scheme for Securing Query Processing in WSN. Wireless Networks 18(2), 165–184 (2012)

    Article  Google Scholar 

  2. Agah, A., Das, S.K.: Preventing DoS Attacks in Wireless Sensor Networks: A Repeated Game Theory Approach. Int’l Journal of Network Security 5(2), 145–153 (2007)

    Google Scholar 

  3. Wood, A.D., Stankovic, J.A.: Denial of Service in Sensor Networks. IEEE Computer 35(10), 54–62 (2002)

    Article  Google Scholar 

  4. Ghosal, A., Halder, S., Sur, S., Dan, A., DasBit, S.: Ensuring Basic Security and Preventing Replay Attack in a Query Processing Application Domain in WSN. In: Taniar, D., Gervasi, O., Murgante, B., Pardede, E., Apduhan, B.O. (eds.) ICCSA 2010, Part III. LNCS, vol. 6018, pp. 321–335. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  5. Oliveira, L.B., Wong, H.C., Bern, M., Dahab, R., Loureiro, A.A.F.: SecLEACH–A Random Key Distribution Solution for Securing Clustered Sensor Networks. In: Proc. of 5th IEEE Int’l Symposium on Network Computing and Applications, pp. 145–154 (2006)

    Google Scholar 

  6. Heinzelman, W.R., Chandrakasan, A.P., Balakrishnan, H.: An Application-Specific Protocol Architecture for Wireless Microsensor Networks. IEEE Trans. on Wireless Communications 1(4), 660–670 (2002)

    Article  Google Scholar 

  7. Gheorghe, L., Rughinis, R., Deaconescu, R., Tapus, N.: Authentication and Anti-replay Security Protocol for Wireless Sensor Networks. In: Proc. of 5th Int’l Conf. on Systems and Networks Communications, pp. 7–13 (2010)

    Google Scholar 

  8. Perrig, A., Szewczyk, R., Tygar, J., Wen, V., Culler, D.: SPINS: Security Protocols for Sensor Networks. Wireless Networks 8(5), 521–534 (2002)

    Article  MATH  Google Scholar 

  9. Das, M.L.: Two-Factor User Authentication in Wireless Sensor Networks. IEEE Trans. on Wireless Communications 8(3), 1086–1090 (2009)

    Article  Google Scholar 

  10. David, R.R., Marchany, R.C., Midkiff, S.F.: Scalable, Cluster-based Anti-replay Protection for Wireless Sensor Networks. In: Proc. of IEEE Workshop on Information Assurance, pp. 127–134 (2007)

    Google Scholar 

  11. Atmel Corporation Product Document (2009), http://www.atmel.com/dyn/resources/prod_documents/doc2467.pdf

  12. Rosberg, Z., Liu, R.P., Dinh, T.L., Dong, Y.F., Jha, S.: Statistical Reliability for Energy Efficient Data Transport in Wireless Sensor Networks. Wireless Networks 16(7), 1913–1927 (2010)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ghosal, A., Saha, A., Das Bit, S. (2013). Energy Saving Replay Attack Prevention in Clustered Wireless Sensor Networks. In: Wang, G.A., Zheng, X., Chau, M., Chen, H. (eds) Intelligence and Security Informatics. PAISI 2013. Lecture Notes in Computer Science, vol 8039. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-39693-9_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-39693-9_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-39692-2

  • Online ISBN: 978-3-642-39693-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics