International Journal of Engineering Trends and Technology (IJETT) – Volume 12 Number 4 - Jun 2014 Secure Message Exchange to Protect Against DDoS in WSNs – A Review Shivati Mahajan#1, Khushneet kaur#2 #1 Research Scholar ECE Department, Doaba Institute Of Engineering &Technology Kharar(Mohali)Punjab,India Associate Professor ECE Department,Doaba Khalsa Trust Group Of Institute Rahon(Nawashar)Punjab,India *2 Abstract-In this paper, we are proposing a new scheme to protect against DDoS attack on WSNs using a novel message passing interface. The proposed technique will use an neighbour integrity based message exchange technique to avoid the unauthorized nodes from sending the data in the network. Each node will be individually capable of scanning the input data packets to know the data streams sources. An integral source will be sending a security message with special type of information in the message transmissions. The receiving node will get the integrity of the transmitting source by keeping an eye over these integrity packets. This information will use various mathematics and statistics formulas to create and verify the integrity messages. Keywords—DDoS (Distributed Denial Of Service), WSN, SAD-SJ(Self Decentralized Solution –Self Jamming) I. INTRODUCTION Wireless Sensor Network forms a network using sensor nodes .The sensor nodes consist of one or more sensors that communicate with each other via radio waves. The sensors is device that has sufficient digital to analog converter memory ,power supply & battery. The sensor node have a various devices such as analog to digital converter, a radio transreceiver, central processing unit, antenna. Sensors nodes is a collection of sensors which perform basic operation such as sensing, data processing & communication. The sensor node can gather the information from the environment The real time event information is also provided by the sensors. TDMA is used most of the time in WSN for data communication. WSN deployed in many field such as in weather forecasting, military areas, medical field, home appliances, industries, shopping complex, tracking. In weather forecasting it can provide the information about the change of environment such as it provide the information of change of temperature in environment. In medical field it provide the information about the patient health it monitor the patient body so that proper treatment of patient is done. Military field can utilize the WSNs for the purpose of tracking the activities in some sensitive area. ISSN: 2231-5381 WSN Topology can be of any type it can varies from star topology to mesh topology. The technology development in wireless has build up the interest in WSN.As sensor nodes has a sufficient amount of memory, battery & ciphering so it can install in hills and villages. In captious condition such as in military field or monitoring patient there is expand of use of sensors. The application of sensors network in military applications and the enough power and memory, dispute the security purpose WSN Security is the significant issue in now a days. The WSN Security can be avert from beset in many ways .WSN can be beset by blocking the communication between sensor node and base station. In this type of beset analog signal or digital signal is sent by the hacker for jamming the network in form of DOS(Denial of Services).DOS is achieve by transferring flood of packets to network or to base station. The information between base station and other nodes can be avert setting up incorrect routing information so that traffic goes to the wrong destination or node. In this review paper we are concerned with DDOS(Distributed Denial Of Service) attack. The DDOS attack can be achieve by transferring flood of packets by the multiple hacker. In case of DDOS attack the sensor node was unable to communicate with each other. DDOS jam the WSN network II. LITERATURE REVIEW Marco Tiloca et. al. proposed industrial applications and factory automation for Wireless Sensor Networks[1]. The authors have worked closer to TDMA based WSNs. They have proposed an algorithm named SAD-SJ for the protection against DDoS attack on networks. Md. Monzur Morshed et. Al. proposed Cluster Based Secure Routing Protocol (CBSRP) is a MANET routing protocol with ensurity of secure key management and secure communication taking place between mobile nodes[2]. They have used digital signature and hashing technique to facilitate the secure communications. Seuwou. P. et. al. have proposed Effective Security as an ill-defined Problem in Vehicular Ad hoc Networks (VANETs) [3]. They have worked upon vanet security to protect against various attacks. Qian.yi et.al. have worked on the performance http://www.ijettjournal.org Page 183 International Journal of Engineering Trends and Technology (IJETT) – Volume 12 Number 4 - Jun 2014 evaluation of a secure MAC Protocol for vehicular network[4].They have proposed an quality of service (call priority) based MAC protocol to enhance the security of the VANETs. Javed.M.A. et. al. have developed a Geo casting technique in an IEEE802.11p based vehicular Ad hoc network for road traffic management[5]. A location aware packet transmission based technique is used to protect against various VANET security issues. Hung c.c. et.al. proposed Mobility Pattern Aware Routing for Heterogeneous Vehicular Networks[6]. According to this paper traditional ad hoc routing protocols are not well suited for these high dynamic network. In this paper they propose a new Heterogeneous Vehicular Network (HVN) architecture and a mobility pattern aware routing for HVN. Dias .A.J. et.al. have created a Test bed environment based Performance Evaluation of Routing Protocols for Vehicular Delay-Tolerant Networks[7]. III. PROBLEM FORMULATION Wireless Sensor Networks (WSNs) are currently used in many application scenarios, including industrial applications and factory automation. In such scenarios, Time Division Multiple Access (TDMA) is typically used for data communication among sensor nodes. However, TDMA-based WSNs are particularly prone to DoS and DDoS attacks which can stop the whole communication between sensor nodes[8]. In the existing paper, authors have presented SAD-SJ (Self-Adaptive Decentralized solution against Selective Jamming) WSN protocol, a selfadaptive and decentralized MAC-layer solution against selective jamming in TDMA-based WSNs[9]. SAD-SJ is an effective WSN secure protocol against selective jamming attach, a specific form of Denial of Service attack, requires sensor nodes to rely only on local information, and allows them to join and leave the network without hindering other nodes activity[10][11]. But this protocol is not capable of protecting against selective jamming, in order to address multiple nodes attempting to join the network at the same time i.e. Distributed Denial of Service (DDoS) attack[12]. The existing protocol can be improved to protect against selective jamming attack in order to multiple nodes, a specific and severe DDoS attack. IV. PROPOSED SYSTEM In the research project, we propose an effective improvement in SAD-SJ method to make it capable of protecting the selective jamming, in order to address multiple nodes attempting to join the network at the same time i.e. Distributed Denial of Service (DDoS) attack. The existing protocol will be improved to protect against selective jamming attack in order to multiple nodes, a specific and severe DDoS attack. This protocol will generate multiple random unique codes and add them to the inter communication packets, at the sender’s side. On the receiver side, these unique codes will be verified using the unique code verification calculation method. This will ISSN: 2231-5381 protect the nodes by discarding the non-matching packets from external nodes attempting to launch DDoS on WSN. V. METHODOLOGY At first stage, a detailed literature study would be conducted on the denial of service or distributed denial of service attacks and solution for WSNs. Literature study will lead us towards refining the structure of the proposed security solution design. Afterwards, the proposed solution will be implemented in NS2 simulator and a thorough performance analysis would be performed. Obtained results would be analysed and compared with the existing techniques. We will start our research project by conducting a detailed literature review on the DDoS attack in case of WSNs to know the problem in detail. Then, a detailed security mechanism would be designed to prevent the DDoS multiple selective jamming attack in WSNs. The simulation would be implemented using Network Simulator (NS2). The obtained results would be examined and compared with the existing security mechanism to address the similar issues. VI. CONCLUSION The proposed method is based on integrity message transfers for the evaluation of the real neighbours and malicious nodes, from which it is receiving the data packets. Every WSN node will be individually capable of detecting the malicious nodes launching DDoS attack and will block them. In future, we will develop the algorithm and implement it in NS2 simulation with sufficient node density running over AODV protocol. REFERENCES [1] Marco Tiloca, Domenico De Guglielmo, Gianluca Dini and Giuseppe Anastasi, “SAD-SJ: a Self-Adaptive Decentralized solution against Selective Jamming attack in Wireless Sensor Networks”, ETFA, vol. 18, pp. 1-8, IEEE, 2013. [2] Md. Monzur Morshed, Md. Rafiqul Islam, “CBSRP: Cluster Based Secure Routing Protocol”, IACC, vol. 3, pp. 571-576, IEEE, 2013. [3] Patrice Seuwou, Dilip Patel, Dave Protheroe, George Ubakanma “Effective Security as an ill-defined Problem in Vehicular Ad hoc Networks (VANETs)”. [4] Yi Qian ,Kejie Lu , and Nader Moayeri“PERFORMANCE EVALUATION OF A SECURE MAC PROTOCOL FOR VEHICULAR NETWORKS” (2008 IEEE) [5] Muhammad A. Javed and Jamil Y. Khan “A Geocasting Technique in an IEEE802.11p based Vehicular Ad hoc Network for Road Traffic Management”. (2010). [6] Chia-Chen Hung, Hope Chan, and Eric Hsiao-Kuang Wu “Mobility Pattern Aware Routing for Heterogeneous Vehicular Networks”( IEEE WCNC 2008). [7] João A. Dias, João N. Isento, Vasco N. G. J. Soares, FaridFarahmand, and Joel J. P. C. Rodrigues “Testbed-based Performance Evaluation of Routing Protocols for Vehicular Delay-Tolerant Networks” (2011 IEEE). http://www.ijettjournal.org Page 184 International Journal of Engineering Trends and Technology (IJETT) – Volume 12 Number 4 - Jun 2014 [8] A. Proano and L. Lazos, “Selective Jamming Attacks in Wireless Networks”, Proceedings of the 2010 IEEE [9]R. Sokullu, I. Korkmaz and O. Dagdeviren, “GTS Attack:An IEEE802.15.4 MAC Layer Attack in Wireless SensorNetworks”, International Journal On Advances in Internet Technologies, Vol. 2, N. 1, pp. 104-114, 2009. [9] D.R. Raymond and S.F. Midkiff, “Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses”, IEEE Pervasive Computing, Vol. 7, N. 1, pp. 74-81, 2008. [10] R. Pickholtz, D. Schilling and L. Milstein, “Theory of Spread Spectrum Communications - A Tutorial”, IEEE Transactions on Communications, Vol. 30, N. 5, pp. 855-884, 1982. [11] L. Tang, Y. Sun, O. Gurewitz and D. B. Johnson,“EMMAC:a dynamic multichannel energy-efficient MACprotocol for wireless sensor networks”, Proceedings of theTwelfth ACM International Symposium on Mobile Ad HocNetworking and Computing (MobiHoc ’11), pp. 23:123:11, 2011. [12] Institute of Electrical and Electronics Engineers, Inc.NewYork, IEEE Std.802.15.42006,IEEEStandardforInformationtechnologyTelecommunica tions andinformation exchange between systems - Local and metropolitan area networks - Specic requirements Part15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (WPANs), September 2006. ISSN: 2231-5381 http://www.ijettjournal.org Page 185