Detection of Malicious Cluster Head causing Web Site: www.ijaiem.org Email:

advertisement
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org
Volume 3, Issue 5, May 2014
ISSN 2319 - 4847
Detection of Malicious Cluster Head causing
Hello Flood Attack in LEACH Protocol in
Wireless Sensor Networks
Satwinder Kaur Saini1, Mansi Gupta2
1
2
Department of Computer Science Engineering, PIT (PTU main Campus), Kapurthala, India
Assistant Professor, Computer Science Department, Punjab Technical University, Kapurthala, Punjab, India
Abstract
Wireless Sensor networks have wide range applications using different routing protocols to route the data towards the sink.
However, these protocols being too simple are prone to various attacks. LEACH is a highly secure protocol with dynamic selection
of Cluster Heads based on Received Signal Strength. But as with other protocols, LEACH is prone to HELLO Flood Attack when
the adversary becomes the Cluster Head and sensors being computation and energy constrained cryptographic approaches to
prevent this attack are not too helpful. Some non-cryptographic methods to detect the HELLO Flood attack also exist but they are
not too efficient as they result in large test packet overhead. In this paper an efficient non-cryptographic method for the detection
and prevention of HELLO Flood attack in LEACH protocol is proposed which results in early detection with lesser energy and
communication overhead.
Keywords: Security, WSN, LEACH, HELLO Flood attack, Cluster Head, Adversary.
1. INTRODUCTION
Wireless Sensor networks have unique characteristics and face security challenges as defined below:
1.1 SECURITY ISSUES IN WSN:
1. Data Confidentiality: Ensuring that only the authorized sensor nodes can access the content of the messages.
2. Data Authentication: Ensuring that the data is originated from a valid source [3].
3. Data Integrity: Ensuring that any received data has not been altered or manipulated in transit by unauthorized parties.
4. Availability: Ensuring that services offered by whole WSN or by a single sensor node must be available whenever
required.
5. Data Freshness: Ensuring that no old messages have been replayed in the network [10].
6. Authorization: Ensure that only authorized sensors can provide information to network services or applications.
7. Non-repudiation: It denotes that a node cannot deny sending a message it has previously sent [7].
8. Forward and Backward Secrecy: These should be considered when new sensors are deployed and old sensors leave the
network due to some failure. Forward Secrecy means a sensor should not be able to read any messages after it leaves the
network. Backward Secrecy means a joining node should not be able to read any message that has been previously
transmitted [12].
1.2 LEACH PROTOCOL
Heinzelman, et.al [5] introduced a dynamic, hierarchical clustering protocol for sensor networks, called LEACH (Low
Energy Adaptive Clustering Hierarchy). LEACH forms small clusters of some sensor nodes of which one is the cluster
head and others are the cluster members. The cluster members send their sensed data to the cluster head and cluster head
in turn send this data to the sink by aggregating all the received data from its cluster members, in order to reduce the
redundancy. In LEACH the cluster head nodes are periodically re-elected so that the same node is not repeatedly used for
the high energy task of the cluster head. However, the chosen cluster heads do not ensure the coverage of all the sensors in
the field which is the primary disadvantage of LEACH Protocol. TDMA/CDMA MAC is used to reduce inter-cluster and
intra-cluster collisions or interference. This protocol is used where a constant monitoring by the sensor nodes are required
as data collection is centralized (at the base station) and is performed periodically[10].
1.2.1Operation of LEACH
LEACH operations can be divided into two phases:1. Setup phase
2. Steady phase
In the setup phase, the clusters are formed and a cluster-head (CH) is chosen for each cluster while other nodes in the
cluster are considered as the cluster members. While in the steady phase, data is sensed and sent to the central base
station. The steady phase is longer than the setup phase. This is done in order to minimize the overhead cost [17].
Volume 3, Issue 5, May 2014
Page 384
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org
Volume 3, Issue 5, May 2014
ISSN 2319 - 4847
Figure 1 LEACH Protocol Phases [6]
1.2.2 Attacks possible on LEACH
LEACH protocol is a secure protocol as compared to the more conventional multi-hop protocols. In the conventional
multi-hop protocols, the nodes around the base station are more attractive to compromise as they are the major points of
aggregation and forwarders of all packets to the base station. Whereas, in LEACH, the Cluster Heads are the only node
that directly communicate with the base station. The location of these Cluster Heads can be anywhere in the network
irrespective of the base station. And more over the CHs are periodically randomly changed. So spotting these CHs is very
difficult for the adversary.
However, as it is a cluster-based protocol, depending solely on the Cluster Heads for aggregation of data and its routing,
attacks involving the Cluster Heads are the most harmful. If any adversary nodes become a CH, then it can facilitate
attacks like Sybil attack, HELLO flood attack and selective forwarding [11].
1.3 HELLO FLOOD ATTACK
An attacker uses high-powered transmitter to trick a large area of nodes into believing they are neighbours of that
transmitting node. If the attacker intentionally broadcasts a false superior route to the base station, all of these nodes will
choose to transmit through the attacking node, despite many being out of radio range in reality [16] [18]. The intruder
can broadcast a powerful advertisement to all the nodes in the network and hence, every node is likely to choose the
adversary as the cluster-head. The adversary can then selectively forward information to the base-station or modify or
dump it [1] [2] [11].
Figure 2 HELLO Flood Attack
2. LITERATURE REVIEW
Extensive study of work done in the field of detection of HELLO flood attack in LEACH protocol in WSNs is done and
can be categorized into two groups: Cryptographic approaches & non-cryptographic approaches. These are described as
follows:
Table 5 Cryptographic Approaches
S.No
Paper Title
Year
Author
Approach
Advantages
Disadvantages
1
Secure routing in
2003
Chris
Karlof, Sharing a secret Only reachable Spoofing
makes
wireless
sensor
David Wagner
key between any nodes
can the
approach
networks: attacks
two nodes. Key decrypt.
worthless.
and
generated during
countermeasures.[
communication.
8]
2
Defense
against
2006
Md. Abdul Hamid, Secret key for High secrecy Computation
lap-top
class
Md. Mamun-Or- each
different preventing the overhead is high
attacker in wireless
Rashid
and route to a base adversary from during route setup.
sensor network.[4]
Choong
Seon station. Multiple attacking the
Hong
base stations with network.
each covering and
keeping track of
secrets of some
nodes.
3
SecLEACH - A
2006
Leonardo
B. Random Key pre- Provides
Node
capturing
Volume 3, Issue 5, May 2014
Page 385
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org
Volume 3, Issue 5, May 2014
4
5
Random
Key
Distribution
Solution
for
Securing Clustered
Sensor
Networks.[11]
An
Efficiency
Security Model of
Routing Protocol
in Wireless Sensor
Networks.[7]
Performance
Evaluation
of
LEACH Protocol
in
Wireless
Network.[9]
Oliveira, Hao C.
Wong, M. Bern,
Ricardo
Dahab
and A. A. F.
Loureiro
2008
Jing Chen,
Huanguo Zhang
and Junhui Hu
2012
M.Shankar,
Dr.M.Sridarand
Dr.M.Rajani
S.No
1
Paper Title
Malicious
node
detection
in
wireless
sensor
networks. [13]
Year
2004
2
Signal
Strength
based
HELLO
Flood
Attack
Detection
and
Prevention
in
Wireless
Sensor
Networks. [16]
Detection
of
HELLO
Flood
Attack on LEACH
Protocol[19]
2013
3
2014
distribution
approach,
Symmetric
key
cryptography and
dynamic cluster
formation.
Public
Key
cryptography.
communicatio
n authenticity,
confidentiality,
freshness and
integrity.
attack possible
Resists outside
attackers
Cannot
prevent
inside attacks and
computation
overhead is high
Random pair wise
key distribution
Resists
spoofing,
sinkhole,
wormhole,
selective
forwarding
and
many
other attacks.
Random key
distribution
scheme is
thus efficient
management
mechanisms
required.
Advantages
Both outside
and
inside
attacks can be
detected.
Disadvantages
Spoofing
of
identity by the
adversary
may
result in false
detection.
Information
dissemination by
each node is adds
to
the
communication
overhead.
TEST
packet
communication
overhead is high.
Table 6 Non-Cryptographic Approaches
Author
Approach
Waldir
Ribeiro Signal
strength
Pires
J´unior, and geographical
Thiago H. de Paula information based
Figueiredo,
Hao approach.
Each
Chi Wong and node monitors all
Antonio
A.F. the
heard
Loureiro
transmissions and
maintains a local
reputation
table
for the heard
nodes.
Virendra
Pal Signal
strength
Singh, Aishwarya based
S. Anand Ukey approach.COmpar
and Sweta Jain
ison of RSS with
pre-calculated
threshold
Shikha
and
Kumar
Magotra
Krishan
ISSN 2319 - 4847
Geographical
information based
approach.
Coordinate approach
with
distance
calculation.
Simple
Approach with
less
computation
overhead
Simple
approach with
lesser
detection time
pre
used
key
are
TEST
packet
communication
overhead.
3. PROPOSED M ETHODOLOGY
The Proposed approach is based on the Received Signal Strength (RSS) and the geographical information of the motes
deployed in the sensing region of interest. In the proposed approach random GUIDE nodes are chosen, as these are
randomly chosen their distribution cannot be guaranteed to be uniform over the sensing region. These GUIDE nodes are
chosen randomly in each round as the Cluster Heads depending upon the desired Guide node percentage. The GUIDE
nodes are responsible for the work of detection of malicious Cluster Head and malicious node information dissemination
as well. Larger is the Guide node percentage, more are the chances of early detection; However higher Guide node
percentage will also result in more energy consumption.
3.1 TERMINOLOGY
The terms used in the algorithm refer to specific meanings and are described below:
n: Total Number of Nodes in Network
Volume 3, Issue 5, May 2014
Page 386
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org
Volume 3, Issue 5, May 2014
ISSN 2319 - 4847
CH: Cluster Head
N: Normal Node
Pthresh: Pre defined Received Power Threshold
G: GUIDE Node
pg: Percentage of GUIDE Nodes
countGs: Counter for GUIDE Nodes
ADV.Power: Power of the Advertisement message sent by the elected CHs
range_normal: range of normal sensor node
dist: distance between the GUIDE node and the ADV sending CH node
detect: counter for detection of malicious node
3.2 ALGORITHM FOR PROPOSED APPROACH:
The algorithm for the proposed GUIDE Approach is given below:
Step 1. Creation of GUIDE nodes
for(i=1;i<=n;i++)
{ random =choose a random number;
if(S(i).E>0&& S(i) ∉ CH&&random<=(pg/(1-pg*mod(r,round(1/pg)))))
{ node.type=’G’;
countGs++;
Transmit GUIDE Signal (x,y,random). } }
Step 2.Detection by the GUIDE nodes
for(i=0;i<=countGs;i++)
{ if(ADV.Power>=PThresh || dist>=range_normal)
{ detect++;
Malicious CH detected;
Store the detected Malicious CH co-ordinates. } }
Step 3. Information Dissemination
if(detect>0)
{ Detecting GUIDE node: Transmits ALERT message with Malicious CH co-ordinates.
Other GUIDE nodes: Retransmit ALERT message. }
Step 4. CH Association (for N nodes)
for(i=0;i<=n;i++)
{ Choose CH such that co-ordinates are not same as those in received ALERT message and maximum Power CH is
chosen as minimum distance CH. }
4. RESULTS
4.1 SIMULATION SCENARIO USING MATLAB
The proposed algorithm has been implemented using MATLAB simulator. HELLO Flood attack has been simulated by
choosing desired percentage of random attackers (here 0.01) in the network with high transmission power as compared to
normal sensor nodes in the network. A sink is placed at a fixed position in the field and sensors are placed randomly in
the field. The field dimensions are 100 x 100. Other simulation parameters are defined below along with their values
used.
Table 7 Parameters used in the simulation Scenario with values
Parameter
Value Used
Field Dimensions(in meters)
100*100
Sink Co-ordinates
0.5*maximum field length,0.5*maximum field width
Number of Sensor nodes(n)
Number of Sink/Base station
Cluster Head Election Probability
Transmission/Reception Energy
Transmitting and Receiving Antenna Gain
Volume 3, Issue 5, May 2014
100
1
0.1
50*0.000000001
1
Page 387
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org
Volume 3, Issue 5, May 2014
ISSN 2319 - 4847
Transmitting and Receiving Antenna Heights(in
meters)
1.5
Radio Range of normal sensor nodes(in meters)
Diameter of sensing field*sqrt (log (n) /n) [20]
Radio Range of Attacker(in meters)
Path Loss
Percentage of attackers
Maximum number of rounds
Percentage of Guide nodes
Distance threshold between two guide nodes
80
1
0.01
100
0.1
15
Figure 3 Simulation of Proposed Approach
o
*
+
x
*
: Normal node
: Cluster Head
: Attacker
: Sink
: Guide Node
The proposed approach results are compared to two existing approaches that are, Received Signal Strength (RSS) based
Approach and non-cryptographic approach presented in reference []. The performance metrics used for comparison are
detection Time, Detection Energy and Communication Overhead. Each of these metrics is explained below along with the
results obtained in comparison to previously existing approaches.
4.2 PERFORMANCE RESULTS
The performance of the proposed approach has been compared to two existing approaches in terms of performance
metrics like detection time, energy required for detection and communication overhead. The comparison is described
below:
4.2.1 Detection Time: It is the time the network takes to detect the malicious cluster Head node or the
adversary in each round in LEACH Protocol. Results are shown below:
4.2.2
Table 8 Comparison based on the detection Time (in Seconds)
LEACH Round
RSS Based Approach
Approach in ref [19]
Proposed GUIDE
Approach
round=20
4.64
1.11
0.443
round=40
5.93
1.40
0.382
round=60
5.73
1.39
0.149
round=80
7.42
1.09
0.421
round=100
5.47
1.20
0.432
Volume 3, Issue 5, May 2014
Page 388
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org
Volume 3, Issue 5, May 2014
ISSN 2319 - 4847
Figure 4 Comparison based on Detection Time (in Seconds)
4.2.2 Detection Energy: it is defined as the amount of energy dissipated by the network nodes for the detection of the
attacking node per round in LEACH Protocol. Results are given below:
Table 9 Comparison based on Detection Energy required (in milliJoules)
LEACH Round
RSS Based Approach
Approach in ref [19]
Proposed GUIDE
Approach
round=20
9.27
2.37
1.6
round=40
10.47
2.57
1.4
round=60
11.43
2.9
2
round=80
11.37
2.11
2
round=100
10.37
2.37
1
Figure 5 Comparison based on Detection Energy (in milli Joules)
4.2.3 Communication Overhead: It is defined as the overhead incurred by the network in terms of additional packets for
the purpose of successful detection of Attacker node in the network. Results are shown below:
LEACH Round
Table 10: Comparison based on Communication Overhead
RSS Based Approach
Approach in ref [19]
round=20
round=40
round=60
round=80
round=100
37
28
20
28
26
14
12
13
14
11
Proposed GUIDE
Approach
8
7
10
10
5
Figure 6 Comparison Based on Communication Overhead incurred
Volume 3, Issue 5, May 2014
Page 389
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org
Volume 3, Issue 5, May 2014
ISSN 2319 - 4847
The above analysis clearly shows that the proposed approach gives better results in terms of performance metrics defined
above. Thus, the HELLO Flood attack can be detected with lesser detection time, lesser energy and lesser computation
overhead with the proposed GUIDE approach in comparison to the previously existing approaches.
5. CONCLUSION
LEACH protocol is difficult for an adversary to attack except the case when the adversary node become a Cluster Head, it
makes it easy for the attacker to launch a HELLO flood attack by simply broadcasting a powerful advertisement to all the
nodes deployed in the sensing field. In this paper, a new non-cryptographic approach to detect and prevent HELLO Flood
attack in LEACH protocol in WSN is proposed. The results of the proposed approach have been compared with the
existing approaches and the comparison proves that the proposed approach is more effective with less detection time,
energy and computational overhead. The proposed approach improves the network performance by early detection of
adversary and preventing the nodes from associating with such a malicious Cluster Head.
6. FUTURE SCOPE
The proposed approach in LEACH protocol works well with detection of the adversary and prevention from associating
any normal node to such node as cluster member. However the proposed work does not include any plan for the isolation
of the attacker nodes in the network. In future, work can be enhanced to isolate such nodes from the rest of the network
for the smooth functioning of the network. Furthermore, the simulated scenario defines a homogeneous network whereas
real life environment is heterogeneous. So in future, work can be done for the same. Also the guide nodes are not
uniformly placed in the field so their connectivity and even distribution in the network cannot be guaranteed. The work
can be enhanced in future to ensure the even distribution of guide nodes in the sensing region.
REFERENCES
[1] Anand, D.G.; Chandrakanth, H.G.; Giriprasad, M.N.; “Security Threats & Issues in Wireless Sensor Networks,”
International Journal of Engineering Research and Applications (IJERA), ISSN: 2248-9622, vol. 2, Issue 1, pp.911916, Jan-Feb 2012.
[2] Chaudhari, H.C.; Kadam, L.U.; “Wireless Sensor Networks: Security, Attacks and Challenges,” International
Journal of Networking, vol. 1, Issue 1, pp-04-16, 2011.
[3] Chee-Yee Chong; Kumar, S.P., "Sensor networks: evolution, opportunities, and challenges," Proceedings of the
IEEE, vol.91, no.8, pp.1247,1256, Aug. 2003.
[4] Hamid, A.; Mamun-Or-Rashid; Choong-seon Hong, "Defense against lap-top class attacker in wireless sensor
network," Advanced Communication Technology, 2006. ICACT 2006. The 8th International Conference , vol.1, no.,
pp.5 pp.,318, 20-22 Feb. 2006.
[5] Heinzelman, W.R.; Chandrakasan, A.; Balakrishnan, H.; "Energy-efficient communication protocol for wireless
microsensor networks," System Sciences, 2000. Proceedings of the 33rd Annual Hawaii International Conference on,
vol. 2, pp.10 pp., 4-7 Jan. 2000.
[6] Heinzelman, W.B.; Chandrakasan, A.P.; Balakrishnan, H.; "An application-specific protocol architecture for wireless
microsensor networks," Wireless Communications, IEEE Transactions on, vol.1, no.4, pp.660, 670, Oct 2002.
[7] Jing Chen; Huanguo Zhang; Junhui Hu, "An Efficiency Security Model of Routing Protocol in Wireless Sensor
Networks," Modeling & Simulation, 2008. AICMS 08. Second Asia International Conference on, vol., no., pp.59, 64,
13-15 May 2008.
[8] Karlof, C.; Wagner, D., "Secure routing in wireless sensor networks: attacks and countermeasures," Sensor Network
Protocols and Applications, 2003. Proceedings of the First IEEE.2003 IEEE International Workshop on, vol., no.,
pp.113, 127, 11 May 2003.
[9] M.Shankar; M.Sridar; M.Rajani; “Performance Evaluation of LEACH Protocol in Wireless Network,” International
Journal of Scientific & Engineering Research, vol 3, Issue 1, January-2012.
[10] Modares, H.; Salleh, R.; Moravejosharieh, A.; "Overview of Security Issues in Wireless Sensor
Networks," Computational Intelligence, Modelling and Simulation (CIMSiM), 2011 Third International Conference
on, vol., no., pp.308, 311, 20-22 Sept. 2011.
[11] Oliveira, L.B.; Wong, H.C.; Bern, M.; Dahab, R.; Alfredo Ferreira Loureiro, Antonio; "SecLEACH - A Random Key
Distribution Solution for Securing Clustered Sensor Networks," Network Computing and Applications, 2006. NCA
2006. Fifth IEEE International Symposium on, vol., no., pp.145, 154, 24-26 July 2006.
[12] Pathan, A.K.; Hyung-Woo Lee; Choong-seon Hong; "Security in wireless sensor networks: issues and
challenges," Advanced Communication Technology, 2006. ICACT 2006. The 8th International Conference, vol.2,
no., pp.6 pp., 1048, 20-22 Feb. 2006.
[13] Pires, W.R., Jr.; de Paula Figueiredo, T.H.; Wong, H.C.; Loureiro, A. A F, "Malicious node detection in wireless
sensor networks," Parallel and Distributed Processing Symposium, 2004. Proceedings 18th International, vol., no.,
pp.24, 26-30 April 2004.
Volume 3, Issue 5, May 2014
Page 390
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org
Volume 3, Issue 5, May 2014
ISSN 2319 - 4847
[14] Suraj Sharma; Sanjay K. Jena; “A survey on secure hierarchical routing protocols in wireless sensor networks,”
ICCCS ’11 Proceedings of the 2011 International Conference on Communication, Computing & Security, pp.146,
151,2011.
[15] Uddin, M.Y.S.; Akbar, M.M.; "Addressing Techniques in Wireless Sensor Networks: A Short Survey," Electrical
and Computer Engineering, 2006. ICEC '06. International Conference on, vol., no., pp.581, 584, 19-21 Dec. 2006.
[16] Virendra Pal; Aishwarya S.; Sweta Jain; “Signal Strength based HELLO Flood Attack Detection and Prevention in
Wireless Sensor Networks,” International Journal of Computer Applications (0975 – 8887) vol. 62– No.15, January
2013.
[17] Yassein, M.B.; Al-zou’bi, A.; Khamayseh, Y.; Mardini, W.; “Improvement on LEACH protocol of Wireless Sensor
Network,” International Journal of Digital Content Technology and its Applications, vol. 3, issue 2, June 2009.
[18] Yong Wang; Attebury, G.; Ramamurthy, B., "A survey of security issues in wireless sensor
networks," Communications Surveys & Tutorials, IEEE, vol.8, no.2, pp.2, 23, Second Quarter 2006.
[19] Magotra, S.; Kumar, K., "Detection of HELLO flood attack on LEACH protocol," Advance Computing Conference
(IACC), 2014 IEEE International , vol., no., pp.193,198, 21-22 Feb. 2014.
[20] Simek M., Moravek P. and Silva J., “Wireless Sensor Networking in Matlab: Step-by-Step”, January 2010.
AUTHORS
Satwinder Kaur Saini received B.Tech degree in Computer Science Engineering from Sant Baba Bhag Singh
Institute Of Technology in 2012. She is now pursuing M.Tech degree in Computer Science (Networking
Systems) from Ambika Paul Institute of Technology (Punjab Technical University, Main Campus),
Kapurthala, Punjab, India.
Mansi Gupta received B.Tech degree from SUSCET, Mohali in 2010. She worked as Assistant Professor at
National Institute of Technology, Kurukshetra for 1 year and pursued her M.Tech degree from LPU Phagwara
during 2011-2013. Now she is working as Assistant professor at PITK, (PTU Main Campus), Kapurthala.
Volume 3, Issue 5, May 2014
Page 391
Download