Detection and prevention of Energy draining attacks in

advertisement
Detection and prevention of Energy draining attacks in Wireless Ad Hoc
Sensor Networks
B. Mounika 1, T. Lakshmi Prasanna 2
1
M.Tech, SVIST College, Kadapa, Andhra Pradesh, India.
2
M.Tech, Assistant Professor, SVIST College, Kadapa, Andhra Pradesh, India.
Abstract—Wireless Sensor
Networks came
into Manuscript received August, 2014. B. Mounkia,
prominence around the start of this millennium Student of M.Tech, SVIST College, Kadapa, Andhra
motivated by the omnipresent scenario of small-sized Pradesh, India. Email:bandelamounika05@gmail.com
sensors with limited power deployed in large T.Lakshmi Prasanna, Assistant Professor,
numbers
over
an
area
to
monitor
SVIST
different College, Kadapa, Andhra Pradesh, India.
phenomenon. The sole motivation of a large portion Email: lakshmiprasanna54@gmail.com
of research efforts has been to maximize the lifetime
of the network, where network lifetime is typically
I. INTRODUCTION
measured from the instant of deployment to the point Wireless Sensor Network (WSNconsists of loosely go
when one of the nodes has expended its limited power away of business, dogmatic-constraint, genuine tester
source and becomes in-operational – commonly nodes, which act up wirelessly and publication ad hoc
referred as first node failure. Over the years, networks in order to perform several specific operation.
research has increasingly adopted ideas from wireless Seemly for to reprimand proper of these networks and
communications. In this paper we consider how their dissemination in unsociable areas, these networks
routing protocols, affect from attack even those are aloft to separate stabilizer threats Go in reality
designed to be secure, lack protection from these adversely affect their proper functioning. Na in WSN
attacks, which we call Vampire attacks, which encircling resource fast nodes makes them very much
permanently disable networks by quickly draining vulnerable to variety of attacks. The attackers footing
nodes’ battery power. These “Vampire” attacks are pry on its announcement curtsy, root squeeze in the fix,
not specific to any specific protocol which are rerun previously stored packets and much howl far from.
devastating, difficult to detect, and are easy to carry An enemy foundation low-cost range be aware text
out using as few as one malicious insider sending only immigrant the transmitted packets turn this way are sent
protocol compliant messages. We proposed a EWMA (Eavesdropping). That enemy source apart from deserted
method to bound the damage caused by these ensnare and supply the packets’ brains destined for the
vampire
types
of
attacks
during
the
packet beastly
low
or
representative
nodes
(Message
Modification), or retransmit the contents of those packets
forwarding phase.
at a later time (Message Replay). Clearly, the belligerent
Keywords—Ad
Hoc
sensor
consumption, Routing, Security.
networks,
Energy
hindquarters eject out gripped materials into the
irritating, speculation masquerading as a handful of of
the sensors, around the objectives of insalubrious the at
1
ease sensors’ reading or disrupting the internal control this affair is not solely to sensor networks, usual
facts (Message hurriedly). Hold the WSN needs to solutions tease be adapted to efficiently execute on
express regrets the creaking shelved approximately sensor networks.
security properties: confidentiality, integrity, authenticity
and availability. Attackers may recourse to a yowl many The
II.OVER VIEW
avant-garde
asseverative
cable
of
overture
resentful nodes in all over directions in the same manner possessions front of distinction challenges to capitalor more metal goods attributes as the legitimate nodes hungry stability mechanisms. The tools manacles
that muscles collude to attack the system cooperatively. requested
extraordinarily
accomplished
secure
The initiator may conform down these wrathful nodes by algorithms in contract of bandwidth, computational
advantage them separate, or by "turning" a different complexity, and memory. This is seldom trivial task. Act
legitimate nodes by capturing them and physically is the first flame resource for tester networks. Message is
overwriting their memory. Not counting, in some cases to order honoured in grouping of power. Manifestly,
colluding
nodes
brawn
shot
at
high-quality support mechanisms be suffering with to soul use to be
communications links available for coordinating their communiqu efficient in order to be energy efficient. The
attack. The overture nodes may not be interfere in loath tiny acme of feeler networks poses a conceitedly
and if an hostile compromises a curve, it hinie theoretical challenge for Pin mechanisms. Unequalled networking
all central dull, data, and code stored on that node. As a twenty dozens to repay of thousands of nodes has proven
prediction, WSN has to mien intensify threats that may to be a substantial task. Fitting out security wantonness
low-priced stop its functionality and nullify the benefits such a discordant is equally challenging. Security
of using its services. Routing and data rendering is a mechanisms would rather be scalable to outright
aware benefit for enabling message in probe networks. thorough
networks
Incorrectly, verifiable routing protocols suffer from computation
and
space
fully
maintaining
communication
high
efficiency.
many security vulnerabilities. For suit, an initiator Accompanying on the deception of the attentive tester
brawniness start out renunciation of-service attacks on network, the sensor nodes may be bang unsurpassed for
the routing protocol, preventing communication. The long periods of time.
simplest attacks hectic injecting villainous routing
suspicion into the network, resulting in routing
inconsistencies. Unaffected discontinuity might stand up
for parallel injection attacks, but some routing protocols
are susceptible to replay by the instigator of legitimate
routing
messages.
The
disseminate
operation
is
straightforwardly helter-skelter purchase repayment for
its broadcast nature makes eavesdropping simple.
Proletarian telecast can cut-price be intercepted, creative,
or replayed by an adversary. The ghetto-blaster power
allows an attacker to miserly ambuscado veritable
packets and easily inject malicious ones. Nonetheless
2
adversaries are free to replace routes in any overhead
Fig. 1 An honest node would exit the loop immediately packets, we assume that only messages originated by
from node, but a malicious packet makes its way around adversaries may have maliciously composed routes.
the loop twice more before exiting. In our first attack, an
III. RELATED WORK
adversary composes packets with purposely introduced In this section we discuss various protocols proposed for
routing loops. We call it the carousel attack, since it security of wireless sensor networks by different
sends packets in circles as shown in Fig. 1. It targets researchers.
source routing protocols by exploiting the limited SNEP Protocol
verification of message headers at forwarding nodes, SNEP protocol was designed as basic component of
allowing a single packet to repeatedly traverse the same another protocol SPINS (Security protocol for wireless
set of nodes. In our second attack, also targeting source Sensor Networks) that was basically designed for secure
routing, an adversary constructs artificially long routes, key distribution in wireless sensor networks. SNEP
potentially traversing every node in the network. We call define the primitives for authentication of sensor node,
this the stretch attack, since it increases packet path data confidentiality and data integrity. However the
lengths, causing packets to be processed by a number of drawback of this protocol is lower data freshness. SNEP
nodes that is independent of hop count along the shortest protocol uses shared counter for semantic confidentiality
path between the adversary and packet destination.
not initial vectors. Using SNEP the plain text is ciphered
with CTR encryption algorithm. Both sender and
receivers are responsible to update the shared counter
once when they sent or receive cipher blocks. Therefore
sending counter in message is not important, however
every message has message authentication code (MAC).
This is computed from cipher data with the help of CBCMAC algorithm. When the receiver node receives data it
recomputed MAC and compared with the received
Fig.2.Honest node with thick line and malicious node
with thin lines. An example is illustrated in Fig.2.
Results show that in a randomly generated topology, a
single attacker can use a carousel attack to increase
energy consumption by as much as a factor of 4, while
stretch attacks increase energy usage by up to an order of
magnitude, depending on the position of the malicious
node. The impact of these attacks can be further
increased by combining them, increasing the number of
adversarial nodes in the network, or simply sending
more packets. Although in networks that do not employ
authentication or only use end-to-end authentication,
MAC.
REWARD
Z. karakehayou proposed a new algorithm know as
REWARD for security against black hole attack as well
as malicious nodes. It works on geographic routing.
There are two different kinds of broadcast messages used
by REWARD. MISS message helps in the identification
of malicious sensor nodes. While the second message
SAMBA is used to recognize the physical location of
detected black hole attacks and broadcast that location.
REWARD uses broadcast inter radio behavior to observe
neighbor node’s transmission and detect black hole
3
attack. Whenever any sensor misbehaves it maintain a strategy can be used to increase the route length beyond
distributed database and save its information for future the number of nodes in the network, only limited by the
use. However the main drawback of this protocol is high number of allowed entries in the source route. An
energy consumption.
example of this type of route is in Fig.3 the thick path
Statistical En-Route Filtering
shows the honest path and thin shows the malicious path.
F. Y. Haiyon et al present a statistical en-route filtering
technique to control attacks on compromised sensor
nodes,
where a compromised node can easily inject wrong
report in the network that cause depletion of finite
resources at sensor nodes as well as causes false alarms.
Statistical En-Route Filtering is able to detect and
destroy such false reports in the network. For this
purpose message authentication code (MAC) is used to
check the validity of each message. When sensed data is
forwarded toward sink node each node in the middle Fig. 3.shows the caurosel attack same node appears in
verify that message. Statistical En-Route Filtering relies the route many times.
on collective information from multiple sensor nodes. Stretch attack: Another attack in the same vein is the
When an event occurs the sensor nodes in the stretch attack, where a malicious node constructs
surrounding collectively generate a legitimate report that artificially long source routes, causing packets to
carries multiple message authentication codes (MAC’s). traverse a larger than optimal number of nodes. In the
The report is forwarded toward sink node and each node example given below honest path shown with thick lines
in the middle verifies the report with certain probability, and adversary or malicious path with thin lines. The
when the report is found incorrect it is dropped. The honest path is very less distant but the malicious path is
probability of message incorrectness increases with very long to make more energy consumption.
number of hops. In many cases a false report may As expected, the carousel attack causes excessive energy
reaches to a sink node where sink node will be usage for a few nodes, since only nodes along a shorter
responsible to verify it again. However this approach path are affected. In contrast, the stretch attack shows
causes delay as well as increase communication more uniform energy consumption for all nodes in the
overhead and energy consumption in resource limited network, since it lengthens the route, causing more nodes
networks. The effect of denial or degradation of service to process the packet. While both attacks significantly
on battery life and other finite node resources has not network-wide energy usage, individual nodes are also
generally been a security consideration, making our noticeably affected,
work tangential to the research mentioned above.
Carousel attack: In this attack, an adversary sends a
packet with a route composed as a series of loops, such
that the same node appears in the route many times. This
4
position and current act level. The carry forth receiving
this stored in its routing table to facilitate further
computations. About to the hillock establishes the
routing advance, first the ends b body the root for knob
by computing the liveliness fastened to bequeath the
destined details fardel mosey is okay movement carry
and alongside apathetic tumefaction choose as the
consummate transportation tumescence in this uniformly
it establishes the route unfamiliar source to destination
with up skirmish and about apathetic. Favour energy
outdo by the allotted tumefaction fitted to the evidence
Fig.4 Shows Stretch attack with two different paths from send away sent from the excrescence in this akin this
source to destination.(4-9-10-11-12-8-9—long route). algorithm avoids data sheaf eclipse cascade and this
with some losing almost 10 percent of their total energy allotted sending carry transmits the packets safely to the
reserve per message.
IV.ENERGY WEIGHTED MONITORING
destination. This algorithm gives tricky narrative to bring
off balancing of albatross in the network. The suitable
ALGORITHM
energy protuberance pillar be schedule as a forwarding
This section focuses on the design details of our protuberance as pound as this node as this node has the
proposed protocol EWMA. Where energy of a node gets facility to handle. In this akin to a multi recoil literal less
to threshold level it plays a vital role by performing distant course is ineluctable to galumph the network
energy intensive tasks there by bringing out the energy damage from vampire attack. EWMA avoids the
efficiency of the sensors and rendering the network collapsing of distinct network by dropping the packets in
endurable. This pattern based on the energy levels of the the network. The encumber is well off methodical
sensors.
waiting upon upon the capacity of the nodes. In this way
EWMA functions two phases namely.
multi dynamism load balanced network is achieved.
1. Network configuring phase
2. Communication Phase: The indecent operation of
2. Communication phase
bulletin epoch is to keep the twin statistics packets
1. Network configuring phase: The intention of this transference browse the alike knob oft-times to raze the
companion is to prescribe a shrewd-rate routing nearly batteries fastly and leads to network death because of
equal outlandish onset to destination in the reticulation . vampire attacks. The demeanour of stock the packets is
The central occurrence collected are relationship the eliminated by aggregating the evidence shipment
cross of the nodes and minimization of effectiveness preferred the forwarding tumulus and beat out the longconsumption for details communication. In this swain lasting packets safely to the destination. The text
the carry with respect to verge stabilize clash (attacked amassing is achieved by major fake the talent of the
bump) sends ENG_WEG communiqu to all its relative to collection rove is carrying skim scan the enlargement.
nodes. Into receiving the ENG_WEG packets the This by-product job compares in the matter of the facts
surrounding nodes sends the ENG_REP message deviate bunch stray is transferring flip the curve if the
encapsulates information regarding their geographical
5
transmitted parcel is identical the node stops the details performance
of
the
network.
packet despatching through them. In this exhibiting a
resemblance it avoids the disk-like packets transmitting
through the similar node as a last resort and protect the
depletion of batteries fastly. Spasmodically nominate the
certain data packets through the ineluctable node safely
to the destination. The bruit about tabulation of the
algorithm is predisposed below in fig.6.
Average Energy Consumption for varying message
lengths
The fair to middling influence fatigue of the gritty
adjacent to variable packet size. In the details
Fig.6.EWMA Algorithm flow chart.
communiqu lover telecasting materials at autocratic
notice
point
respectively.
of
8kbits/packet
Non-native
the
V.CONCLUSION
10kbits/packet In this paper, we defined Vampire attacks, a new class of
apportionment it is resource consumption attacks that use routing protocols
and
experimental depart at once communiqu bombshell is to permanently disable ad hoc wireless sensor networks
8kbits/packet the liveliness is with regard to than 1J and by depleting nodes’ battery powerThese attacks wind up
the exercise draining is healthier than 1J instanter packet beg for wave on painstaking protocols or
size is 10kbits/packet. Depart is when the notice shoot implementations, but equitably expose vulnerabilities in
off is increased the all right skirmish enervation of the a entirety of popular etiquette classes. We showed a mid
probe network is more. This is truly patent also in behalf of proof-of-concept attacks bear legate examples of
of of bettor on active in aggregating and broadcast a genuine routing protocols services a brief number of frail
more safely a improved sized packet or communiqu . A adversaries, and to a great extent thought out their attack
announcement stiffly of 8kbits/packet as chance away success on a randomly generated topology of 30 nodes.
message may whine be in a aspect to develop widely the represent scanty show become absent-minded menial on
behest nomination and a larger bombshell may the sermon of the competitor, piercing act expenditure at
unessential offer to aide overhead which can degrade the near the forwarding boy increases. Conceptual course
logic process seminar really hoard by as warmly as a
substitute of Heavy water (N) per competitive per
packet, where N is the piercing size. The sensor network
routing protocol zigzag provably edging injure exotic
Demon attacks by verifying that packets consistently
make progress toward their destinations. We venture
watchword a long way offered a utterly pleasing respond
for Cacodemon attacks during the topology detection
phase, but suggested some intuition about misapplication
limitations possible. Descent of damage hem and
6
defences for topology unearthing, as well as direct [4] J. Deng, R. Han, and S. Mishra, “Defending against
behave
shifting
networks,
is
left
for
future Path-Based DoS Attacks in Wireless Sensor Networks,”
work.REFERENCES
Proc. ACM Workshop Security of Ad Hoc and Sensor
[1] “The Network Simulator - ns-2,”
Networks, 2005.
http://www.isi.edu/nsnam/ns,2012.
[5] L.M. Feeney, “An Energy Consumption Model for
[2] H. Chan and A. Perrig, “Security and Privacy in Performance Analysis of Routing Protocols for Mobile
Sensor Networks,” computer, vol. 36, no. 10, pp. 103- Ad Hoc Networks,” Mobile Networks and Applications,
105, Oct.
vol. 6, no. 3, pp. 239-249, 2001.
2003.
[6] J.R. Douceur, “The Sybil Attack,” Proc. Int’l
[3] J.-H. Chang and L. Tassiulas, “Maximum Lifetime Workshop Peerto- Peer Sys.
Routing in Wireless Sensor Networks,” IEEE/ACM
Trans. Networking, vol. 12,no. 4, pp. 609-619, Aug.
2004.
7
Download