Nothing Special   »   [go: up one dir, main page]

Skip to main content

The Feasibility Study of Attacker Localization in Wireless Sensor Networks

  • Conference paper
Ubiquitous Computing and Multimedia Applications (UCMA 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 151))

Abstract

Wireless Sensor Networks have much vulnerability in the aspect of security because sensor nodes are limited in power, computational capabilities, and memory, and they even use a shared medium. For this reason, wireless sensor networks can be attacked easily by adversary and their attacks are mainly accomplished through channels or frequencies being used by these nodes using various attack mechanisms. Representative one of these attacks is DoS (Denial-of-Service) attack such as jamming attack, collision attack, and flooding attack. As DoS is attack which diminishes or eliminates a network’s capacity, sensor nodes must be able to prevent or detect DoS attack. Mechanisms corresponding to this have been studied. No work, however, can cover these attacks because there are so many attack patterns and trade-offs between performance and accuracy. In this paper, we present a simple approach which can detect attack’s location as fast as possible using CCA (Clear Channel Assessment) value. For this, we do the feasibility study for our approach through the experiment using TinyOS mica2 nodes. In addition to, we suggest new some alternatives through this study. As its result, we can speculate that the rate of false alarm is high but the detection time may be reduced in detecting attack’s location.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. ITU-T: Distributed Computing: Utilities, Grids & Clouds. ITU-T Technology Watch Reports, International Telecommunication Union (2009)

    Google Scholar 

  2. Akyildiz, L., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A Survey on Sensor Networks. Communications Magazine 40(8), 102–114 (2002)

    Article  Google Scholar 

  3. Kuorilehto, M., Hannikainen, M., Hamalainen, T.: A Survey of Application Distribution in Wireless Sensor Networks. EURASIP Journal on Wireless Communications and Networking 5(5), 774–788 (2005)

    MATH  Google Scholar 

  4. Yick, J., Mukherjee, B., Ghosal, D.: Wireless sensor network survey. Computer Networks: Int’l Journal of Computer and Telecommunications Networking (ACM) 52(12), 2292–2330 (2008)

    Article  Google Scholar 

  5. Wood, A., Stankovic, J.: Denial of Service in Sensor Networks. Computer 35(10), 54–62 (2002)

    Article  Google Scholar 

  6. Raymond, D., Midkiff, S.: Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses. In: Pervasive Computing, pp. 74–81. IEEE, Los Alamitos (2008)

    Google Scholar 

  7. Xu, W., et al.: The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks. In: MobiHoc 2005: Proc. 6th ACM Int’l. Symp. Mobile Ad Hoc Net. and Comp., pp. 46–57 (2005)

    Google Scholar 

  8. Law, Y., et al.: Link-Layer Jamming Attacks on S-Mac. In: Proc. 2nd Euro. Wksp. Wireless Sensor Networks, pp. 217–225 (2005)

    Google Scholar 

  9. Xu, W., Ma, K., Trappe, W., Zhang, Y.: Jamming Sensor Networks: Attack and Defenses Strategies: IEEE Network, 41–47 (2006)

    Google Scholar 

  10. Han, S., Chang, E., Gao, L., Dillon, T.: Taxonomy of Attacks on Wireless Sensor Networks. In: Proc. of the First European Conference on Computer Network Defence (EC2ND 2005), pp. 97–105. Springer, Heidelberg (2005)

    Google Scholar 

  11. Reindl, P., Nygard, K., Du, X.: Defending Malicious Collision Attacks in Wireless Sensor Networks. In: IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, pp. 771–776. IEEE, Los Alamitos (2010)

    Google Scholar 

  12. Kulkarni, R., Venayagamoorthy, G., Thakur, A., Madria, S.: Generalized Neuron Based Secure Media Access Control Protocol for Wireless Sensor Networks. In: Proc. of Computational Intelligence in Miulti-criteria Decision-making, pp. 16–22. IEEE, Los Alamitos (2009)

    Google Scholar 

  13. CERT Coordination Center: Smurf IP denial-of-service attacks. Technical report, CERT Advisory CA-98:01 (1998)

    Google Scholar 

  14. Aura, T., Nikander, P.: Stateless connections. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol. 1334, pp. 87–97. Springer, Heidelberg (1997)

    Chapter  Google Scholar 

  15. Singh, V., Jain, S., Singhai, J.: Hello Flood Attack and its Countermeasures in Wireless Sensor Networks. International Journal of Computer Science Issues 11, 23–27 (2010)

    Google Scholar 

  16. Perrig, W., Stankovic, J., Wagner, D.: Security in Wireless Sensor Networks. Communication of the ACM 47(6), 53–57 (2004)

    Article  Google Scholar 

  17. Hu, N., Smith, R., Bradford, P.: Security for fixed sensor networks. In: ACM Southeast Regional Conference, pp. 212–213 (2004)

    Google Scholar 

  18. Yang, H., Ye, F., Yuan, Y., Lu, S., Arbaugh, W.: Toward resilient security in wireless sensor networks. In: Proc. of ACM Sym. on Mobile Ad Hoe Networking and Computing, pp. 34–45 (2005)

    Google Scholar 

  19. Li, Z., Trappe, W., Zhang, Y., Nath, B.: Robust Statistical Methods for Securing Wireless Localization in Sensor Networks. In: Proc. International Symposium on Information Processing in Sensor Networks, pp. 91–98. IEEE, Los Alamitos (2005)

    Google Scholar 

  20. Olariu, S., Xu, Q.: Information assurance in wireless sensor networks. In: Proc. of the 19th IEEE International Parallel and Distributed Processing Symposium. IEEE, Los Alamitos (2005)

    Google Scholar 

  21. Engstrom, J., Gray, C.: Clear Channel Assessment in Wireless Sensor Networks. In: Proc. of the 46th Annual Southeast Regional Conference (ACM-SE 2008), pp. 464–468. ACM, New York (2008)

    Chapter  Google Scholar 

  22. Ramachandran, I., Roy, S.: Clear Channel Assessment in Energy-Constrained Wideband Wireless Networks. IEEE Wireless Communications, 70–78 (2007)

    Google Scholar 

  23. Ramachandran, I., Roy, S.: On the Impact of Clear Channel Assessment on MAC Performance. In: Proc. of Global Telecommunications Conference, pp. 1–5. IEEE, Los Alamitos (2006)

    Google Scholar 

  24. Culler, D.: TinyOS: Operating System Design for Wireless Sensor Networks. Sensors (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, YJ., Song, S. (2011). The Feasibility Study of Attacker Localization in Wireless Sensor Networks. In: Kim, Th., Adeli, H., Robles, R.J., Balitanas, M. (eds) Ubiquitous Computing and Multimedia Applications. UCMA 2011. Communications in Computer and Information Science, vol 151. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-20998-7_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-20998-7_23

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-20997-0

  • Online ISBN: 978-3-642-20998-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics