12
Advances in Wireless and Mobile Communications. ISSN 0973-6972 Volume 10, Number 3 (2017), pp. 493-503 © Research India Publications http://www.ripublication.com Attacks on Wireless Sensor Networks: Review Dr. Nipin Gupta 1 , Dr. Sandeep Tayal 2 , Dr. Pankaj Gupta 3 , Deepak Goyal 4 , Monika Goyal 5 1,2 Associate Professor ECE, Vaish College of Engineering, Rohtak, Haryana, India. 3 Professor, CSE, Vaish College of Engineering Rohtak, 4 Associate Professor, CSE, Vaish College of Engineering Rohtak, 5 Assistant Professor, Vaish Mahila Mahavithyla, Rohtak, Haryana, India. Abstract Remote Sensor Networks are a Collection of Sensor nodes. Wireless sensor arrange turn out to be such a great amount of prevalent in many fields because of its usefulness i.e military, modern territory etc. Security is the essential and basic issue in the Wireless systems because of the working way of WSNs. This Paper depict the security necessities as WSNs are effectively inclined a greater number of assaults than wired systems. This paper concentrates the security assaults in WSNs that are Popular now days i.e. wormhole assault and their countermeasures in the system Layer. Keywords: Wireless Sensor Network, Security, Wormhole Attack, Black Hole Attack INTRODUCTION Remote sensor networks(WSN)[1,3]are rising as the most encouraging exploration region for scientists more than 15 past years. Wireless Sensor Networks have comprised a large number of Sensor hubs. These sensor hubs which go about as self-rulingly are appropriated over the district to break down the threatening condition conditions. Sensor hubs are inclined to failure, which make topology dynamic. Dynamic system topology can be brought about additionally by the versatility of hubs and option of couple of new hubs.

Attacks on Wireless Sensor Networks: ReviewAttacks on Wireless Sensor Networks: Review 495 Figure 2. WSN Sensor Node Components Wireless sensor systems. This paper is composed as:

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Attacks on Wireless Sensor Networks: ReviewAttacks on Wireless Sensor Networks: Review 495 Figure 2. WSN Sensor Node Components Wireless sensor systems. This paper is composed as:

Advances in Wireless and Mobile Communications.

ISSN 0973-6972 Volume 10, Number 3 (2017), pp. 493-503

© Research India Publications

http://www.ripublication.com

Attacks on Wireless Sensor Networks: Review

Dr. Nipin Gupta1, Dr. Sandeep Tayal2, Dr. Pankaj Gupta3,

Deepak Goyal4, Monika Goyal5

1,2 Associate Professor ECE, Vaish College of Engineering, Rohtak, Haryana, India.

3Professor, CSE, Vaish College of Engineering Rohtak, 4Associate Professor, CSE,

Vaish College of Engineering Rohtak, 5 Assistant Professor, Vaish Mahila

Mahavithyla, Rohtak, Haryana, India.

Abstract

Remote Sensor Networks are a Collection of Sensor nodes. Wireless sensor

arrange turn out to be such a great amount of prevalent in many fields because

of its usefulness i.e military, modern territory etc. Security is the essential and

basic issue in the Wireless systems because of the working way of WSNs.

This Paper depict the security necessities as WSNs are effectively inclined a

greater number of assaults than wired systems. This paper concentrates the

security assaults in WSNs that are Popular now days i.e. wormhole assault and

their countermeasures in the system Layer.

Keywords: Wireless Sensor Network, Security, Wormhole Attack, Black

Hole Attack

INTRODUCTION

Remote sensor networks(WSN)[1,3]are rising as the most encouraging exploration

region for scientists more than 15 past years. Wireless Sensor Networks have

comprised a large number of Sensor hubs.

These sensor hubs which go about as self-rulingly are appropriated over the district to

break down the threatening condition conditions. Sensor hubs are inclined to failure,

which make topology dynamic. Dynamic system topology can be brought about

additionally by the versatility of hubs and option of couple of new hubs.

Page 2: Attacks on Wireless Sensor Networks: ReviewAttacks on Wireless Sensor Networks: Review 495 Figure 2. WSN Sensor Node Components Wireless sensor systems. This paper is composed as:

494 Dr. Nipin Gupta et al

With the expansion in the advancement there are numerous applications where Motes

are conveyed to associate with condition and to agreeably go their information

through system to the Destination [1,2,5]. Remote sensor hubs have unreliable remote

correspondence are effectively powerless by dangers

These Sensor nodes consist of limited battery power, less memory, microprocessor,

sensor interface etc.

These dangers can be inner or outer. Dependable and secure correspondence as a

fundamental part of any remote systems administration condition, this is truly a huge

test in remote systems. The mission basic nature of sensor hubs forced many assaults,

for example,

1) Attacks on validation.

2) Attacks on information accessibility.

3) Attacks on information trustworthiness.

The organization of sensor hubs may have keen enemies meaning to seize or harm

message traded in the system. Because of this corrupt execution of system and change

the general topology of system. Thus, Security is the fundamental Aspect in

Figure 1: A typical Wireless Sensor Network

Page 3: Attacks on Wireless Sensor Networks: ReviewAttacks on Wireless Sensor Networks: Review 495 Figure 2. WSN Sensor Node Components Wireless sensor systems. This paper is composed as:

Attacks on Wireless Sensor Networks: Review 495

Figure 2. WSN Sensor Node Components

Wireless sensor systems. This paper is composed as: segment II speaks to the security

prerequisites in remote systems. Area III speaks to the requirements in remote

systems. Area IV speaks to the assaults in Wireless systems and their

countermeasures. Area V speaks to Proposer Work. Segment VI speaks to finish of

this paper.

II. SECURITY REQUIREMENTS

In remote sensor systems, physical security of sensor hubs is not allowed as they are

typically sent in threatening situations. Thusly, aggressors can without much of a

stretch trade off sensor hubs and utilize them to debase the system's execution.

Remote sensor systems show numerous one of a kind attributes and forcing different

security administrations. These security administrations shielded data and assets from

the assailants.

Security requirements Description

Data confidentiality

Data that are passed over the network should be confidential.

Public sensor information like sensor identities and public

keys should be encrypted by using cryptographic method.

Sensor readings should not be leaked to its neighbours.

Data availability

It ensures that resources and data should be easily available to

the sensor nodes. Different approaches have been proposed to

achieve this goal.

Data integrity

The data may be altered by attackers as it is traverse among

sensor nodes. So, integrity control should be implemented to

ensure that traversed data should not be altered until it

reaches to its original recipients.

Authenticity

Authentication is required for many administrative tasks.

Various authentication mechanisms such as cryptography ,

shared keys digital signature and so on must ensure that data

used in decision making process comes from legitimate and

authorized nodes.

Page 4: Attacks on Wireless Sensor Networks: ReviewAttacks on Wireless Sensor Networks: Review 495 Figure 2. WSN Sensor Node Components Wireless sensor systems. This paper is composed as:

496 Dr. Nipin Gupta et al

Self-Organization

Nodes in wireless network should be feasible in order to be

self-healing and self-organizing in any difficult situations. If

self-organization is lacking in a sensor network, the damage

resulting from an attack or even the hazardous

III. CONSTRAINTS IN WIRELESS SENSOR NETWORKS

Remote sensor arrange considered as an extraordinary sort of adhoc systems made out

of extensive no. of sensor nodes. These hubs have a few assets imperatives, for

example, memory constraints, limited vitality, unattended operations, and high

inactivity of correspondence. Because of these imperatives, the foe causes genuine

dangers to corrupt the execution of system and additionally hard to actualize the

traditional security components in WSNs [1, 2]. Keeping in mind the end goal to

upgrade the customary security components, it is important to know about the

imperatives of sensor hubs. These imperatives are clarified as:

A. Memory confinement

Sensor hubs which are reduced in size, have constrained memory space. Memory is of

two courses for sensor hubs: RAM and blaze memory. Smash is utilized to store the

computational outcome, application program [3]. Streak memory for the most part

incorporates downloading application code. It is hard to utilize high stacked security

systems in this restricted memory space.

B. Limited Energy

As vitality assume a critical part in life expectancy of sensor hub. In WSNs, sensor

hubs utilize constrained power and they are effectively demolished.

C. High Latency of Communication

Because of system clog, the issue of more prominent inertness in correspondence

happened in WSNs [3]. This high dormancy accomplish basic issue of

synchronization in security systems that depend on basic reports and key

appropriation.

D. Unattended Operations

Some sensor hubs are unattended for a drawn out stretch of time as they are spatial

dispersed on remote locale. A portion of the significant provisos to unattended Motes

are [3]:

a. Because of the organization of senor hubs in foe condition.

b. Remote administration make difficult to distinguish physical altering and battery

substitution and hubs might not have amicable cooperate with other once sent.

Page 5: Attacks on Wireless Sensor Networks: ReviewAttacks on Wireless Sensor Networks: Review 495 Figure 2. WSN Sensor Node Components Wireless sensor systems. This paper is composed as:

Attacks on Wireless Sensor Networks: Review 497

IV. ATTACKS AND THEIR COUNTER MEASURES IN WIRELESS SENSOR

NETWORKS

The above limitations may tend to increment genuine assaults on various layers in

WSNs. A portion of the layered based assaults are clarified as:

A. Physical Layer Attacks[2,3,4,6]

Physical layer is in charge of bit transmission and flag observing, recurrence choice

and soon. Physical layer assaults are sorted as dynamic assaults and inactive assaults.

Foes can do many assaults on it as all upper layer working depend on it. A portion of

the real assaults are: Jamming: it is the most well known assault that behaviors on

physical layer by assailants. It basically gives disturbance in the accessibility of

transmission media. To barrier this assault, utilize channel seeking and spread range

methods after radio correspondence.

Gadget hardening: Attackers can without much of a stretch harm or adjust sensor

physically and stop all administrations that are in advance. To protection this assault,

temper sealing approach has been presented.

B. Macintosh Layer Attacks[2]

Macintosh conventions have extraordinary hugeness that it helps in keeping up the

correspondence assets successfully. Foes can produce MAC layer recognizable proof

and disguises different elements for the different purposes. Two assaults are as per the

following:

Activity control: In the principal assault, assailant can make crashes and shamefulness

by resisting the organize rules which can additionally lead movement twisting.

Character mocking: The second assault is mindful to ridiculing the MAC layer

personalities. To safeguard these assaults, Cryptography based components and other

validation systems have been executed. Notwithstanding confirmation, others safety

efforts likewise exist, for example, code authentication, grouping checking and

position check. These countermeasures are capable to recognize the noxious hubs by

approving the code.

C. Arrange Layer Attacks[2,3,5,6]

The duty of system layer is to find goal and to discover the safe way to exchange

control parcels among hubs. Different directing conventions exist that are very basic

and simple to actualize. Because of this, aggressors can without much of a stretch

come up short the correspondence in WSNs by changing the directing data. Arrange

layer assaults are the most mainstream assaults in WSNs. Organize layer assaults can

be classified as:

C.I. Particular Forwarding Packet [2, 3, 7, 4] As its name recommend, the

aggressors tries to specifically forward bundles towards a specific hub with a specific

end goal to expel the bundles' significance. The aggressors specifically send the data

of the sensor hubs and furthermore dispose of the data from sensor hubs.

Page 6: Attacks on Wireless Sensor Networks: ReviewAttacks on Wireless Sensor Networks: Review 495 Figure 2. WSN Sensor Node Components Wireless sensor systems. This paper is composed as:

498 Dr. Nipin Gupta et al

To guard this, multi way steering can be utilized with irregular determination of way

and meshed ways which don't have two sequential connections. Different

methodologies, for example, watching hubs conduct, listening channel and utilize

affirmation components have been presented.

C.II. False Routing Path [2] False directing assaults implemented in three sorts of

assaults which can be utilized to put the enemy in course and upset the system

functionalities as:

i. Flooding directing tables: assailants can infuse the void steering data in the

systems that will in the long run involve the greater part of directing table space on

ordinary hubs. This can lead the flood issue I the steering table. For instance. In fig3.

a) speaks to the topology and steering table before this assault. On the off chance that

A was a typical hub, then S can speak with D hub. Furthermore, if A was assailant

then it sends the wrong steering data about nonexistent hubs and there is no way

amongst S and D hubs. b) speaks to the wrong topology and directing table after this

assault.

ii. Directing table harming: noxious hubs alter the steering redesigns before sending

and accepting the messages inside the system and make "harm". This assault will

coordinate activity in the wrong way and may bring about blockage and furthermore

tends to increment additionally assaults in the system.

Fig.3 (a) Topology and routing table before attack

iii. Store harming: the enemy can harm the reserve by utilizing comparative

procedures as in steering table harming.

Page 7: Attacks on Wireless Sensor Networks: ReviewAttacks on Wireless Sensor Networks: Review 495 Figure 2. WSN Sensor Node Components Wireless sensor systems. This paper is composed as:

Attacks on Wireless Sensor Networks: Review 499

Destination Path Destination Path

5 13→5 7 13→5→6→7

2 13→5→2 8 13→8

3 13→5→2→3 9 13→9

4 13→5→2→3→4 11 13→9→11

1 13→5→2→1 12 13→9→11→12

6 13→5→6 10 13→9→11→10

Fig.3 (b) Topology and routing table after attack

Destination Path Destination Path

14 13→5→2→1→4 11 13→9→11

15 13→5→2→1→15 10 13→9→11→10

16 13→5→2→16 20 13→9→20

17 13→5→2→3→17 21 13→9→11→10→21

18 13→5→2→3→4→18 22 13→9→11→10→22

19 13→9→19 25 13→9→11→25

Page 8: Attacks on Wireless Sensor Networks: ReviewAttacks on Wireless Sensor Networks: Review 495 Figure 2. WSN Sensor Node Components Wireless sensor systems. This paper is composed as:

500 Dr. Nipin Gupta et al

C.III. Wormhole Attack [2, 3, 1,] Wormhole assault is most confused assault in

WSNs which is barely to distinguish. Wormhole assault has at least two foes (built up

passage and high data transfer capacity, control assets). A.A. Pirazada and McDonald

inferred that the wormhole assault postures three ways [7]:

i. Burrowing the messages over the system layer.

ii. Long range burrow utilizing high power transmitters.

iii. Production of passage by means of wired foundation.

In wormhole assault, foe may make a high caliber between and move the entire

activity on it. The foe got messages from one area of system and passages these

messages over a low inactivity connect and replays them to the next segment of

system rather to unique goal as appeared in fig.4.

Fig.4. A Scenario of Wormhole Attack

Wormhole attack can be used to exploit the routing race conditions and more

effective even if any authentication and encryption mechanism used. Wormhole

attack is the combination of various attacks such as black hole attack, sinkhole attack

and eavesdropping.

D.I. Black hole Attack [2, 3, 6, 8] As black hole absorbs all things in it, this attack

also swallows all messages in it before receiving. It is the simplest attacks in WSNs.

By refusing to forward any message he receives, the attacker will affect all the traffic

flowing through it and may result to break the communication channel to the base

station and rest of WSNs and degrade the performance of whole network [3]. If

compromised node does not introduce itself as a sink, closer to the sink, makes more

interruptions in the network by absorbing the more traffic as shown in fig.5.

To defence this, may approaches are introduced such as geographic forwarding and

resistive routing protocol (use of systematic rerouting, this attack can be overcome

and detected).

Page 9: Attacks on Wireless Sensor Networks: ReviewAttacks on Wireless Sensor Networks: Review 495 Figure 2. WSN Sensor Node Components Wireless sensor systems. This paper is composed as:

Attacks on Wireless Sensor Networks: Review 501

D.II. Sinkhole Attack [2, 3, 6, 8] As the name suggests, the adversary create a sink

nearby the nodes. Sinkhole attacks make compromised nodes by spoofing all the

information of routing protocols and empowered by sinkhole attack. Geo-routing

protocols are resistant to sinkhole, because of naturally routed traffic through the

physical location of sinkhole, which makes difficult to lure it and elsewhere to create

it This attack can be launched without usin the encryption mechanism or

compromising any legitimate node in the network.There is a lot of work that has been

implemented in order to curb the wormhole attack and poses two methods such as

wormhole detection method(introduce various routing mechanisms to detect the

wormhole attack by using any simulation process) and wormhole prevention( to

remove wormhole completely from the network by developing various

methodologies)

Fig.5. Black Hole Attack

V. PROPOSED WORK

Our aim is to build a robust and secure mechanism for preventing the devasting

effects caused by the wormhole attack. The main objectives of this approach are as

follows: To prevent Eavesdropping, avoid packet modification, provide authentication

and confidentiality, reduce the packet overhead. This work can be performed as Route

discovery, detection of malicious nodes, secure data transmission, route maintenance.

We are using AODV protocol for all this work.

VI. CONCLUSIONS

Wireless sensor networks have gained much popularity over past few years. Security

is the biggest threat in WSNs. In this paper we describe Attacks which degrade

performance of wireless sensor network. Wormhole attacks (Most dangerous attack in

WSN) can significantly degrade the network performance and threaten network

security. Various countermeasures have been done for the detection of wormhole

Page 10: Attacks on Wireless Sensor Networks: ReviewAttacks on Wireless Sensor Networks: Review 495 Figure 2. WSN Sensor Node Components Wireless sensor systems. This paper is composed as:

502 Dr. Nipin Gupta et al

attack by using AODV Simulation to increase the robuteness and effectiveness of the

WSNs. as above explained. Hopefully by reading this paper, the readers can have a

better view on security requirements with attacks and their countermeasures at

network layer in WSNs.

REFERENCES

[1] Rohit tiwari, monika kohli, “security aspects for wireless sensor network”

international journal of engineering research & technology (ijert) vol. 1 issue

8, october – 2012

[2] Kai xing †, shyaam sundhar rajamadam srinivasan †, manny rivera †, jiang li

ffi, xiuzhen cheng †, “attacks and countermeasures in sensor networks: a

survey”, network security scott huang, david maccallum, and ding zhu du

(eds.) Pp. – - –c2005 springer

[3] Jalil jabari lotf, seyed hossein hosseininazhad ghazani, “security and common

attacks against network layer in wireless sensor networks”, j. Basic. Appl. Sci.

Res., 2(2)1926-1932, 2012 © 2012, textroad publication, issn 2090-4304,

journal of basic and applied scientific research.

[4] Al-sakib khan pathan, hyung-woo lee, choong seon hong, “security in wireless

sensor networks: issues and challenges”, international conference on

advanced computing technologies, page1043-1045, year 2006

[5] Adrian perrig, john stankovic, david wagner, “security in wireless sensor

networks” communications of the acm, page53-57, year 2004

[6] Zinaida benenson a, 1, peter m. Cholewinski b, felix c. Freiling a,

“vulnerabilities and attacks in wireless sensor networks”.

[7] Wireless sensor network security, “a survey john paul walters, zhengqiang

liang, weisong shi, and vipin chaudhary”, security in distributed, grid, and

pervasive computing yang xiao, (eds.) Pp. – - –°c 2006 auerbach publications,

crc press

[8] Chris karlof *, david wagner, “secure routing in wireless sensor networks:

attacks and countermeasures”, ad hoc networks 1 (2003) 293–315

[9] Priya maidamwar and nekita chavhan, “a survey on security issues to detect

wormhole attack in wireless sensor network”, international journal on adhoc

networking systems (ijans) vol. 2, no. 4, october 2012

[10] Xiaopei lu, dezun dong, and xiangke liao, “mds-based wormhole detection

using local topology in wireless sensor networks”, hindawi publishing

corporation international journal of distributed sensor networks volume 2012,

article id 145702, 9 pages doi:10.1155/2012/145702

Page 11: Attacks on Wireless Sensor Networks: ReviewAttacks on Wireless Sensor Networks: Review 495 Figure 2. WSN Sensor Node Components Wireless sensor systems. This paper is composed as:

Attacks on Wireless Sensor Networks: Review 503

[11] Majid meghdadi, suat ozdemir and inan giiler (2011),"a survey of wormhole-

based attacks and their countermeasures in wireless sensor network", iete

technical review, vol.28, issue.2, pp89-102

[12] Marianne azer, magdy, el-soudani, sherif el-kassas (2009)," a full image of the

wormhole attacks towards introducing complex wormhole attacks in wireless

adhoc networks”, international journal of computer science and information

security, vol.1, no.1, pp 41-52

[13] Fan-rui kong†1, chun-wen li1, 3, qing-qing ding2, guang-zhao cui3, bing-yi

cui4, “wapn: a distributed wormhole attack detection approach for wireless

sensor networks”, journal of zhejiang university science a issn 1673-565x

(print); issn 1862-1775 (online) .

[14] S.sharmila and g.uamaheshwari, “transmission time based detection of

wormhole attack in wireless sensor networks”, special issue of international

journal of computer applications (0975-8887) on iprc, august 2012.

Page 12: Attacks on Wireless Sensor Networks: ReviewAttacks on Wireless Sensor Networks: Review 495 Figure 2. WSN Sensor Node Components Wireless sensor systems. This paper is composed as:

504 Dr. Nipin Gupta et al