Secure Routing Mechanism to Defend Multiple Attacks in Sensor Networks

무선 센서 네트워크에서 다중 공격 방어를 위한 보안 라우팅 기법

  • Moon, Soo-Young (School of Information and Communication Engineering, Sungkyunkwan University) ;
  • Cho, Tae-Ho (School of Information and Communication Engineering, Sungkyunkwan University)
  • 문수영 (성균관대학교 정보통신공학부) ;
  • 조대호 (성균관대학교 정보통신공학부)
  • Received : 2009.12.14
  • Accepted : 2010.01.30
  • Published : 2010.03.30

Abstract

Sensor Networks are composed of many sensor nodes, which are capable of sensing, computing, and communicating with each other, and one or more sink node(s). Sensor networks collect information of various objects' identification and surrounding environment. Due to the limited resources of sensor nodes, use of wireless channel, and the lack of infrastructure, sensor networks are vulnerable to security threats. Most research of sensor networks have focused on how to detect and counter one type of attack. However, in real sensor networks, it is impractical to predict the attack to occur. Additionally, it is possible for multiple attacks to occur in sensor networks. In this paper, we propose the Secure Routing Mechanism to Defend Multiple Attacks in Sensor Networks. The proposed mechanism improves and combines existing security mechanisms, and achieves higher detection rates for single and multiple attacks.

센서 네트워크는 이벤트 감지와 통신 기능이 있는 다수의 센서 노드들과 하나 이상의 싱크 노드들로 이루어진 시스템이다. 센서 네트워크는 배치된 지역에 있는 사물의 인식 정보와 주변의 환경 정보를 수집하여 사용자에게 제공한다. 센서 노드의 자원 제약과 무선통신 사용, 기반 시설의 부재로 인해 센서 네트워크는 여러 보안 위협에 취약하다. 센서 네트워크 보안과 관련한 대부분의 기존 연구는 한 가지 공격을 탐지하고 방어하는 것을 목표로 진행되어왔다. 그러나 실제 센서 네트워크에서는 언제 어떠한 공격이 발생할 지 미리 예측할 수 없으며 동시에 여러 가지 공격이 함께 발생할 가능성도 존재한다. 본 논문에서는 센서 네트워크에서 발생 가능한 공격인 허위 보고서 공격과 웜홀 공격을 방어할 수 있는 보안 라우팅 기법을 제안한다. 제안 기법은 기존 보안 기법을 개선 및 결합함으로써 실험 결과 기존 기법보다 높은 공격 검출 성능을 보인다.

Keywords

References

  1. Akyildiz, I. F., W. Su, Y. Sankarasubramaniam and E. Cayirci, "A Survey on Sensor Networks", IEEE Communications Magazine, Vol.40, No.8(2002), 102-116. https://doi.org/10.1109/MCOM.2002.1024422
  2. Al Karaki, J. N. and A. E. Kamal, "Routing techniques in wireless sensor networks : a survey", IEEE Wireless Communication Magazine, Vol.11, No.6(2004), 6-28. https://doi.org/10.1109/MWC.2004.1368893
  3. Karlof, C. and D. Wagner, "Secure Routing in Wireless Sensor Networks : Attacks and Countermeasures", Elsevier, Elsevier's Ad Hoc Networks Journal, Special Issue on Sensor Network Protocols and Applications, Vol.1, No.2-3(2003), 293-315.
  4. Djenouri, D., L. Khelladi and N. Badache, "A Survey of Security Issues in Mobile Ad Hoc and Sensor Networks", IEEE Communications Surveys and Tutorials, Vol.7, No.4(2005), 2-28. https://doi.org/10.1109/COMST.2005.1593277
  5. Ye, F., H. Luo, and S. Lu, "Statistical en route filtering of injected false data in sensor networks", IEEE Journal on Selected Areas in Communications, Vol.23, No.4(2005), 839-850. https://doi.org/10.1109/JSAC.2005.843561
  6. Nghiem, P. T. and T. H. Cho, "A fuzzy based interleaved multi-hop authentication scheme in wireless sensor networks", Journal of Parallel and Distributed Computing, Vol.69, No.5(2009), 441-450. https://doi.org/10.1016/j.jpdc.2009.01.007
  7. Lee, H. Y. and T. H. Cho, "Fuzzy Based Path Selection Method for Improving the Detection of False Reports in Sensor Networks", IEICE Trans. Inf. and Syst., Vol.E92 D,No.8(2009), 1574-1416. https://doi.org/10.1587/transinf.E92.D.1574
  8. Sun, C. I., H. Y. Lee and T. H. Cho, "A Path Selection Method for Improving the Detection Power of the Statistical Filtering in Sensor Networks", Journal of Information Science and Engineering, Vol.25, No.4 (2009), 1163-1175.
  9. Lee, H. Y. and T. H. Cho, "Fuzzy Adaptive Selection of Filtering Schemes for Energy Saving in Sensor Networks", IEICE Trans. Comm., Vol.E90 B, No.12(2007), 3346-3353. https://doi.org/10.1093/ietcom/e90-b.12.3346
  10. Zhu, S. "Interleaved hop by hop authentication against false data injection attacks in sensor networks", ACM Transactions on Sensor Networks(TOSN), Vol.3, No.3(2007), 1-33. https://doi.org/10.1145/1210669.1210670
  11. Li, F. and J. Wu, "A Probabilistic Voting based Filtering Scheme in Wireless Sensor Networks", IWCMC '06(2006), 27-32.
  12. Choi, H. M. and T. H. Cho, "Energy Efficient MAC Length Determination Method for Statistical En Route Filtering using Fuzzy Logic", Lecture Notes in Computer Science, Springer Verlag, LNCS 5754, (2009), 686-695.
  13. 전효진, 이건희, 김동규, 서정택, 손기욱, "애드혹 네트워크에서의 이웃노드 정보를 이용한 웜홀 탐지", 2006년도 한국정보과학회 가을 학술발표논문집, Vol.33, No.2(C)(2006), 586-591.
  14. Hu, Y. C., A. Perrig, and D. B. Johnson, "Wormhole Attacks in Wireless Networks", IEEE Journal on Selected Areas in Communications, Vol.24, No.2(2006), 370-380.
  15. Madria, S. and J. Yin, "SeRWA : A secure routing protocol against wormhole attacks in sensor networks", Ad Hoc Networks, Vol.7, No.6(2009), 1051-1063. https://doi.org/10.1016/j.adhoc.2008.09.005
  16. Yun, J-H., I-H. Kim, J-H. Lim and S-W. Seo, "WODEM : Wormhole Attack Defense Mechanism in Wireless Sensor Networks", Lecture Notes in Computer Science (LNCS), Vol.4412(2007), 200-209.
  17. Hill, J., R. Szewczyk, A. Woo, S. Hollar, D. Culler and K. Pister, "System Architecture Directions for Networked Sensors", in Proc. ASPLOS(2000), 93-104.
  18. Xbow sensor networks, http://www.xbow.com.