Countermeasure for Reinforcement Swap Attack against Directed Diffusion in Wireless Sensor Networks

Saloni, S. Sran, L. Kaur
{"title":"Countermeasure for Reinforcement Swap Attack against Directed Diffusion in Wireless Sensor Networks","authors":"Saloni, S. Sran, L. Kaur","doi":"10.1109/ACCT.2015.106","DOIUrl":null,"url":null,"abstract":"Directed Diffusion is a data centric protocol that focuses on the energy efficiency of the networks. It is interest based routing protocol in which communication occur hop-to-hop rather than end-to-end in wireless sensor networks. Hop-to-hop communication provides link diversity which helps to overcome obstacles like failure of intermediate node on communication path. Directed Diffusion protocol suffers from many attacks like suppression, cloning, path influence, selective forwarding and data tempering which degrades the performance of the network. In addition to this, reinforcement swap attack is being introduced under the path influence attack, which excludes the good route and includes the bad route in reinforcement path for routing. This attacker behavior activated/deactivated periodically to prolong the time of attack and affect the performance of network. Reinforcement swap attack is being performed by attacker in two modes: Norm mode and Halt mode. In norm mode, the attacker node alternates between behaving bad and good in the on/off cycles respectively. In halt mode the attacker fluctuates either behaves bad or put itself in sleep mode to hide its own presence in the on/off cycles. In this paper, countermeasure is being proposed for the said attack in both modes of attack. This mechanism detects malicious node on the basis of various performance metrics. In network, senor node which has the lowest value of performance metrics is considered to be malicious and kept at dead state. During the attack, the sensor nodes which have been included in the routing path by the attacker node are being placed at sleep mode.","PeriodicalId":351783,"journal":{"name":"2015 Fifth International Conference on Advanced Computing & Communication Technologies","volume":"52 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 Fifth International Conference on Advanced Computing & Communication Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ACCT.2015.106","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Directed Diffusion is a data centric protocol that focuses on the energy efficiency of the networks. It is interest based routing protocol in which communication occur hop-to-hop rather than end-to-end in wireless sensor networks. Hop-to-hop communication provides link diversity which helps to overcome obstacles like failure of intermediate node on communication path. Directed Diffusion protocol suffers from many attacks like suppression, cloning, path influence, selective forwarding and data tempering which degrades the performance of the network. In addition to this, reinforcement swap attack is being introduced under the path influence attack, which excludes the good route and includes the bad route in reinforcement path for routing. This attacker behavior activated/deactivated periodically to prolong the time of attack and affect the performance of network. Reinforcement swap attack is being performed by attacker in two modes: Norm mode and Halt mode. In norm mode, the attacker node alternates between behaving bad and good in the on/off cycles respectively. In halt mode the attacker fluctuates either behaves bad or put itself in sleep mode to hide its own presence in the on/off cycles. In this paper, countermeasure is being proposed for the said attack in both modes of attack. This mechanism detects malicious node on the basis of various performance metrics. In network, senor node which has the lowest value of performance metrics is considered to be malicious and kept at dead state. During the attack, the sensor nodes which have been included in the routing path by the attacker node are being placed at sleep mode.
针对无线传感器网络定向扩散的强化交换攻击对策
定向扩散是一种以数据为中心的协议,专注于网络的能源效率。它是基于兴趣的路由协议,在无线传感器网络中,通信发生跳对跳而不是端到端。Hop-to-hop通信提供了链路分集,这有助于克服通信路径上中间节点故障等障碍。定向扩散协议受到抑制、克隆、路径影响、选择性转发和数据回火等攻击,导致网络性能下降。此外,还引入了路径影响攻击下的强化交换攻击,将强化路径中的好路由排除在外,将坏路由纳入路由。这种攻击行为会周期性地激活/去激活,从而延长攻击时间,影响网络性能。强化交换攻击是由攻击者进行的两种模式:Norm模式和Halt模式。在规范模式下,攻击者节点在开/关周期中分别在行为不良和行为良好之间交替。在半模式下,攻击者要么表现不好,要么将自己置于睡眠模式,以隐藏自己在开/关周期中的存在。本文针对这两种攻击方式提出了相应的对策。该机制基于各种性能指标检测恶意节点。在网络中,性能指标值最低的传感器节点被认为是恶意节点,处于死态。在攻击过程中,被攻击者节点包含在路由路径中的传感器节点被置于休眠模式。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信