DocumentCode :
504829
Title :
Detecting Sinkhole attacks in wireless sensor networks
Author :
Tumrongwittayapak, Chanatip ; Varakulsiripunth, Ruttikorn
Author_Institution :
Fac. of Eng., King Mongkut´´s Inst. of Technol. Ladkrabang, Bangkok, Thailand
fYear :
2009
fDate :
18-21 Aug. 2009
Firstpage :
1966
Lastpage :
1971
Abstract :
Presently, the wireless sensor networks (WSNs) are widely used in many areas of communication systems and its security system becomes very important. However, the security mechanism for WSNs has to be considered differently from traditional network. Firstly, there are severe constraints on WSNs devices such as minimal energy, computational and communicational capabilities. Secondly, there is an additional risk of physical attacks such as node capture and tampering. Moreover, cryptography based techniques alone are insufficient to secure WSNs. Hence, intrusion detection techniques must be designed and developed to detect the any kind of undesirable attacks. Further, these techniques should be lightweight because of resource-constrained nature of WSNs. Therefore, we present a new approach of robust and lightweight solution for detecting the sinkhole attack based on received signal strength indicator (RSSI) readings of messages. The proposed solution needs collaboration of some extra monitor (EM) nodes apart from the ordinary nodes. We use values of RSSI from four EM nodes to determine the position of all sensor nodes where the base station (BS) is located at origin position (0,0). We use this information as weight from the BS in order to detect sinkhole attack. The simulation results show that the proposed mechanism is lightweight due to the monitor nodes were not loaded with any ordinary nodes or BS. Moreover, the proposed mechanism does not cause the communication overhead.
Keywords :
telecommunication security; wireless sensor networks; RSSI; base station; communication system; extra monitor node; intrusion detection; node capture; physical attack; received signal strength indicator; security system; sinkhole attack detection; tampering; wireless sensor network; Bandwidth; Communication system security; Cryptography; Electronic mail; Intrusion detection; Monitoring; Power system security; Routing protocols; Sensor phenomena and characterization; Wireless sensor networks; detecting sinkhole attacks; intruder detection; security in wireless sensor networks; wireless sensor networks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
ICCAS-SICE, 2009
Conference_Location :
Fukuoka
Print_ISBN :
978-4-907764-34-0
Electronic_ISBN :
978-4-907764-33-3
Type :
conf
Filename :
5334764
Link To Document :
بازگشت