• DocumentCode
    2395559
  • Title

    A Provenance Based Mechanism to Identify Malicious Packet Dropping Adversaries in Sensor Networks

  • Author

    Sultana, Salmin ; Bertino, Elisa ; Shehab, Mohamed

  • Author_Institution
    Purdue Univ., West Lafayette, IN, USA
  • fYear
    2011
  • fDate
    20-24 June 2011
  • Firstpage
    332
  • Lastpage
    338
  • Abstract
    Malicious packet dropping attack is a major security threat to the data traffic in the sensor network, since it reduces the legal network throughput and may hinder the propagation of sensitive data. Dealing with this attack is challenging since the unreliable wireless communication feature and resource constraints of the sensor network may cause communication failure and mislead to the incorrect decision about the presence of such attack. In this paper, we propose a data provenance based mechanism to detect the attack and identify the source of attack i.e. the malicious node. For this purpose, we utilize the characteristics of the watermarking based secure provenance transmission mechanism that we proposed earlier and rely on the inter-packet timing characteristics after the provenance embedding. The scheme consists of three phases (i) Packet Loss Detection (ii) Identification of Attack Presence (iii) Localizing the Malicious Node/Link. The packet loss is detected based on the distribution of the inter-packet delays. The presence of the attack is determined by comparing the empricial average packet loss rate with the natural packet loss rate of the data flow path. To isolate the malicious link, we transmit more provenance information along with the sensor data. We present the experimental results to show the high detection accuracy and energy efficiency of the proposed scheme.
  • Keywords
    telecommunication network reliability; telecommunication security; watermarking; wireless sensor networks; attack presence identification; communication failure; data flow path; data provenance-based mechanism; data traffic; empricial average packet loss rate; energy efficiency; high-detection accuracy; interpacket delays; interpacket timing characteristics; legal network throughput; malicious link isolation; malicious node-link localization; malicious packet dropping adversary identification; packet loss detection; provenance embedding; resource constraints; security threat; sensor network; watermarking-based secure provenance transmission mechanism; wireless communication feature unreliability; Decoding; Delay; Distributed databases; Routing; Spread spectrum communication; Watermarking; Inter-packet Delay; Packet Dropping Attack; Provenance; Selective Forwarding Attack; Sensor Network;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Distributed Computing Systems Workshops (ICDCSW), 2011 31st International Conference on
  • Conference_Location
    Minneapolis, MN
  • ISSN
    1545-0678
  • Print_ISBN
    978-1-4577-0384-3
  • Electronic_ISBN
    1545-0678
  • Type

    conf

  • DOI
    10.1109/ICDCSW.2011.54
  • Filename
    5961507