검색 상세

DACRA: A LIGHT WEIGHT HYBRID APPROACH to DEFEND against CRIPPLING ROUTING ATTACKS in WIRELESS SENSOR NETWORKS

초록/요약

Ubiquitous wireless sensor networks are networks consisting of several small computers operational with sensors to discover events like human movement with infrared sensors or resolve the existing state of certain parameters like temperature. These sensor nodes are assembled with a radio to commune with each other and to broadcast data to a central computer where this data can be analyzed. These new sensing computing machines come with new challenges. To eliminate the limitations imposed by wires, sensors possess limited energy sources and correspond with neighboring nodes using wireless networks. Due to critical nature of applications, securing data generated in sensor field by sensors is important. While data security is necessary, the functionality cost in terms of routing and energy needs to be assessed carefully. Limited bandwidth and memory pull the trigger to make more sophisticated and light weight cryptography models. Moreover, deployment of tiny devices like sensor nodes in hostile environment, make it easier for intruder to budge in, plant attack node or control over the legitimate node to launch an attack. In this thesis, we have analyzed the basic threat model in ubiquitous wireless sensor network (USWN), and presented a quad tree based network portioning scheme, which ensure data accuracy at primary level. Each sensor node maintains neighboring table which stores the node information, our neighbor voting based defense solution helps to authenticate clear text broadcast of control packets. Once we have identified malicious node, our localization scheme can highlight the vulnerable node locality, even most of anchors are compromised. Localization scheme also helped us to strengthen defense against Sybil attack and wormhole attack. We analyze security of proposed scheme against Hello flood, data authentication attacks, node cloning attack and routing attacks. In the existing scenarios, where diverse security services are independent from each other, each service adds an additive communication overhead. By incorporating energy-concentrated security services that are regularly required in sensor network applications, we considerably decrease the energy.

more

목차

Chapter 1: INTRODUCTION 1
1.1. Motivation 2
1.1.1. Approach 3
1.1.2. Analysis of Scheme 3
1.2. Thesis Contribution 4
1.3. Organization of Thesis 8
Chapter 2: BACKGROUND AND RELATED WORK 10
2.1 Background Study 10
2.1.1 Constraints in Wireless Sensor Networks 10
2.1.2 Security Goals 24
2.3 Attacks on Wireless Sensor Network 26
2.2 Related Work 30
2.2.1 Malicious Hello Flooding 30
2.2.2 Selective Forwarding 31
2.2.3 Sybil Attack 34
2.2.4 Network Portioning and Routing Algorithm 36
2.2.5 Localization Resilient Defense 42
CHAPTER 3: ASSUMPTIONS AND NETWORK MODELS 51
3.1 Assumptions 51
3.2 Network Model 52
3.2.1 Quadratic Neighbor Finding Algorithm 55
3.2.2 Quad Tree Merge Criteria 56
CHAPTER 4: PROPOSED SCHEME 59
4.1 Witness based authentication 59
4.1 Control Packet Broadcast Authentication 59
4.2 Defense against Wormhole attack using localization scheme 63
4.2.1 Quad Localization 65
4.2.2 Defense against Wormhole attack 71
CHAPTER 5: EVALUATION 74
CONCLUSION 93

more