Safety in WSN - TypesOfAttacksAndSolutions
Safety in WSN - TypesOfAttacksAndSolutions
Safety in WSN - TypesOfAttacksAndSolutions
Studies in Informatics and Control, Vol. 22, No. 3, September 2013 http://www.sic.ici.ro 323
Section 2 analyzes the security requirements; how long the message must continue
section 3 shows the different types of security being confidential.
attacks and their impact on the wireless
4. Availability: It encompasses the access to
sensors; section 4 describes some proposed
the information and to the systems by
designs and security solutions used for WSNs;
authorized persons at the time when they
section 5 provides a security approach based on
need it. The introduction of encryption
the layers of the OSI Reference Model; and
algorithms in the wireless sensor networks
finally section 6 gives the conclusions of this
makes them more costly. Whichever
research work.
method is implemented, it increases
processing time, which finally involves
2. Security Requirements greater energy consumption, greatly
threatening the availability of the network.
WSN networks were initially designed for
military purposes, so their field of work was in 5. Data Refreshing: Although the
hostile environments from the beginning. Each confidentiality and the integrity of the data
sensor node is constantly open so they are are ensured, guaranteed message updating
susceptible to attack. The information that is also required. Data refreshing implies
travels through the node has a high probability that the data are up-to-date therefore it is
of being stolen, decoded and used against it. important to ensure that an adversary node
has not replaced the current message by an
The security requirements of a wireless sensor old one.
network [1] can be classified as follows:
1. Authentication: Authentication of 3. Types of Security Attacks on WSNs
messages is fundamental for the different
applications in WSNs, preventing an Table 1 shows the types of attacks, and their
attacker from cloning a node or extracting main characteristics, that can invade a Wireless
password information to send malware to Sensor Network. Attacks on WSNs can be
the network. Therefore, it is necessary to considered from two standpoints: one is the
generate mechanisms that allow the nodes attack to the security mechanisms, and the
to authenticate the information received, other is an attack on the basic mechanisms
which is possible by means of the (routing mechanisms) [2], [3], [4], [5], and [38]
validation of the identity of the as indicated below:
transmitting node.
As seen in Table 1, the attacks can be classified
2. Integrity: This is the property that aims to according to the different modes of action:
keep the data free from unauthorized
Attack techniques:
modifications. Integrity consists in keeping
the accuracy of the information exactly as The attacker can listen to the transmitted
it was generated, without it being packets to analyze the traffic or the
manipulated or altered by unauthorized cryptography.
persons or processes. Data Authentication The attacker can introduce false packets in
can also provide Data Integrity. the network to confuse the sensor network.
3. Confidentiality: Data confidentiality The attacker can introduce malicious nodes
refers to protection of the data as well as to modify the packets received before
of the information exchanged between an resending them.
emitting node and one or more addresses
from third parties. Guaranteeing it requires Node compromise:
a mechanism for communication An attacker can capture a sensor node and
enciphering and occultation. Digitally, the extract all its secrets to use them in the
confidentiality of a document can be security protocols.
maintained through the use of asymmetric
Often, the attacker is not interested in the
keys. The enciphering mechanisms
content of the data, but rather in the
guarantee the confidentiality during the
interference of communications between
time needed to decipher the message. For
the nodes.
that reason it is necessary to determine
324 http://www.sic.ici.ro Studies in Informatics and Control, Vol. 22, No. 3, September 2013
Table 1. Main Attacks and their Characteristics.
Attacks Characteristics
DoS (Denial of Service) - Produced by the unintentional action of nodes or the action of an
[6] [7],[8] attacker.
Attacks on the in transit - They alter, falsify and repeat the information in transit to the
information [9] [10] source.
- They take control of one node and are capable of manufacturing
new falsified packets.
- Their scope can be over several sensor nodes at the same time.
Sybil attack [11] [13] - An attacker takes the identical characteristics of another node to
become involved in the network
- This attack tries to degrade the integrity of the data, of the security
and the use of the resources that the algorithm of is accessible
through the stolen sensor.
- Attacks the distributed storage, routing mechanisms and data
aggregation.
- When attacked, the network can fight back with strong protocols.
Backhole/Sinkhole - One node acts as a black hole to attract the whole group of sensor
Attack [14] [15] nodes.
- When the malicious node intercepts the communication nodes, it
can do anything with them.
Attack Hello Flood [16] - The attacker uses greetings packets to attract and convince the
[17] nodes.
- The nodes are convinced that the attacker is its neighbor.
- Once the nodes send the packet to the receiver, they must pass
through the attacker, intercepting the packets and doing what they
want it to do.
Wormhole Attack [18], - In this critical attack, the attacker saves the packets in a network
[19] address and the tunnels in another.
- It is a significant threat, because it can occur at the beginning, when
the sensor nodes are just finding out about the neighboring sensors.
Studies in Informatics and Control, Vol. 22, No. 3, September 2013 http://www.sic.ici.ro 325
Table 2. Summary of different Security Methods applied to Wireless Sensor Networks
326 http://www.sic.ici.ro Studies in Informatics and Control, Vol. 22, No. 3, September 2013
Table 2 shows a revision of various proposed radiofrequency transceptor, the signal's
or implemented security methods based on the energy consumption, and the selection of
type of WSN attack [5], and their access channels. Its objective is to increase
main characteristics. reliability, while subsequently reducing
loss. The most frequent types of attacks
The main idea followed by the Wireless Sensor
are DoS.
Networks in the matter of security is to have an
integral approach, so as to improve the Table 3 presents a synthesis of the possible
performance of the networks with respect to attacks that can appear in the different layers of
security, longevity and interconnectivity under the OSI Reference Model of a Wireless Sensor
the changing environmental conditions. Network [1], [32], [33]:
Table 3. Possible attacks on the WSN layers.
5. Security Approach based on
WSN Layer Types of attacks
The Layers of the OSI
Physical Denial of Service (DoS)
Reference Model Data link Jamming
Collision
It is important to carry out a holistic approach
to security in which the OSI Reference Model Network Denial of Service (DoS)
Wormhole
layers participate to guarantee the network's
Sinkhole
overall security. Therefore we have that: Sybil
- In the application layer: The data are Hello flood
collected and administered in the Application Malicious node
application layer; it is important to ensure Desynchronization
the reliability of the data and to transmit
them to the lower levels. One of the 6. Conclusions
problems that can arise is a security
attack on the desynchronization of the Most security attacks in WSNs are caused by the
data transfer. insertion of false data by the compromised
- In the network layer: It is in charge of nodes within the network. This paper presents
identifying the existing routing between the requirements, the different types of security
one or more networks. The objective of attacks, a review of state-of-the-art main security
this layer is to make the data arrive methods proposed or implemented in Wireless
from their origin to their destination, even Sensor Networks, and a security approach based
when both are not directly connected. on the layers of the OSI Reference Model, in
Its aim is to find the best route, making Wireless Sensor Networks.
use of efficient routing algorithms. The
kinds of attacks that can occur in this layer Acknowledgements
are often Wormhole, Sinkhole, Sybil and
Hello Flood. This research was done with the financial
contribution of project DICYT USACH Code
- In the data link layer: This layer is in 061213KC Design and implementation of an
charge of physical addressing of the IWSN (Industrial Wireless Sensor Network)
network's topology, access to the medium, Tolerant to Faults, Energy Efficient, and with
error detection and/or correction, ordered High Security.
mesh distribution, and flow control. This
layer is vulnerable to Jamming and
Collisions attacks that cause collision of
packets and therefore shorter useful life of
the battery by having to retransmit the
packets, generating confusion in the
neighbouring nodes.
- In the physical layer: It is in charge of
providing the data transmission service
over the medium and also controlling the
Studies in Informatics and Control, Vol. 22, No. 3, September 2013 http://www.sic.ici.ro 327
REFERENCES 9. JIA, G., F. JIAN'AN, X. CHEN, Survey on
Secure Data Aggregation for Wireless
1. JAIN, A., K. K. KANT, M. R. Sensor Networks, IEEE International
TRIPATHY, Security Solutions for Conference on Service Operations,
Wireless Sensor Networks, Second Logistics and Informatics (SOLI), 2011,
International Conference on Advanced pp.138-143.
Computing & Communication 10. PFLEEGER, C. P. S. L. PFLEEGER,
Technologies (ACCT), 2012, pp. 430-433. Security in Computing, 3rd edition,
2. MODARES, H., R. SALLEH, A. Prentice Hall 2003.
MORAVEJOSHARIEH, Overview of 11. CHEN, S., G. YANG, S. CHEN, A
Security Issues in Wireless Sensor Security Routing Mechanism Against
Networks, Third International Conference Sybil Attack for Wireless Sensor
on Computational Intelligence, Modelling Networks, International Conference on
and Simulation (CIMSiM), 2011, Communications and Mobile Computing
pp. 308-311. (CMC), Vol. 1, 2010, pp. 142-146.
3. SHARMA K., M. K. GHOSE, D. 12. YI, S., C. YONGFENG, T. LIANGRUI, A
KUMAR, R. PEEYUSH KUMAR, Multi-phase Key Pre-distribution
SINGH, V. KUMAR PANDEY, A Scheme based on Hash Chain, 9th
Comparative Study of Various Security International Conference on Fuzzy Systems
Approaches Used in Wireless Sensor and Knowledge Discovery (FSKD), 2012,
Networks. In IJAST, vol. 7, April 2010. pp. 2061-2064.
4. JAYDP, S., A Survey on Wireless Sensor 13. NEWSOME, J., E. SHI, D. SONG, A.
Network Security, Technical Report 55- PERRIG, The Sybil Attack in Sensor
77, International Journal of Networks: Analysis & Defences,
Communication Networks and Proceedings of the Third International
Information Security (IJCNIS) Vol. 1, N2 Symposium on Information Processing in
August 2009. Sensor Networks, ACM, 2004,
5. PATHAN, A. S. K. H.-W. LEE, C. S. pp. 259-268.
HONG, Security in Wireless Sensor 14. SHARMILA, S., G. UMAMAHESWARI,
Networks: Issues and Challenges, The Detection of Sinkhole Attack in Wireless
8th International Conference on Advanced Sensor Networks Using Message Digest
Communication Technology, ICACT 2006, Algorithms, International Conference on
vol. 2, 2006, pp. 1043-1048. Process Automation, Control and
6. DAOJING, H., C. CHEN; CHAN, S. Computing (PACC), 2011, pp. 1-6.
JIAJUN BU, DICODE, DoS-Resistant 15. CULPEPPER, B. J. H. C. TSENG,
and Distributed Code Dissemination in Sinkhole Intrusion Indicators in DSR
Wireless Sensor Networks, IEEE MANETs, Proceedings of the First
Transactions on Wireless Communications, International Conference on Broadband
vol. 11, Issue 5, 2012, pp. 1946-1956. Networks, 2004, pp. 681-688.
7. OUYANG, X., T. BIN, L. QI, Z. JIAN-YI, 16. WANG, W., J. XU, J. WANG, Detection
H. ZHENG-MING, X. YANG, A Novel and Location of Malicious Nodes based
Framework of Defence System Against on Source Coding and Multi-path
DoS Attacks in Wireless Sensor Transmission in WSN, 11th IEEE
Networks, 7th International Conference on International Conference on High
Wireless Communications, Networking and Performance Computing and
Mobile Computing (WiCOM), 2011, Communications, 2009, pp. 458-463.
pp. 1-5.
17. KARLOF, C., D. WAGNER, Secure
8. WANG, B-T. H. SCHULZRINNE, An IP Routing in Wireless Sensor Networks:
traceback mechanism for reflective DoS Attacks and Countermeasures, Elsevier's
attacks, Canadian Conference on Electrical Ad Hoc Network Journal, Special Issue on
and Computer Engineering, Volume 2, 2-5 Sensor Network Applications and
May 2004, pp. 901-904. Protocols, September 2003, pp. 293-315.
328 http://www.sic.ici.ro Studies in Informatics and Control, Vol. 22, No. 3, September 2013
18. HARBIN, J., P. MITCHELL, D. PEARCE, 26. ESCHENAUER, L., V. D. GLIGOR, A
Wireless Sensor Network Wormhole Key-management Scheme for
Avoidance using Reputation-based Distributed Sensor Networks,
Routing, 7th International Symposium on Proceedings of ACM CCS'02, 18-22
Wireless Communication Systems November 2002, pp. 41-47.
(ISWCS), 2010, pp. 521-525.
27. KARAKEHAYOV, Z., Using REWARD
19. TRIKI, B., S. REKHIS, N. BOUDRIGA, to Detect Team Black-hole Attacks in
Digital Investigation of Wormhole Wireless Sensor Networks, in Workshop
Attacks in Wireless Sensor Networks. on Real-World Wireless Sensor Networks
Eighth IEEE International Symposium on (REALWSN'05), 20-21 June, 2005,
Network Computing and Applications, Stockholm, Sweden.
2009, pp. 179-186.
28. MOON, M., D. S. KIM, JONG SOU
20. XUAN, Y., Y. SHEN. N. P. NGUYEN, M. PARK, Toward Modelling Sensor Node
T. THAI, A Trigger Identification Security Using Task-Role Based Access
Service for Defending Reactive Jammers Control with TinySec, Conference on
in WSN, IEEE Transactions on Mobile Computational Intelligence and Security,
Computing, vol. 11, Issue 5, 2012, vol. 2, 2006, pp. 1109-1112.
pp. 793-806.
29. KARLOF, C., N. SASTRY, D. WAGNER,
21. MAHMOOD, A. R., H. H. ALY, M. N. TinySec: A Link Layer Security
EL-DERINI, Defending Against Energy Architecture for Wireless Sensor
Efficient Link Layer Jamming Denial of Networks, 2 International Conference on
Service Attack in Wireless Sensor Embedded Networked Sensor Systems,
Networks, 9th IEEE/ACS International Baltimore, MD, USA, 2004, pp. 162-175.
Conference on Computer Systems and
30. LI, Y., F. LIU, L. DING, Research about
Applications (AICCSA), 2011, pp. 38-45.
Security Mechanism in Wireless Sensor
22. HAMID, M. A., M.-O. RASHID, C. S. Network, International Conference on
HONG, Routing Security in Sensor Image Analysis and Signal Processing
Network: Hello Flood Attack and (IASP), 2011, pp. 447-451.
Defence, to appear in IEEE ICNEWS
31. YEO, D.-G., H.-Y. YOUM, An TESLA
2006, 2-4 January, Dhaka.
Protocols with Multi-senders Based on a
23. SLIJEPCEVIC, S., M. POTKONJAK, V. 2-Level XOR Chain with Data-Loss, 10th
TSIATSIS, S. ZIMBECK, M. B. International Symposium on Tolerance
SRIVASTAVA, On Communication Applications and the Internet (SAINT),
Security in Wireless Ad-hoc Sensor 2010, pp. 269-272.
Networks, 11th IEEE International
32. PANDEY, A., R. C. TRIPATHI, A Survey
Workshops on Enabling Technologies:
on Wireless Sensor Networks Security,
Infrastructure for Collaborative Enterprises,
International Journal of Computer
10-12 June 2002, pp.139-144.
Applications, Vol. 3, N 2, June 2010, pp.
24. DU, W., J. DENG, Y. S. HAN, P. K. 43-49.
VARSHNEY, A Pairwise Key Pre-
33. KASCHEL, H., Y. B. L. SANCHEZ, J.
distribution Scheme for Wireless Sensor
MARDONES, G. QUEZADA, Modelling
Networks, Proceedings of the 10th ACM
Sensor Node Security Using Task-Role
Conference on Computer and
based Access Control with TinySec,
Communications Security, 2003, pp. 42-51.
Studies in Informatics and Control Journal.
25. CHAN, H, A. PERRIG, D. SONG, Vol. 20, N 3, September 2011,
Random Key Predistribution Schemes pp. 285-292.
for Sensor Networks, In IEEE Symposium
on Security and Privacy, Berkeley,
California, May 11-14 2003, pp. 197-213.
Studies in Informatics and Control, Vol. 22, No. 3, September 2013 http://www.sic.ici.ro 329