Vampire attack in wsn

22
VAMPIRE ATTACK IN WSN: A DETECTION AND PREVENTION APPROACH AGAINST VAMPIRE Presented By: Richa Kumari

Transcript of Vampire attack in wsn

Page 1: Vampire attack in wsn

VAMPIRE ATTACK IN WSN: A DETECTION AND PREVENTION APPROACH AGAINST

VAMPIRE

Presented By:

Richa Kumari

Page 2: Vampire attack in wsn

Outline

Introduction of WSN

Security Threats

Security Requirement

Vampire Attack

Related Work

Proposed Work

Conclusion and Future Work

References

Page 3: Vampire attack in wsn

Introduction

a) Wireless Sensor Network

Sometimes WSN is also called WSAN, wireless sensor and actuator

networks. WSAN is a collection of autonomous sensors which are

distributed in a specific area to monitor environmental conditions,

such as pressure, temperature and sound etc. they co-ordinately

transfer their information over the network to a destination node.

Figure : Sensor Node Architecture

Page 4: Vampire attack in wsn

Introduction Cont’d…

b) Characteristics of WSN

• Large no of nodes: A wireless sensor network uses huge amount

of sensor nodes.

• Unreliable Communication: In WSN routing is done by using

connection-less protocol so obviously communication will be

unreliable.

• Heterogeneity of nodes: The WSN have sensor nodes with

different abilities, such as various transmission or sensing ranges,

so that network provides more resilience in distribution.

• Battery powered: The power is needed to every sensor node to

receive packet and to perform the computation on it.

• Very limited resources: Each sensor nodes in WSN have limited

resource like memory (48K Program Memory and 1M flash

storage), 16 bit 8 MHz CPU with 10K RAM.

Page 5: Vampire attack in wsn

Introduction Cont’d…

• Scalability: It is the capability of a WSN to handle a growing no.

of sensor node.

• Node for common task: Each sensor node performs some task

like collecting the information, computation and communicating

with other nodes in the network.

• In network data processing: This technique of WSN is very

common and also very important in which an intermediate node

has a special transmission function to aggregate the sensing data

from the source and pass the resultant data to sink node [14].

• Self-Organization: Due to autonomous feature of the sensor

network each nodes can organize itself during ambiguous

situations [11].

Page 6: Vampire attack in wsn

Introduction Cont’d…

c) Application of WSN

• Area monitoring: The WSN is deployed over an area where some

aspect is to be observed and then transmit that information to the

control unit.

• Health monitoring: In medical science wearable and implanted

these two type of applications.

• Air pollution monitoring: To measure the concentration of

serious gases in cities, the WSN is used to do this.

• Forest fire detection: The Wireless Sensor Network can be

installed in a forest to detect the fire in particular coverage area. In

this process sensors measure the temperature, humidity and gases

which are produced during fire.

• Natural disaster prevention: WSN have strongly been set up in

water sources like rivers, lacks where variation in the water levels

observed in real time.

Page 7: Vampire attack in wsn

Security Threats

• There are different threats that target WSN [3] [7]. Which are

categorise as follows-

• Common Attacks: In WSN, wireless transmission medium is usedfor communication so it is easy to present many types of attackslike: Active attack (data modification, data injection, delay, DoS)and passive attack (traffic analysis, eavesdropping).

• Denial of Service Attacks (DoS [4] [16]): These type of attacksprevent the normal use of communication functionality. This attackmay suppress all packet directed to a particular destination e.g.jamming attack [15], Target the power of a nodes e.g. power-exhaustion, vampire attack.

• Node Compromise: When a node come into network attackerextract vital information from a node like routing information,

data, access control, security key etc. these attacks are Theseattacks are more dominant than other attacks.

Page 8: Vampire attack in wsn

Security Threats cont’d…

• Side-channel Attacks: Attacker can observe some real activity of

a node like electromagnetic flow of data whenever they implement

encryption or decryption. After capturing this information attacker

can easily extract secret key.

• Impersonation Attacks: There are two types of impersonation

attack. One is Sybil attack in which adversary creates multiple fake

identities and other is replication attack in which adversary create

duplicates of the same identity.

• Protocol-specific Attacks: In WSN some protocols are essential

to perform some activity in the network. These protocols like data

aggregation, routing and time synchronization are pointed by

specific attacks that objective to influence the internal network

services.

Page 9: Vampire attack in wsn

Security Requirement

There is need to use some security mechanism to avoid attack in

WSN [5] [7].

• Confidentiality: It ensure that a given information must not be

reveal by anyone other than the intended sender and receiver.

• Integrity: This security service stated that the data receive by the

receiver are absolute as sent by an authorize sender.

• Authorization: This security service ensure that only the

authorized entities (e.g.: sensor nodes and base station) can be able

to execute functions in the network like data gathering, routing,

processing and controlling the system.

• Authentication: It allows a recipient to verify that the data is

really sent by the authorised sender. In sensor network this security

services is quite significant.

• Auditing: Important information which is observed from

environment by the sensor nodes must be stored by nodes.

Page 10: Vampire attack in wsn

Security Requirement cont’d…

• Availability: The principle of this property is that network

services or resource should be always available to the authentic

users when they needed.

• Freshness [7]: In WSN Sensor node collect the real information

from environment at every moment and transmit it to base stations.

So this information must be recent.

• Forward and Backward Secrecy: There are two properties

needed whenever a new node join a network and a sensor node

fail. First is forward secrecy where a sensor node should not be

able to read any future messages after it leaves the network and the

other one is backward secrecy, where a joining sensor node should

not be able to read any previously transmitted message.

• Privacy and Anonymity: This property ensure that the location

and identities of WSN entities (sensor node and base stations)

should be hidden or protected from the outsiders.

Page 11: Vampire attack in wsn

Vampire Attack

• The vampire attack is the class of Denial-of-Service attack.

• Denial-of-Services in network is cause by consuming the power of

the sensor node. It is also called power draining attacks because of

this attack consume power of sensor nodes and disable the

network.

• we can categorise vampire attack into two.

a) Vampire Attack on Stateless Protocol

b) Vampire Attacks on Stateful Protocol

Page 12: Vampire attack in wsn

Vampire Attack Cont’d…

a) Vampire Attack on Stateless Protocol

• Carousel Attack: In carousel attack, an attacker compose a packet

with a path that contain series of loops of that path, so that same of

nodes will traverse by the single packet many times[9] as shown in

Figure.

Figure 1: Carousel Attack

Page 13: Vampire attack in wsn

Vampire Attack Cont’d…

• Stretch Attack: In stretch attack, intruder build up fake long

source route. So that the packets move through large number of

node rather than the excellent number of nodes as shown in Figure.

Figure 2: Stretch Attack

Page 14: Vampire attack in wsn

Vampire Attack Cont’d…

b) Vampire attacks on Stateful Protocol

Stateful routing protocols in which network topology and its state

are already known by the nodes so local forwarding decisions at

each is done by using stored state.

• Directional Antenna Attack: In this type of attack intruder have

small control over the packet progress when forwarding decisions

are made independently by each node but by using directional

antenna they can still waste energy[10].

• Malicious Discovery Attacks: AODV and DSR routing

algorithms are vulnerable to vampire, when route discovery initiate

by the node at any time, not just during change in a topology.

There are many ways for the malicious node to activate topology

change: it may simply falsely claim that a link is down, or claim a

new link to a non-existent node.

Page 15: Vampire attack in wsn

Related Work

1. Eugene y. vasserman et. al. [6], Describe PLGP protocol which is

developed By Parno, Luk, Gaustad and Perrig to prevent the

vampire attack. PLGP have mainly two phases, first is Topology

discovery Phase and other is Packet forwarding phase.

2. K. Vanitha and V.dhivya et. al. [8], They have invented a routing

protocol to Prevent from Vampire Attacks in WSN, name is

Valuable Secure protocol. It has mainly three phases, first is

network configuration phase, second is key management and last

one is communication phase.

3. B. Umakanth and J. Damodhar et. al. [13], Describe the EWMA

(Energy Weighted Monitoring Algorithm) to detect the vampire

attack. It has mainly two phases, first is network configuration and

other is communication phase. First phase is responsible for

creating an excellent routing path from source to sink. Second

phase perform aggregation of the packet transmission to avoids the

same packets.

Page 16: Vampire attack in wsn

Related Work Cont’d…

4. Ashish Patil and Rahul Gaikwad et. al.[2], Describe a method to

prevent vampire attack by using EWMA and finding corresponding

trust value of each node. For preventing vampire attack first detect

carousal and stretch attack. After detection of carousal and stretch

attack reduce their impact in wireless sensor networks by using

energy weight monitoring algorithm (EWMA). Then finding trust

value of each node in the network for performing routing operation.

5. Amee A. Patel and Sunil J. Soni et. al [1], Describe a method for

detection and prevention against vampire attack in AODV routing

protocol. The main goal of approach is defending the energy

draining of nodes in wireless sensor network against vampire attack

and increase the life time of network.

6. Shrikant C. Chumble1 and M. M. Ghonge et. al.[12], Describe

the vulnerability to the vampire attack on exiting routing protocol

like AODV even they design to be secure routing. The author also

proposed, vampire attack removal protocol (VARP).

Page 17: Vampire attack in wsn

Proposed Work

In this approach we add one extra field in the routing table at each

node and in data packet that is Bcast_id for AODV routing protocol

to detect the directional antenna attack.

Step 1: Whenever sensor node want to send the information, first it

will check its routing table.

• If path available in routing table then goto step 3.

• Otherwise it will generate the packet RREQ with Bcast_id and

broadcast this packet into the network in read only mode.

Step 2: The intermediate nodes either generates RREP with same

Bcast_id as RREQ or rebroadcast RREQ. Redundant RREQs are

dropped by these node.

• If these node have a path to destination in their routing table then

generates RREP and goto step 3.

• Otherwise rebroadcast the RREQ packet.

Page 18: Vampire attack in wsn

Proposed Work Cont’d…

Step 3: Node will unicast a ‘route_path_alert’ packet in that forward

path with fields <dest_addr, source_addr, bcast_id >.

So that all intermediate nodes can update their bcast_id field in

routing table corresponding to the source and destination entries.

Step 4: After establish or alert the reverse and forward path, source

node can transmit the information to destination.

Now source node prepare data packet including Bcast_id (read only

mode) and unicast this packet on particular selected path.

Step 5: All Intermediate nodes match bcast_id of packet and the

corresponding stored bcast_id in routing table.

If bcast_id matches then this node forward the data packet otherwise

send message to trusted authorise party that the particular previous

node is vampire node.

Page 19: Vampire attack in wsn

Conclusion and Future Work

• Various new routing protocol against vampire attack and methods

to detect or prevent the vampire in AODV routing protocol are

mentioned in related work.

• This paper provide a different approach for detect and prevent the

vampire attack by adding one extra variable in routing table and

data packet. After that performs some computation on that variable

to detect and prevent this attack.

• The simulation of above proposed algorithm is left for future work.

Page 20: Vampire attack in wsn

References

1. Amee A. Patel and Sunil J. Soni, “A Novel Proposal for Defending Against Vampire Attack in WSN” International Conference on Communication Systems and Network Technologies,pp: 624-627, DOI 10.1109/CSNT in 2015.

2. Ashish Patil and Rahul Gaikwad, “Preventing Vampire Attack in Wireless Sensor Network by using Trust” International Journal of Engineering Research & Technology ISSN: 2278-0181 Vol. 4 pp: 254-258, Issue 06, June-2015.

3. C. Karlof , D. Wagner, “Secure routing in wireless sensor networks attacks And countermeasures” in proc. Of 1st IEEE Int. workshop on sensor network Protocols and applications (SNPA’03), pp. 113-127, May 2003.

4. D.R. Raymond, R.C. Marchany, M.I. Brown¯eld, and S.F. Midki, “Effects of Denial-of-Sleep Attacks on Wireless Sensor Network MAC Protocols” IEEE Trans- actions on Vehicular Technology, vol. 58, no. 1, pp. 367-380, 2009.

5. Dr. Manoj Kumar Jain, “Wireless Sensor Networks: Security Issues and Challenges” IJCIT, vol. 2, issue 1, pp. 62-67, 2011.

6. Eugene Y. Vasserman and Nicholas Hopper, “Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Network” Ieee Transactions On Mobile Computing, Vol. 12, pp: 318 – 332, No. 2, February 2013.

7. J. Lopez, R. Roman, and C. Alcaraz, “Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks” Foundations of Security Analysis and Design 2009, LNCS vol. 5705, pp. 289-338, 2009.

8. K.Vanitha, and V.Dhivya, “A Valuable Secure Protocol to Prevent Vampire Attacks in Wireless Ad Hoc Sensor Networks” IEEE International Conference on Innovations in Engineering and Technology Vol. 3, pp: 2441-2446, Special Issue 3, March 2014.

Page 21: Vampire attack in wsn

References Cont’d…

9. P.Rajipriyadharshini and V.Venkatakrishnan, S.Suganya and A .Masanam, “Vampire AttacksDeploying Resources in Wireless Sensor Networks” International Journal of Computer Scienceand Information Technologies, Vol. 5 (3), 2014, pp: 2951-2953 ; ISSN: 0975-9646.

10. Richa kumari, Pankaj Sharma, “A Literature Survey on Detection and Prevention againstVampire Attack in WSN” international conference on computer, communication &computational sciences [IC4S 2016], pp:122-126, Ajmer (Raj.) August 2016.

11. Snehlata Yadav, Kamlesh Gupta, Sanjay Silakari, “Security issues in wireless sensor networks”Journal of Information Systems and Communication, vol. 1, pp-01-06, issue 2, 2010.

12. Tawseef Ahmad Naqishbandi and Imthyaz Sheriff C, “A Resilient Strategy against EnergyAttacks in Ad-Hoc WSN and Future IoT” International Journal of Advanced Research inComputer Science and Software Engineering Vol. 4, Issue 2, February 2014, pp: 766-773, ISSN:2277 128X.

13. Umakant, and J. Damodhar, “Resource Consumption Attacks in Wireless Ad Hoc SensorNetworks” International Journal of Engineering Research ISSN: 2319 6890, Volume No.3 IssueNo: Special 2, pp: 107-111 22 March 2014.

14. V. Shnayder, M. Hempstead, B. Chen, G.W. Allen, and M. Welsh, “Simulating the PowerConsumption of Large-Scale Sensor Network Applications” Proceedings of the 2ndInternational Conference on Embedded Networked Sensor Systems (SenSys 2004), pp. 188-200, Baltimore (USA), August 2004.

15. W. Xu, W. Trappe, Y. Zhang, and T. Wood, “The Feasibility of Launching and DetectingJamming Attacks in Wireless Networks” Proceedings of the 6th ACM international symposiumon Mobile ad hoc networking and computing, pp. 46-57, Urbana-Champaign (USA), May 2005.

16. Y.W. Law, M. Palaniswami, L. Van Hoesel, J. Doumen, P. Hartel, and P. Havinga. Energy,“Efficient Link-Layer Jamming Attacks against Wireless Sensor Network MAC Protocols”ACM Transactions on Sensor Networks, vol. 5, no. 1, pp. 6:1-6:38, 2009.

Page 22: Vampire attack in wsn