Anda di halaman 1dari 4

IDL - International Digital Library for Technology Research

Volume I, Issue III, MARCH-2017 Available at: www.dbpublications.org

Detection and Prevention of Attacks in Wireless


Sensor Networks: A Survey
Ms. K. DEEPA SHREE 1, Mrs. RANJANA S. CHAKRASALI 2
Dept. of Computer Science
1 M-Tech, Student B.N.M Institute of Technology, Bangalore, India

2 Guide, Assistant Professor B.N.M Institute of Technology, Bangalore, India

SURVEY PAPER vulnerable attacks in the network layer are Sinkhole


attack, Wormhole attack and Sybil attack, Hello Flood
ABSTRACT- Wireless sensor networks will use a attack. In sinkhole attack, the attacker will introduce
communication channel which is insecure and have a itself that it is the shortest path to the destination. So,
poor infrastructure. Wireless sensor networks consists that all the nodes will forward the packet towards the
of spatially distributed autonomous devices and using attacker node. While, forwarding the attacker node
sensors they monitor the physical as well as the will drop the packet. In Sybil attack, the WSN is
environmental conditions, such as pressure, subverted by the malicious node which will forge large
temperature, sound at different locations. As the nodes number of fake identities and fake information. In
in the sensor network are deployed in the hostile Wormhole attack, the attacker node will record the
locations they are vulnerable to the attacks such as packet at one location in the network, and then tunnels
Hello flood attack, Jamming, Wormhole, Sybil, the packets to another location in the network and will
Sinkhole attack. These types of potential threats to perform modification in the network from that point.
network are continuously evolving and requires The attacks will be detected and prevented using cross
measures to detect and prevent. In this paper, we layer features and Mobile agent. It is usually done in
discuss about Sybil and Wormhole attacks with two phases. In first phase, the attacks are detected by
schemes to detect and prevent these attacks. correlating the cross layer features such as MAC and
Network layer. During second phase, if the attacks are
Keywords: Wireless Sensor Network, security,
detected, mobile agents are used to prevent the attack.
attacks, Sybil and wormhole attacks, cross layer
Mobile agents are used for forwarding the data, to
approach.
solve the security problem by using three step
1. INTRODUCTION: As the technology is getting negotiation. Through this approach, the energy
advanced there is increase in the use of Wireless efficiency is improved, false positive rate is reduced.
Sensor Network. The sensor nodes will be deployed in
an open and unprotected region. So, the sensor 2 SURVEYS
networks will be vulnerable to the attacks such as 2.1 Wormhole attack Detection for Dynamic
Wormhole, Sybil and Sinkhole attack. Usually in Wireless Sensor Networks
many-to- one communication the opponent node will Due to the emergence of WSN in all the fields,
attract the surrounding neighbor nodes with fake security is an issue. They can connect to any network
identities and false routing information. The existing as they are having wireless and distributed nature. The
system will be focusing on single layer attacks, they tiny sensor nodes are deployed densely. Wormhole
attack is an security issue in this approach. Without
will target only on one specific layer and will detect knowing the protocol which is used in the network it
the attack, without considering other layers. The most can damage the network. Detecting them is an big

1|P a g e
IDL - International Digital Library for Technology Research
Volume I, Issue III, MARCH-2017 Available at: www.dbpublications.org

issue, as they are invisible to sensor nodes because numerical analysis and simulation to show that the
they use a private channel. Usually in the existing algorithm is effective and accurate. The computation
system they are considered to be static in nature, but in and communication overhead will be low. WSNs
this approach the attack is detected for dynamic nature have a sensor node which will be geographically
ones. So that the accuracy for detection will be good. distributed, the surroundings are monitored and the
The data will be broadcasted to the neighbor nodes data will be forwarded to the base station after sensing
and to the base station. Usually in the Wormhole through multi hop routing. The monitoring of
attack, the two malicious nodes will be connected with environment and geographical sensing is an common
tunnel. The one malicious node will be recording the application of WSN. The surrounding nodes are
packets at one area, and forwards that to another attracted by the intruder which gives a routing
malicious node, the another malicious node will be information which is unfaithful, they modify the data
replaying the packets at another location. The remotely by selective forwarding. The attack will prevent the
located node will think that the neighbor node itself is base station in getting the sensing data which is
the sender node, and this becomes the tunnel. Now the corrected and which is complete leading to a threat.
malicious node will make the changes in the data. Since the sensors have a battery power which is low
Now the packets will be transmitted faster as it uses and due to the weak computation, and due to the
tunnel, as the tunnels will gives a faster transmission deployment of nodes in an unsafe region, the wireless
path. The route which is created by the malicious node links are vulnerable to attacks. Several secure
will be shorter than the actual path, this makes a mechanisms are proposed with cryptographic
confusion in routing protocols to take a decision. A technique for protecting network traffic, for high
method has been proposed for detecting Wormhole computation overhead. Among the nodes time
attack in two phases which is dynamic in nature. The synchronization is required. An light weight algorithm
two phases are as follows, the rate of change of has been proposed for detecting the sinkhole attack
neighbors is measured for each and every node in first and for identifying the intruder. To defend against the
phase, if it is between upper and lower threshold then attack cryptographic technique is used, the network
it will go to second phase. The alternate path concept flow information has to be observed to identify the
is considered, if the threshold value is lower than the intruder as well as the malicious node which is
alternate path then the attack is detected. isolated later to protect the network. The algorithms
has two parts, the network flow information is
2.2 Sinkhole Attack Detection in Wireless Sensor collected from the attacked area, analysing the pattern
Networks of routing and locating the intruder. Multiple
The multiple nodes will be sending their sensed data suspicious nodes and the intruders are found by using
to the base station. Usually in many to one voting method. Through simulation the performance is
communication there is high risk of attacks which will measured.
be occurring, where the nodes which are in the
surrounding will be attracted by the intruder with 2.3 Sybil Attack Detection and Prevention
routing information which is unfaithful. While MANETs does not have a fixed infrastructure. The
forwarding the data can be modified. The Sinkhole mobile nodes which are independent communicate
attack is an common threat which will be occurring in with radio waves. As they are fully distributed so they
WSN. As the sensor nodes will be deployed in an open work at any place without having an fixed
and unsafe region. An algorithm has been presented infrastructure. The attacker can fetch the information
for detecting the intruder in the Sinkhole attack. In the easily as the communication medium is air by sniffing
algorithm suspected nodes found are listed out by the software tool. The network is distracted by an
checking the data consistency and the network flow attack called Sybil attack. Multiple fake identities are
information is analysed to identify the intruder in the created by single node. A technique is implemented
list. The algorithm presented will be robust enough as for detecting and preventing the Sybil nodes in the
they deal with malicious node that hide the real network. Mobile nodes communicate directly through
intruder. The performance will be measured by wireless links to relay the messages as routers. The

2|P a g e
IDL - International Digital Library for Technology Research
Volume I, Issue III, MARCH-2017 Available at: www.dbpublications.org

mobility of the node will cause the change in network the environment is trusted but there are problems such
topology. As MANETs does not have infrastructure as communication and routing in military networks,
so there is no authority to control or maintain the response operations such as earthquake, flood during
network which causes the attacks. Usually these emergency. As the communication channel is wireless
networks are used in battlefields emergency, rescue and open in nature, infrastructure less, deployment is
missions. The nodes will communicate with unique fast, so they are easily vulnerable to security problems.
identity which makes an one to one mapping between The routers will be moving randomly and freely and
entity and identity. For two distinct nodes two they organize themselves, so the topology of the
identities are required. The attack will be having many network can be unpredictably changed. While
identities which gives an misjudgment for the nodes in designing the routing protocols there are several
the network. They use identities and create false challenges which will occur they are mobility, multi
expression of the nodes in the network. The hop, bandwidth, heterogeneity, battery power.
communication in the network among the nodes will
be disturbed. Sybil nodes have to eliminated from the 2.5 Wormhole attack Detection & Prevention
network to have a secure communication. The next generation WSNs are the MANETs. They
does not have an infrastructure and they have a
2.4 Wormhole Attack Detection using Time Stamp topology will be changing dynamically. As the nodes
and Security Packet are mobile and they are dynamic in nature the attacks
MANETs does not have an infrastructure and they can occur very easily. The nodes which are in close
organise themselves in the network. The environment proximity will be grouped together so that the network
in which the data transmission takes place cannot be clustering takes place and the network performance
trusted. The nature of the network will be dynamic for will be improved. The main aim of this approach is to
the communication of mobile users. The malicious enhance the network performance and improve the
activity takes place when the expected function is not nodes durability, extending the life of the network.
taking place and the routing in MANET will be The AODV routing protocol is used for analyzing the
disturbed. Due to the dynamic nature of MANET Wormhole attack, to provide security to the network a
attacks takes place very easily, which degrades the preventive mechanism is presented. They use multi
performance of the network. The node which is an hop radio relaying and they can work with any
attacker will be recording the data at one point in the infrastructure. Mobile nodes will be having multi hop
network and they tunnel the data to another point by wireless links. To communicate among the nodes they
retransmitting them throughout the network. If the have to coordinate by distributing the resources and
Wormhole attacker node is present in the network then managing them, maintenance of the path, routing.
that will degrade the performance of networks. A Mobile nodes are collected autonomously in
routing protocol has been proposed called detection MANETs. As they do not have an infrastructure and
protocol for Wormhole attack, where the security they use the broadcast medium for transmitting the
packets are used with time stamp. A field is data, so they are easily vulnerable to problems such as
additionally added called time stamp for finding out security and routing. To have a secure communication
the wormhole in the path established by source and among the nodes security is needed. Integrity,
destination. Now using the security packet the position availability, confidentiality is an important aspect for
of the malicious node is found. The results are authentication. The problems occurring in the network
obtained for the parameters such as end to end delay, would be, usage of the resources and energy in
throughput, and packet delivery ratio and compared deploying the network, dynamically changing network
with each other. There is no centralized administration topology, lack of information dissemination control,
and fixed infrastructure for the wireless mobile hosts. and decentralized control. Using clustering that is
The communication will be using multi hop paths. The getting all the nodes together can improve the
nodes can act as router as well as host. The nodes will performance of the network. The load should be
perform routing by forwarding data to other nodes balanced in the network, and robust free environment
based the connectivity of the network. Even though should be provided. The packets will not be allowed

3|P a g e
IDL - International Digital Library for Technology Research
Volume I, Issue III, MARCH-2017 Available at: www.dbpublications.org

by the attacker to reach the destination, instead they Address, International Journal of Computer
produce their own packets and send them and consume Applications, Volume 122, Page No. 0975 8887, July,
the bandwidth. The nodes in the MANET will be 2015.
acting as routers.
[7] Edith C.H.Ngai, Jiangchuan Liu, Michael R.Lyu,
Elsevier J, An efficient intruder detection algorithm
3. CONCLUSION In this survey, we have discussed against sinkhole attacks in wireless sensor networks,
about the attacks such as Sybil attack, Wormhole attack, Computer communications, Volume 30, Page No.
Sinkhole attack occurring in the unprotected region 23532364, 6 May, 2015.
during node deployment. Different approaches in
detecting and preventing the attacks are also discussed. [8] M.Vidhya, V.Srinivasan, R.Sudha, Multi-layer
On preventing the attacks, security problem is solved, intrusion detection and prevention in WSNs using self-
efficiency is improved, false positive rate is reduced, healing module, IJSETR, Page No. 424-429, Volume
communication cost is reduced, network load is also 4, Issue 3, March, 2015.
reduced. Results are obtained by comparing the
[9] Manish M Patel, Akshai Aggarwal, Two Phase
proposed approach with existing System based on the
Wormhole Detection Approach for Dynamic Wireless
parameters such as throughput, delay, efficiency,
Sensor Networks, IEEE Transactions, Page No. 2109-
overhead and packet delivery ratio.
2112, March, 2016.
REFERENCES

[1] K.Abirami, B.Santhi, Sybil Attack in Wireless


Sensor Network, IJET, Issue 2, Page No. 31-38, May,
2013.

[2] Jyoti Thalor, Ms. Monika, Wormhole Attack


Detection and prevention Technique in MANET,
IJREC, Volume 3, Page No. 620-623, Issue 2, February,
2013.

[3] Dimple Saharan, Detection & Prevention of


Wormhole Attack on AODV Protocol in Mobile Adhoc
Networks, International Journal Of Engineering And
Computer Science, Volume 3, Issue 9, Page No.7979-
7985, September, 2014.

[4] Chandraprabha Rawat, Wormhole Attack Detection


Protocol using Time Stamp with Security Packet,
international Journal of Computer Science and
Information Technologies, Volume 5, Page No. 621-
626, March, 2014.

[5] Hussein Moosavi, Francis Minhthang Bui, A


Game-Theoretic Framework for Robust Optimal
Intrusion Detection in Wireless Sensor Networks,
IEEE Transactions on Information Forensics and
Security, Volume No. 9, Page No. 1367-1379, 2014.

[6] Pareek, Anamika, Mayank Sharma, Detection and


Prevention of Sybil Attack in MANET using MAC

4|P a g e

Anda mungkin juga menyukai