DOI QR코드

DOI QR Code

Analysis of the Connectivity of Monitoring Nodes and the Coverage of Normal Nodes for Behavior-based Attack Detection in Wireless Sensor Networks

무선 센서 네트워크에서 행위 기반 공격 탐지를 위한 감시 노드의 연결성과 일반 노드의 커버리지 분석

  • Received : 2013.09.25
  • Accepted : 2013.11.25
  • Published : 2013.12.31

Abstract

In wireless sensor networks, sensors need to communicate with each other to send their sensing data to the administration node and so they are susceptible to many attacks like garbage packet injection that cannot be prevented by using traditional cryptographic approaches. A behavior-based detection is used to defend against such attacks in which some specialized monitoring nodes overhear the communications of their neighbors to detect bad packets. As monitoring nodes use more energy, it is desirable to use the minimal number of monitoring nodes to cover the whole or maximal part of the network. The monitoring nodes can either be selected among the deployed normal nodes or differ in type from normal nodes. In this study, we have developed an algorithm for selecting the predefined number of monitoring nodes needed to cover the maximum number of normal nodes when the different types of normal nodes and monitoring nodes are deployed. We also have investigated experimentally how the number of monitoring nodes and their transmission range affect the connection ratio of the monitoring nodes and the coverage of the normal nodes.

무선 센서 네트워크에서 센서들은 획득한 정보를 관리 노드로 전달하기 위해 서로 통신을 해야 하므로 공격에 취약한데 쓰레기 패킷 주입 같은 공격은 기존의 암호화 같은 방식을 사용해서는 퇴치하기 어렵다. 그래서 행위 기반 탐지가 대두되었는데 특정 감시 노드들이 이웃한 일반 노드의 통신을 감청하여 불법적인 패킷을 탐지하게 된다. 감시 노드들은 일반 노드들에 비해 더 많은 에너지를 사용하기 때문에 최소의 감시 노드들로 전체 또는 최대한 넓은 범위의 네트워크를 커버하는 것이 필요하다. 감시 노드는 일반 노드 중에서 선택될 수도 있고 일반 노드와 서로 다른 종류일 수도 있다. 본 연구에서는 서로 다른 종류의 감시 노드와 일반 노드가 배치되었을 때 커버되는 일반 노드의 수가 최대가 되도록 주어진 수의 감시 노드를 선택하는 알고리즘을 개발하고, 감시 노드의 수와 전송 범위가 감시 노드의 연결 비율과 일반 노드의 커버리지에 어떤 영향을 미치는 지 실험을 통해 비교하였다.

Keywords

References

  1. A. Stetsko, L. Folkman and V. Matyas, "Neighbor-based Intrusion Detection for Wireless Sensor Networks," Proceedings of 6th International Conference on Wiress and mobile Communications, pp.420-425, 2010
  2. D. Sheela, C. Naveenkumar and G. Mahadevan, "A noncryptographic method of sinkhole attack detection in wireless sensor networks," IEEE Intl. conference on recent trends in Information Technology(ICRTIT 2011), pp. 527-532, 2011
  3. W. T. Zhu, "Node replication attacks in wireless sensor networks : bypassing the neighbor-based detection scheme," Intl. Conference on Network Computing and Information Security, pp. 156-160, 2011
  4. Y. Liu and K. Han, "Behavior-based Attack Detection and Reporting in Wireless Sensor Networks," Proceedings of the third International Symposiums on Electronic Commerce and Security, pp. 209-212, 2010
  5. K. Chong, "An Improved Algorithm using Shortest Path Tree for Behavior-based Attack Detection and Reporting Prblem in Wireless Sensor Networks," Journal of KIISE : Information Netwoking, vol. 39, no. 4, pp.365-370, August 2012
  6. D.-H. Shin and S. Bagchi, "Optimal monitoring in multi-channel multi-radio wireless mesh network," Proceedings of the tenth ACM international symposium on Mobile ad hoc networking and computing(Mobihoc), pp. 229-238, 2009
  7. D. Subhadrabandhu, S. Sarkar, and F. Anjum,"A framework for misuse detection in adhoc networks-part I," IEEE Journal on Selected Areas in Communications, Special Issue on Security in Wireless Ad Hoc Networks, Vol.24, No.2, pp.274-289, 2006
  8. D. Subhadrabandhu, S. Sarkar, and F. Anjum,"A framework for misuse detection in adhoc networks-part II," IEEE Journal on Selected Areas in Communications, Special Issue on Security in Wireles Ad Hoc Networks, Vol.24, No.2, pp.290-304, 2006
  9. U. Wang, M. Wilkerson, and X. Yu, "Hybrid Sensor Deployment for Surveillance and Target Detection in Wireless Sensor Networks," IEEE , 2011
  10. Y. Wang and Z lun, "Impact of Deployment Point Arrangement on Intrusion Detection in Wireless Sensor Networks," 18th Annual IEEE/ACM Intl. Symp. on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, pp. 421-423, 2010
  11. Xue Wang and Sheng Wang, "Hierarchical Deployment optimization for Wireless Sensor Networks," IEEE Transactions on Mobile Computing, vol. 10, no. 7, pp. 1028-1041, July, 2011 https://doi.org/10.1109/TMC.2010.216
  12. G. Yang and D. Quio, "Multi-Round Sensor Deployment for Guaranteed Barrier Coverage," IEEE INFOCOM, 2010