Modelling Routing Attacks on Collection Tree Protocol and Designing an Intrusion Detection System on Real-Time Wireless Sensor Networks

Nowadays, Wireless Sensor Networks (WSNs) have become one of the important issues with the increasing usage of IoT systems. The nodes having limited resources in WSNs and the nature of wireless environment, which is vulnerable to attacks, bring along various security problems. Since cryptologic and / or authentication-based solutions are not successful for insider attacks during the travelling of data packet from source to destination, different solutions should be proposed. In this study, a group of routing attacks, including sinkhole, black hole and selective forwarding attacks in real time WSNs, are modelled and analysed on testbed. The contributions of this study are real-time modelling of 3 different types of routing attacks on CTP protocol, which is a popular routing architecture in literature in recent years, and the design and testing of a real time neighbour tracking-based intrusion detection system from these attacks. Besides, this study is thought to be the basis for future intrusion

___

[1] N. KhadirKumar and A. Bharathi, "Real time energy efficient data aggregation and scheduling scheme for WSN using ATL," Computer Communications, vol. 151, pp. 202- 207, 2020.

[2] G. M. Borkar, et al., "A novel clustering approach and adaptive SVM classifier for intrusion detection in WSN: a data mining concept," Sustainable Computing: Informatics and Systems, vol. 23, pp. 120-135, 2019.

[3] J. Horneber and A. Hergenröder, "A Survey on Testbeds and Experimentation Environments for Wireless Sensor Networks," in IEEE Communications Surveys & Tutorials, vol. 16, no. 4, pp. 1820-1838, Fourthquarter 2014.

[4] O. R. M. Boudia, S. M. Senouci, and M. Feham, “A novel secure aggregation scheme for wireless sensor networks using stateful public key cryptography,” Ad Hoc Networks, vol. 32, pp. 98–113, 2015.

[5] J. Ryu, Y. Lee, and D. Won, "Cryptoanalysis of Lightweight and anonymous three-factor authentication and access control protocol for real-time applications in wireless sensor networks," Computational Science and Technology. Springer, Singapore, pp. 2341-349, 2020.

[6] K. Biswas, V. Muthukkumarasamy and K. Singh, "An Encryption Scheme Using Chaotic Map and Genetic Operations for Wireless Sensor Networks," in IEEE Sensors Journal, vol. 15, no. 5, pp. 2801-2809, May 2015.

[7] Y. Tsou, C. Lu and S. Kuo, "MoteSec-Aware: A Practical Secure Mechanism for Wireless Sensor Networks," in IEEE Transactions on Wireless Communications, vol. 12, no. 6, pp. 2817-2829, June 2013.

[8] P. Gope, et al., "Lightweight and physically secure anonymous mutual authentication protocol for real-time data access in industrial wireless sensor networks," IEEE transactions on industrial informatics, Vol. 15 No. 9, pp. 4957-4968, 2019.

[9] F. Ishmanov and Y. B. Zikria, “Trust Mechanisms to Secure Routing in Wireless Sensor Networks: Current State of the Research and Open Research Issues,” Journal of Sensors, vol. 2017, pp. 1–16, 2017.

[10] G. Zhan, W. Shi and J. Deng, "Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs," in IEEE Transactions on Dependable and Secure Computing, vol. 9, no. 2, pp. 184- 197, March-April 2012.

[11] S. Sultana, D. Midi, and E. Bertino, “Kinesis: a security incident response and prevention system for wireless sensor networks” Proceedings of the 12th ACM Conference on Embedded Network Sensor Systems - SenSys 14, 2014.

[12] H. Sedjelmaci, S. M. Senouci and M. A. Abu-Rgheff, "An Efficient and Lightweight Intrusion Detection Mechanism for Service-Oriented Vehicular Networks," in IEEE Internet of Things Journal, vol. 1, no. 6, pp. 570-577, Dec. 2014.

[13] P. Peter, H. Petr and N. Jan, "Simulation and Evaluation of CTP and Secure-CTP Protocols," Radioengineering, vol. 2010, no. 1, pp. 89-98.

[14] A. Stetsko, L. Folkman and V. Matyas, "NeighborBased Intrusion Detection for Wireless Sensor Networks," 2010 6th International Conference on Wireless and Mobile Communications, Valencia, 2010, pp. 420-425.

[15] Z. Liu, W. Liu, Q. Ma, G. Liu, L. Zhang, L. Fang and V.S. Sheng, “Security cooperation model based on topology control and time synchronization for wireless sensor networks.” Journal of Communications and Networks, 21(5), 2019 ,pp.469-480.

[16] M. Udhayavani and M. Chandrasekaran, “Design of TAREEN (trust aware routing with energy efficient network) and enactment of TARF: a trust-aware routing framework for wireless sensor networks.” Cluster Computing, 22(5), 2019 , pp.11919-11927.

[17] L. Almon, M. Riecker and M. Hollick, "Lightweight Detection of Denial-of-Service Attacks on Wireless Sensor Networks Revisited," 2017 IEEE 42nd Conference on Local Computer Networks (LCN), Singapore, 2017, pp. 444-452.

[18] B. Cui and S. J. Yang, "NRE: Suppress Selective Forwarding attacks in Wireless Sensor Networks," 2014 IEEE Conference on Communications and Network Security, San Francisco, CA, 2014, pp. 229-237.

[19] C. Ioannou and V. Vassiliou, "The Impact of Network Layer Attacks in Wireless Sensor Networks," 2016 International Workshop on Secure Internet of Things (SIoT), Heraklion, 2016, pp. 20-28.

[20] A. Dwivedi and O. Vyas, "An Exploratory Study of Experimental Tools for Wireless Sensor Networks," Wireless Sensor Network, Vol. 3 No. 7, 2011, pp. 215-240.

[21] O. Gnawali, R. Fonseca, K. Jamieson, D. Moss, and P. Levis, “Collection tree protocol,” Proceedings of the 7th ACM Conference on Embedded Networked Sensor Systems - SenSys 09, 2009.

[22] S. Basagni, C. Petrioli and D. Spenza, "CTP-WUR: The collection tree protocol in wake-up radio WSNs for critical applications," 2016 International Conference on Computing, Networking and Communications (ICNC), Kauai, HI, pp. 1- 6, 2016.

[23] E. C. H. Ngai, J. Liu and M. R. Lyu, "On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks," 2006 IEEE International Conference on Communications, Istanbul, 2006, pp. 3383-3389.

[23] A. Rehman, S. Rehman, and H. Raheem, "Sinkhole Attacks in Wireless Sensor Networks: A Survey," Wireless Personal Communications, Vol. 106 No.4 pp: 2291-2313, 2019.

[24] D.C. Mehetre, S. E. Roslin, and S. J. Wagh, "Detection and prevention of black hole and selective forwarding attack in clustered WSN with Active Trust," Cluster Computing, Vol. 22 No.1, pp: 1313-1328, 2019.

[25] H. Fu, Y. Liu, Z. Dong, Y. Wu, "A Data Clustering Algorithm for Detecting Selective Forwarding Attack in Cluster-Based Wireless Sensor Networks," Sensors, Vol. 20 No.1 pp: 23, 2020.