INFORMATION CHANGE THE WORLD

International Journal of Information Engineering and Electronic Business(IJIEEB)

ISSN: 2074-9023 (Print), ISSN: 2074-9031 (Online)

Published By: MECS Press

IJIEEB Vol.6, No.6, Dec. 2014

Damage Measurement of Collision Attacks on Performance of Wireless Sensor Networks

Full Text (PDF, 730KB), PP.22-32


Views:71   Downloads:2

Author(s)

Mina Malekzadeh, Sadegh Ebady, M.H. Shahrokh Abadi

Index Terms

Collision attack;wireless sensor security;WSN attacks

Abstract

Wireless sensor networks (WSN) are widely developed to monitor different phenomena in a variety of areas including nature, medical centers, home automation, industrial and military applications. Such development in many different fields, raises important security issues related to the reliability of the WSNs. Due to the resource constrained nature of the WSNs, these networks are the target of many different types of attacks and prone to failure. In this paper, we consider the collision attack. An attempt has been made to measure the impact of the collision attack on the performance of WSNs under variety scenarios performed by the attackers. The main contribution of this paper is to present that although the attack does not consume much energy of the attacker, it can highly disrupt the normal operation of the target sensor networks. The implementation of the proposed attack model has been done by using NS2 network simulator.

Cite This Paper

Mina Malekzadeh, Sadegh Ebady, M.H. Shahrokh Abadi,"Damage Measurement of Collision Attacks on Performance of Wireless Sensor Networks", IJIEEB, vol.6, no.6, pp.22-32, 2014. DOI: 10.5815/ijieeb.2014.06.03

Reference

[1]R. Sharma, Y. Chaba, Y. Singh. Analysis of Security Protocols in Wireless Sensor Network, International journal of advanced networking and applications, Vol.2, No.3, pp.707-713, 2010.

[2]I.S. Kocher, C.O. Chow, H. Ishii, and T.A. Zia. Threat Models and Security Issues in Wireless Sensor Networks, International Journal of Computer Theory and Engineering, Vol.5, No.5, 2013.

[3]H.C. Chaudhari and L.U. Kadam. Wireless Sensor Networks: Security, Attacks and Challenges, international journal of networking, Vol.1, No.1, pp.04-16, 2011.

[4]M. Cakiroglu, A.T. Ozcerit, H. Ekiz, O. Cetin. MAC Layer DoS Attacks in Wireless Sensor Networks: A Survey, International Conference on Wireless Networks (ICWN), pp. 45-48, 2006.

[5]M.R. Ahmed, X. Huang, and D. Sharma. A Taxonomy of Internal Attacks in Wireless Sensor Network, international journal of World Academy Of Science, Engineering And Technology, 2012.

[6]M.N. Sudha, M.L. Valarmathi, G. Rajsekar, M.K. Mathew, N. Dineshraj, S. Rajbarath. Minimization of Collision in Energy Constrained Wireless Sensor Network, international jounal of Wireless Sensor Network, Vol.1, pp.350-357, 2009.

[7]T. Naeem and K.K. Loo. Common Security Issues and Challenges in Wireless Sensor Networks and IEEE 802.11 Wireless Mesh Networks, International Journal of Digital Content Technology and its Applications, Vol.3, No.1, pp.1-6, 2009.

[8]A. Pandey and R.C. Tripathi. A Survey on Wireless Sensor Networks Security, International Journal of Computer Applications, Vol.3, No.2, pp.1-7, 2010.

[9]K. Sharma and M.K. Ghose. Wireless Sensor Networks: An Overview on its Security Threats, International Journal of Computer Applications, Special Issue on Mobile Ad-hoc Networks MANETs, pp.42-45, 2010.

[10]Z. Zhang, J. Wu, J. Deng, and M. Qiu. Jamming ACK Attack to Wireless Networks and a Mitigation Approach, Proceedings of IEEE Global Telecommunications Conference Wireless Networking Symposium (GLOBECOM '08), pp.1-5, 2008.

[11]S. Chen, G. Yang, S. Chen. A Security Routing Mechanism against Sybil Attack for Wireless Sensor Networks, Proceedings of the 2010 IEEE International Conference on Communications and Mobile Computing (CMC '10), Vol.01, pp. 142-146, 2010,

[12]B. Zeng and B. Chen. SybilACO: Ant colony optimization in defending against Sybil attacks in the wireless Sensor Network, Proceedings of the 2010 IEEE International Conference on Computer and Communication Technologies in Agriculture Engineering (CCTAE'10), pp.357-360, 2010.

[13]Z. Zhao, B. Wei, X. Dong, L. Yao, and F. Gao. Detecting Wormhole Attacks in Wireless Sensor Networks with Statistical Analysis, WASE International Conference on Information Engineering, pp.251-254, 2010.

[14]P.Reindl, K.Nygard, and X.Du. Defending Malicious Collision Attacks in Wireless Sensor Networks, IEEE International Conference on Embedded and Ubiquitous Computing, 2010.

[15]M.S. Haghighi, K. Mohamedpour, V. Varadharajan, and B.G. Quinn. Stochastic Modeling of Hello Flooding in Slotted CSMA/CA wireless sensor networks, IEEE transactions on information forensics and security, Vol.6, No.4, 2011.

[16]S. Periyanayagi, V. Sumathy, and R. Kulandaivel. A Defense Technique for Jamming Attacks in Wireless Sensor Networks Based On SI, International Conference on Process Automation, Control and Computing (PACC'11), pp.1-5, 2011.

[17]O. Xi, T. Bin, L. Qi, Z. Jian, H. Zheng, and X. Yang. A Novel framework of Defense System Agaist DoS Attacks in Wireless Sensor Networks, IEEE International Conference on Wireless Communications, Networking and Mobile Computing (WiCom'11), pp.1-5, 2011.

[18]M. García and A. Población. Detection of Wormhole Attacks in Wireless Sensor Networks Using Range-Free Localization, IEEE 17th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD'12), pp.21-25, 2012.

[19]L. Teng, and Y. Zhang. SeRA: A Secure Routing Algorithm against Sinkhole Attacks for Mobile Wireless Sensor Networks, IEEE International Conference on Computer Modeling and Simulation (ICCMS'10), pp.79-82, 2010.

[20]C. Chen, M. Song, and G. Hsieh. Intrusion Detection of Sinkhole Attacks In Large-scale Wireless Sensor Networks, IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS'10), pp.711-716, 2010.

[21]A. Kumar, A.Sharma, and A.Singh. Performance Evaluation of BST Multicasting Network over ICMP Ping Flood for DDoS, International Journal of Computer Science & Engineering Technology (IJCSET), Vol.2, No.12, 2011.