International Journal of Wireless and Microwave Technologies(IJWMT)
ISSN: 2076-1449 (Print), ISSN: 2076-9539 (Online)
Published By: MECS Press
IJWMT Vol.2, No.1, Feb. 2012
Defense on Split-Network Attack in Wireless Sensor Network
Full Text (PDF, 198KB), PP.38-44
Wireless Sensor Network is an open self-organized network, which faces serious challenge. Whole network can be split up into many separate subnets which cannot communicate with each other because some vital sensor nodes are attacked. A defense scheme which based on frequency hopping and fast network integration was proposed to react against split-network attack. Frequency hopping makes the communication frequency of the network escape from attack frequency while fast network integration makes the separate subnets reintegrate into a whole network in new communication frequency. Simulation results show the proposed scheme significantly reduces the success rate of attack and increases the lifetime of network.
Cite This Paper
Du Chunlai,hang Jianshun,Ma Li,"Defense on Split-Network Attack in Wireless Sensor Network", IJWMT, vol.2, no.1, pp.38-44, 2012.
Giruka, V. C., Singhal, M., Royalty, J. and Varanasi, S. (2008), Security in wireless sensor networks. Wireless Communications and Mobile Computing, 8: 1–24. doi: 10.1002/wcm.42
Kashif Kifayat, Madjid Merabti, Qi Shi and David Llewellyn-Jones, Security in Wireless Sensor Networks. Handbook of Information and Communication Security, 2010, Part E, 513-552, DOI:10.1007/978-3-642-04117-4_26
Raymond,D.R. Marchany,R.C.Brownfield, M.I.Midkiff,S.F, ”Effects of Denial-of-Sleep Attacks on Wireless Sensor Network MAC Protocols”,Vehicular Technology, IEEE Transactions on On page(s): 367 – 380, Volume: 58 Issue: 1, Jan. 2009
David Richard Raymond,”Denial-of-Sleep Vulnerabilities and Defenses in Wireless Sensor Network MAC Protocols”, Dissertation, Virginia Polytechnic Institute and State University, 2008
Rainer Falk, Hans-Joachim Hof, "Fighting Insomnia: A Secure Wake-Up Scheme for Wireless Sensor Networks," securware, pp.191-196, 2009 Third International Conference on Emerging Security Information, Systems and Technologies, 2009
MatthewPirretti,SencunZhu, N.Vijaykrishnan,Patrick McDaniel, Mahmut Kandemir and Richard Brooks, ”The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense “in International Journal of Distributed Sensor Networks, Volume 2, Issue 3 September 2006, pages 267 - 287
David R. Raymond and Scott F. Midkiff, “Clustered Adaptive Rate Limiting: Defeating Denial-of-Sleep Attacks in Wireless Sensor Networks” in Military Communications Conference 2007, MILCOM, IEEE, pages -1-7.
Aristides Mpitziopoulos et al..”A Survey on Jamming Attacks and Countermeasures in WSNs”, IEEE COMMUNICATIONS SURVEYS&TUTORIALS, VOL. 11, NO. 4, FOURTH QUARTER 2009
Mpitziopoulos,A.and Gavalas, D.(2009),An effective defensive node against jamming attacks in sensor networks. Security and Communication Networks,2:145–163.doi: 10.1002/sec.81
M.Strasser,C. Popper, and S. Capkun, “Efficient Uncoordinated FHSS Anti-jamming Communication,” Proceedings of the tenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, pages 207-218, 2009.
Ghada Alnifie, Robert Simon,”A multi-channel defense against jamming attacks in wireless sensor networks”, Proceedings of the 3rd ACM workshop on QoS and security for wireless and mobile networks, October 22-22, 2007, Chania, Crete Island, Greece
W. Xu, W. Trappe and Y. Zhang, “Channel surfing: defending wireless sensor networks from interference”, in Proc. 6th international conference on Information processing in sensor networks, New York, NY, USA, pages.499-508, 2007.
W. Xu, K. Ma, W. Trappe, Y. Zhang, “Jamming sensor networks: attack and defense strategies”, IEEE Network Magazine,vol. 20, pages. 41-47,2006.
WENYUAN XU, WADE TRAPPE and YANYONG ZHANG, ”Defending wireless sensor networks from radio interference through channel adaptation” in ACM Transactions on Sensor Network, Vol. 4, No. 4, Article 18, Publication date: August 2008
Khusvinder Gill and Shuang-Hua Yang, “A Scheme for Preventing Denial of Service Attacks on Wireless Sensor Networks” in Industrial Electronics, 2009. IECON '09. 35th Annual Conference of IEEE, Identifier: 10.1109/IECON.2009.5415233, pages: 2603 - 2609
Pelechrinis,K; Iliofotou,M; Krishnamurthy,V., in Communications Surveys & Tutorials of IEEE, Issue: 99, Identifier: 10.1109/SURV.2011.041110.00022, pages:1-13
Raymond, D.R.; Midkiff, S.F.; Pervasive Computing, IEEE, Vol: 7 , Issue: 1, Identifier: 10.1109/MPRV.2008.6, pages: 74 - 81