International Journal of Wireless and Microwave Technologies(IJWMT)

ISSN: 2076-1449 (Print), ISSN: 2076-9539 (Online)

Published By: MECS Press

IJWMT Vol.2, No.1, Feb. 2012

Defense on Split-Network Attack in Wireless Sensor Network

Full Text (PDF, 198KB), PP.38-44

Views:63   Downloads:2


Du Chunlai,hang Jianshun,Ma Li

Index Terms

Wireless Sensor Network;split-network attack;frequency hopping;integration


Wireless Sensor Network is an open self-organized network, which faces serious challenge. Whole network can be split up into many separate subnets which cannot communicate with each other because some vital sensor nodes are attacked. A defense scheme which based on frequency hopping and fast network integration was proposed to react against split-network attack. Frequency hopping makes the communication frequency of the network escape from attack frequency while fast network integration makes the separate subnets reintegrate into a whole network in new communication frequency. Simulation results show the proposed scheme significantly reduces the success rate of attack and increases the lifetime of network.

Cite This Paper

Du Chunlai,hang Jianshun,Ma Li,"Defense on Split-Network Attack in Wireless Sensor Network", IJWMT, vol.2, no.1, pp.38-44, 2012.


[1]Giruka, V. C., Singhal, M., Royalty, J. and Varanasi, S. (2008), Security in wireless sensor networks. Wireless Communications and Mobile Computing, 8: 1–24. doi: 10.1002/wcm.42

[2]Kashif Kifayat, Madjid Merabti, Qi Shi and David Llewellyn-Jones, Security in Wireless Sensor Networks. Handbook of Information and Communication Security, 2010, Part E, 513-552, DOI:10.1007/978-3-642-04117-4_26

[3]Raymond,D.R. Marchany,R.C.Brownfield, M.I.Midkiff,S.F, ”Effects of Denial-of-Sleep Attacks on Wireless Sensor Network MAC Protocols”,Vehicular Technology, IEEE Transactions on On page(s): 367 – 380, Volume: 58 Issue: 1, Jan. 2009

[4]David Richard Raymond,”Denial-of-Sleep Vulnerabilities and Defenses in Wireless Sensor Network MAC Protocols”, Dissertation, Virginia Polytechnic Institute and State University, 2008

[5]Rainer Falk, Hans-Joachim Hof, "Fighting Insomnia: A Secure Wake-Up Scheme for Wireless Sensor Networks," securware, pp.191-196, 2009 Third International Conference on Emerging Security Information, Systems and Technologies, 2009

[6]MatthewPirretti,SencunZhu, N.Vijaykrishnan,Patrick McDaniel, Mahmut Kandemir and Richard Brooks, ”The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense “in International Journal of Distributed Sensor Networks, Volume 2, Issue 3 September 2006, pages 267 - 287

[7]David R. Raymond and Scott F. Midkiff, “Clustered Adaptive Rate Limiting: Defeating Denial-of-Sleep Attacks in Wireless Sensor Networks” in Military Communications Conference 2007, MILCOM, IEEE, pages -1-7.

[8]Aristides Mpitziopoulos et al..”A Survey on Jamming Attacks and Countermeasures in WSNs”, IEEE COMMUNICATIONS SURVEYS&TUTORIALS, VOL. 11, NO. 4, FOURTH QUARTER 2009

[9]Mpitziopoulos,A.and Gavalas, D.(2009),An effective defensive node against jamming attacks in sensor networks. Security and Communication Networks,2:145–163.doi: 10.1002/sec.81

[10]M.Strasser,C. Popper, and S. Capkun, “Efficient Uncoordinated FHSS Anti-jamming Communication,” Proceedings of the tenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, pages 207-218, 2009.

[11]Ghada Alnifie, Robert Simon,”A multi-channel defense against jamming attacks in wireless sensor networks”, Proceedings of the 3rd ACM workshop on QoS and security for wireless and mobile networks, October 22-22, 2007, Chania, Crete Island, Greece

[12]W. Xu, W. Trappe and Y. Zhang, “Channel surfing: defending wireless sensor networks from interference”, in Proc. 6th international conference on Information processing in sensor networks, New York, NY, USA, pages.499-508, 2007.

[13]W. Xu, K. Ma, W. Trappe, Y. Zhang, “Jamming sensor networks: attack and defense strategies”, IEEE Network Magazine,vol. 20, pages. 41-47,2006.

[14]WENYUAN XU, WADE TRAPPE and YANYONG ZHANG, ”Defending wireless sensor networks from radio interference through channel adaptation” in ACM Transactions on Sensor Network, Vol. 4, No. 4, Article 18, Publication date: August 2008

[15]Khusvinder Gill and Shuang-Hua Yang, “A Scheme for Preventing Denial of Service Attacks on Wireless Sensor Networks” in Industrial Electronics, 2009. IECON '09. 35th Annual Conference of IEEE, Identifier: 10.1109/IECON.2009.5415233, pages: 2603 - 2609

[16]Pelechrinis,K; Iliofotou,M; Krishnamurthy,V., in Communications Surveys & Tutorials of IEEE, Issue: 99, Identifier: 10.1109/SURV.2011.041110.00022, pages:1-13

[17]Raymond, D.R.; Midkiff, S.F.; Pervasive Computing, IEEE, Vol: 7 , Issue: 1, Identifier: 10.1109/MPRV.2008.6, pages: 74 - 81