Intrusion Detection System to Overcome a Novel Form of Replay Attack (Data Replay) in Wireless Sensor Networks

Full Text (PDF, 644KB), PP.50-60

Views: 0 Downloads: 0

Author(s)

Yasmine Medjadba 1,* Somia Sahraoui 2

1. Science and Technology Department, Beijing Normal University, Beijing, 100001, China

2. LaSTIC laboratory, Computer Science Department, University of Batna 2, Batna, 05000, Algeria

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2016.07.07

Received: 25 Oct. 2015 / Revised: 12 Feb. 2016 / Accepted: 6 Apr. 2016 / Published: 8 Jul. 2016

Index Terms

Wireless sensor networks, security, replay attacks, data replay, intrusion detection system

Abstract

Wireless Sensor Networks (WSNs) are widely and successfully employed in various application domains. They are easily deployed to collect valuable information and monitor potential environmental phenomena. However, the special nature of WSNs as well as their severe constraints and resource limitations make them vulnerable to various types of threats. Replay attack, is one example. According to this attack, the adversary intercepts and replays several times the same (old) message leading either to missed alerts or to false alerts. Many solutions have been proposed to mitigate message replay attack. However, all these solutions are of cryptographic natures and consider only external attacks exercising a trivial scenario of replay attack. In fact, the attacker could be a lot smarter, and in this case, it replays only the data field in the message while keeping the remaining fields updated. This novel form of replay attack is much more dangerous and difficult to be detected. We call this attack variant by data replay attack. As sensor nodes may be easily captured and compromised, the worst scenario occurs if data replay attack is performed by an internal intruder. In this paper we propose an efficient intrusion detection framework to overcome data replay attack in WSNs. The proposed intrusion detection system is named DR-IDS (Data Replay Intrusion Detection System). The performance evaluations performed under NS2 simulator show that the proposed solution is sufficiently robust.

Cite This Paper

Yasmine Medjadba, Somia Sahraoui, "Intrusion Detection System to Overcome a Novel Form of Replay Attack (Data Replay) in Wireless Sensor Networks", International Journal of Computer Network and Information Security(IJCNIS), Vol.8, No.7, pp.50-60, 2016. DOI:10.5815/ijcnis.2016.07.07

Reference

[1]P. Rawat, K. Deep Singh, H. Chaouchi, J. M. Bonnin, “ Wireless sensor networks: a survey on recent developments and potential synergies”, The Journal of Supercomputing, Vol. 68, No. 1, pp 1-48, April 2014.
[2]S. Kalantary, S. Taghipour, “A survey on architectures, protocols, applications, and management in wireless sensor networks”, Journal of Advanced Computer Science & Technology, Vol. 3, No. 1, pp. 1-11, 2014.
[3]J. Gubbi, R. Buyya, and S. Marusic, M. Palaniswamia, “Internet of Things (IoT): A vision, Architectural Elements, and Future Directions,” ELSEVIER Journal: Future Generation Computer Systems, pp. 1645-1660, 2013.
[4]S. Malladi, J. A. Foss, R. B. Heckendorn “On Preventing Replay Attacks on Security Protocols”, Idaho Univ Moscow Dept of Computer Science, 2002.
[5]K. Khan, W. Goodridge, D. Ragbir, “Security in Wireless Sensor Networks”, Global Journal of Computer Science and Technology Network, Web & Security, Vol. 12, No.16 , 2012.
[6]Y. Wang, G. Attebury, B. Ramamurthy, “A survey of security issues in wireless sensor networks,’’ IEEE communications surveys & tutorials, vol. 8, No. 2, pp.2-21, 2006.
[7]A. Perrig, R. Szewczyk, J.D. Tygar, V. Wen, D. E. Culler, “SPINS: Security Protocols for Sensor Networks” Wireless Networks, Vol. 8, pp. 521-534, 2002.
[8]M. G. Gouda, Y. Choi, A. Arora, “Antireplay Protocols for Sensor Networks”, pp.1–20, August 23, 2004.
[9]D. C. Jinwala, D. R. Patel, Members, IAENG, S. Patel, K. S. Dasgupta, “Optimizing the Replay Protection at the Link Layer Security Framework in Wireless Sensor Networks”.
[10]M. Luk, G. Mezzour, A. Perrig, V. Gligor, “MiniSec: A Secure Sensor Network Communication Architecture”.
[11]D. C. Jinwala, D. R. Patel, K. S. Dasgupta, “Configurable Link Layer Security Architecture for Wireless Sensor Networks,” Proceedings of the World Congress on Engineering 2008.
[12]I. Krontiris, T. Dimitriou, H. Soroush, M. Salajegheh, “WSN Link-layer Security Frameworks”.
[13]S. M. AlMheiri, H. S. AlQamzi, “Data Link Layer Security Protocols in Wireless Sensor Networks: A Survey”, IEEE 2013.
[14]A. Ghosal, S. Sur, S. DasBit, “μSec: A Security Protocol for Unicast Communication in Wireless Sensor Networks”, DPM 2012 and SETOP 2012, LNCS 7731, pp. 258–273, 2013.
[15]S. A. Ch, M. M. Omair, I. A. Khan, T. A. Malik, “Ensuring reliability and freshness for Data Aggregation in Wireless Sensor Networks”. International Journal of Machine Learning and Computing, Vol. 1, No. 3, August 2011.
[16]D. R. Raymond, R. C. Marchany, S. F. Midkiff, “Scalable, Cluster-based Anti-replay Protection for Wireless Sensor Networks”, Proceedings of the 2007 IEEE.
[17]L. Gheorghe, R. Rughini?, R. Deaconescu, N. Tapus, “Authentication and Anti-replay Security Protocol for Wireless Sensor Networks”, 2010 Fifth International Conference on Systems and Networks Communications.
[18]J. Barnickel, U. Meyer, “SecSyWiSe: A Secure Time Synchronization Scheme in Wireless Sensor Networks”, 2009 IEEE
[19]L. B. Oliveira, H. C. Wong, M. Bern, R. Dahab, A. A. F. Loureiro, “SecLEACH – A Random Key Distribution Solution for Securing Clustered Sensor Networks”, 2006.
[20]J. Ibriq, I. Mahgoub, “A Secure Hierarchical Routing Protocol for Wireless Sensor Networks”.
[21]N. Sastry, D. Wagner, “Security considerations for IEEE 802.15. 4 networks”, In Proceedings of the 3rd ACM workshop on Wireless security, ACM, 2004.
[22]I. S. Gawdan, C. O. Chow, T. A. Zia, Q. I. Sarhan, “A Novel Secure Key Management for Hierarchical Clustering Wireless Sensor Networks,” In Proceeding of 2011 Third Conference on Computational Intelligence, Modeling and Simulation (CIMSiM), 2011 , pp. 312 - 316.
[23]D. Zhang, Y. Zhao, X. Wang, J. Choi, “A Robust and Efficient Neighborhood-Based Security Protocol for Wireless Sensor Networks”, 2010 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery.
[24]H. Chan, A. Perrig, D. Song, “Random key predistribution schemes for sensor networks,” Proceedings of the IEEE Computer Society Symposium on Security and Privacy, Piscataway, USA: IEEE, pp. 197-213, 2003.
[25]N. A. Alrajeh, S. Khan, B. Shams, “Intrusion Detection Systems in Wireless Sensor Networks: A Review”, International Journal of Distributed Sensor Networks, pp. 1-7, 2013.
[26]S. Sahraoui, S. Bouam, “Secure Routing Optimization in Hierarchical Cluster-Based Wireless Sensor Networks”, International Jorunal of Communication Networks and Information Security (IJCNIS), Vol. 5, No. 3, pp.178-185, 2013.
[27]R. C. Chen, C. F. Hsieh, Y. F. Huang, “An isolation intrusion detection system for hierarchical wireless sensor networks,” Journal of networks, vol. 5, No. 3, pp. 335-342, March 2010.
[28]A. Abduvaliyev, S. Lee, Y. K. Lee, “Energy efficient hybrid intrusion detection system for wireless sensor networks,” International Conference on Electronics and Information Engineering (ICEIE), Vol. 2, pp. 25-29, Kyoto, 2010.
[29]D. E. Boubiche, A. Bilami, “A cross layer intrusion detection system for wireless sensor network,” International Journal of Network Security & Its Applications (IJNSA), Vol. 4, No. 2, pp. 35-52, March 2012.
[30]T. Issariyakul, E. Hossain, “Introduction to Network Simulator NS2”, Springer, 2012.
[31]W. R. Heinzelman, A. Chandarkasan, H. Balakrishanan, “Energy efficient communication protocol for wireless micro sensor networks”, 33rd IEEE International Conference on System Sciences, pp. 1–10, Hawaii, January 2000.
[32]V. Seema, Pratchi, "A Comparative Study of Key Management Protocols for WSN," International Journal of Computer Network and Information Security (IJCNIS), vol. 6, No. 4, pp. 29-36, 2014.