An Efficient Intrusion Detection System for Selective Forwarding and Clone Attackers in IPv6-based Wireless Sensor Networks under Mobility

An Efficient Intrusion Detection System for Selective Forwarding and Clone Attackers in IPv6-based Wireless Sensor Networks under Mobility

Fatma Gara (ENIT, Tunis, Tunisia), Leila Ben Saad (University of Agder, Grimstad, Norway) and Rahma Ben Ayed (ENIT, Tunis, Tunisia)
Copyright: © 2017 |Pages: 26
DOI: 10.4018/IJSWIS.2017070102
OnDemand PDF Download:
No Current Special Offers


Security in mobile wireless sensor networks is a big challenge because it adds more complexity to the network in addition to the problems of mobility and the limited sensor node resources. Even with authentication and encryption mechanisms, an attacker can compromise nodes and get all the keying materials. Therefore, an intrusion detection system is necessary to detect and defend against the insider attackers. Currently, there is no intrusion detection system applied to IPv6-based mobile wireless sensor networks. This paper is mainly interested in detecting the selective forwarding and clone attacks because they are considered among the most dangerous attackers. In this work, the authors design, implement, and evaluate a novel intrusion detection system for mobile wireless sensor networks based on IPv6 routing protocol for low power and lossy networks. The new intrusion detection system can be extended to other attacks such as wormhole and sybil attacks. The simulations results show that the detection probability is 100% for selective attackers under some cases.
Article Preview

1. Introduction

Wireless Sensor Networks (WSN) consist of small autonomous and distributed devices that monitor the physical conditions in often hostile and not trustworthy environment. Due to the hostile nature of the deployment environment, security is considered as one of the most challenging issue in WSN. Security is vital for ensuring the integrity, authenticity, and confidentiality of the critical information. Attacks in WSN can include routing attacks, black hole attack, sinkhole attack, wormhole attack, selective forwarding attack and node clone attack (Wang, 2006). Most of works in the literature have studied the problem of security and different types of attacks by considering a static WSN. However, the hypothesis of static sensor nodes in the network is not always the case for all WSN applications. In fact, due to the advancement in robotics and microchips technology, a sensor node may also be mobile such as deployed in healthcare applications (Alemdar, 2010) and intelligent transport systems (Qin, 2010). In these applications, sensors which are placed on patients or vehicles, are mobile and need to transmit the collected data quickly and reliably to the sink. Node mobility introduces additional complexity to static WSN because it will become more vulnerable for intrusion and eavesdropping. Therefore, it is more challenging to detect attacks in mobile WSN compared to the conventional ones.

Attackers in WSN can be insider or outsider. Outsider attackers are initiated from outside and can be prevented by the use of first defense line of defense mechanisms such as authentication, cryptography and key management (Cho, 2012; Meng, 2016; Khanafer, 2010). Whereas, insider attackers can be a legitimate node that operates differently and hence it can have all the authentication keys. Consequently, there will be a need for a second line of defense in the network provided by an intrusion detection system which provides the information related to type of intrusion, location of intruder and intrusion activity active or passive (Ren, 2010).

In this paper, two attacks in mobile WSNs are studied which are selective forwarding attack and clone attack because they are considered among the most dangerous ones in WSNs (Shama, 2012; Kaur, 2016). In addition to that, a novel Intrusion Detection system for mobile wireless sensor networks is designed, implemented and evaluated.

The standardized IPv6 Routing Protocol for Low Power and Lossy Networks (RPL) which is based on IPv6 is considered as an invaluable element for realizing the vision of Internet of Things. This concept aims to connect all physical objects to the Internet enabling them to exchange data and provide useful services. Although, there exists some works that consider IPv6 based-WSNs, most of them only have tried to detect intruders in static WSNs (Wallgren, 2013; Le, 2016).

Complete Article List

Search this Journal:
Open Access Articles
Volume 18: 4 Issues (2022): Forthcoming, Available for Pre-Order
Volume 17: 4 Issues (2021): 2 Released, 2 Forthcoming
Volume 16: 4 Issues (2020)
Volume 15: 4 Issues (2019)
Volume 14: 4 Issues (2018)
Volume 13: 4 Issues (2017)
Volume 12: 4 Issues (2016)
Volume 11: 4 Issues (2015)
Volume 10: 4 Issues (2014)
Volume 9: 4 Issues (2013)
Volume 8: 4 Issues (2012)
Volume 7: 4 Issues (2011)
Volume 6: 4 Issues (2010)
Volume 5: 4 Issues (2009)
Volume 4: 4 Issues (2008)
Volume 3: 4 Issues (2007)
Volume 2: 4 Issues (2006)
Volume 1: 4 Issues (2005)
View Complete Journal Contents Listing