CFP last date
20 May 2024
Reseach Article

Signal Strength based Hello Flood Attack Detection and Prevention in Wireless Sensor Networks

by Virendra Pal Singh, Aishwarya S. Anand Ukey, Sweta Jain
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 62 - Number 15
Year of Publication: 2013
Authors: Virendra Pal Singh, Aishwarya S. Anand Ukey, Sweta Jain
10.5120/10153-4987

Virendra Pal Singh, Aishwarya S. Anand Ukey, Sweta Jain . Signal Strength based Hello Flood Attack Detection and Prevention in Wireless Sensor Networks. International Journal of Computer Applications. 62, 15 ( January 2013), 1-6. DOI=10.5120/10153-4987

@article{ 10.5120/10153-4987,
author = { Virendra Pal Singh, Aishwarya S. Anand Ukey, Sweta Jain },
title = { Signal Strength based Hello Flood Attack Detection and Prevention in Wireless Sensor Networks },
journal = { International Journal of Computer Applications },
issue_date = { January 2013 },
volume = { 62 },
number = { 15 },
month = { January },
year = { 2013 },
issn = { 0975-8887 },
pages = { 1-6 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume62/number15/10153-4987/ },
doi = { 10.5120/10153-4987 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:11:50.685349+05:30
%A Virendra Pal Singh
%A Aishwarya S. Anand Ukey
%A Sweta Jain
%T Signal Strength based Hello Flood Attack Detection and Prevention in Wireless Sensor Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 62
%N 15
%P 1-6
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless sensor network is a highly distributed network of small lightweight wireless sensor nodes, deployed in large numbers to monitor the environment or system. These sensor networks have limitations of system resources like battery power, radio range and processing capability. Low processing power and wireless connectivity make such networks vulnerable to various attacks like sink hole, black hole, Sybil attacks, selective forwarding, worm hole, hello flood etc. Among these hello flood attack is an important attack on the network layer, in which an adversary, which is not a legal node in the network, can flood hello request to any legitimate node using high transmission power and break the security of WSNs. The current solutions for this type of attack are mainly cryptographic, which suffer from heavy computational complexity. Hence these are less suitable in terms of memory and battery power. In this paper a method has been proposed to detect and prevent hello flood attack using signal strength of received Hello messages. Nodes have been classified as friend and stranger based on the signal strength of Hello messages sent by them. Nodes classified as stranger are further validated by sending a simple test packet; if the reply of test packet comes back in a predefined time then it is treated as valid otherwise it is treated as malicious. The algorithm is implemented in ns-2 by modifying the AODV-routing protocol. The performance of algorithm has been tested under different network scenarios. The simulation results show improved performance of the new algorithm in terms of number of packet delivery ratio as compare to AODV with hello flood attack.

References
  1. F. L. Lewis, "Wireless Sensor Networks," in Smart Environments: Technologies, Protocols, Applications, ed. D. J. Cook and S. K. Das, Wiley, New York, 2004.
  2. M. Ilyas and I. Magoub. , Compact Wireless and Wired Sensing System, CRC Press, 2005.
  3. Md. Abdur Rahman, Abdulmotaleb, "Wireless Sensor Network Transport Layer: State of the Art," Lecture Notes in Electrical Engineering,Vol. 21, Part III, pp. 221-245, Springer Science plus Business Media-2008.
  4. A. Khetrapal, "Routing Techniques for Mobile Ad Hoc Networks Classification and Qualitative/ Quantitative Analysis," Department of Computer Engineering, Delhi College of Engineering University AK-ACWN, 2006
  5. G. Acs and L. Buttyabv. , "A Taxonomy of Routing Protocols for Wireless Sensor Networks," BUTE Telecommunication Department, Vol. LXII, pp 32-40, Jan 2007.
  6. J. Fraden. , A Hand Book of Modern Sensor: Physic, Design, and Application, Springer Science Plus Business Media, 2004.
  7. http://en. wikipedia. org/wiki/Network_simulator. [Accessed-July2010]
  8. I. Akyildiz, W. Su, Y. Sankara subramaniam, "A Survey on Sensor Networks," IEEE Communications Vol. 40 Issue 8, Aug 2002, pp. 102-114.
  9. Chris Karlof, David Wagner, "Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures," Elsevier Ad Hoc Networks 1 pp 293–315, 2003.
  10. A Hamid, S Hong, "Defense Against Lap-top Class Attacker in Wireless Sensor Network," ICACT, Feb 2006, pp-314-318.
  11. Dr. Moh. Osama K. , "Hello Flood Counter Measure for Wireless Sensor Network," International Journal of Computer Science and Security, vol. 2 issue 3, 2007, pp-57-64.
  12. Waldir Ribeiro Pires Junior Thiago H. de Paula Figueiredo Hao Chi Wong Antonio A. F. Loureiro, "Malicious Node Detection in Wireless Sensor Networks," 18th International Parallel and Distributed Processing Symposium(IPDPS'04) Vol. 1, pp. 24, 2004
  13. Zhen Cao, Xia Zhou, Maoxing Xu, Zhong Chen, Jianbin Hu, Liyong Tang, "Enhancing Base Station Security against DoS Attacks in Wireless Sensor Networks," International Conference on Wireless Communication, Networking and Mobile Computing, Sept-2007, pp. 1-4.
  14. T. S. Rappaport, Wireless Communication: Principles and Practice, Prentice hall 2nd edition-2001.
  15. Teerawat Issariyakul, Ekram Hossain, Introduction to Network Simulator NS2, Springer Science plus Business Media, 2008.
  16. Mohammad Sayad Haghighi, Kamal Mohamedpour, "Securing Wireless Sensor Networks against Broadcast Attacks," International Symposium on Telecommunications, Aug-2008 , pp. 49-54.
  17. http://www. isi. edu/nsnam/ns/ [Accessed- July 2010]
  18. C. E. Perkins and E. M. Royer, "Ad Hoc On-Demand Distance Vector Routing," Proc. 2nd IEEE Wksp. Mobile comp. Sys. And Apps. , Feb 1999, pp. 90-100.
  19. Luis E. Palafox, J. Antonio, "Security in Wireless Sensor Networks," IGI Global publishing, Chapter 34, pp. 547-564, 2008.
Index Terms

Computer Science
Information Sciences

Keywords

WSN Keywords Hello Flood