Wireless sensor networks are widely used in many applications like battlefield monitoring, environment monitoring, and so forth. In all of these applications the cooperation among various sensor nodes is needed to forward the data packets to the base station. However, it expends the various resources of a sensor node such as battery power, storage, and processing power. Therefore, to conserve its own resources a node may become selfish by not forwarding the data to the others. This kind of attack has serious consequences if the attacker node is the leader of a cluster. In the presence of attack the base station will not be able to get the data from the victimized cluster while resources of the member of that cluster are being consumed. In this paper we propose a scheme called window based scheme (WBS) to detect this kind of misbehavior in WSN. Our detection scheme is energy efficient because most of the computations are done at base station only. Simulation results prove that our method detects and removes the attacker effectively and efficiently. 1. Introduction A wireless sensor network (WSN) [1] is a self-organizing network consisting of hundreds to thousands of sensor nodes. Each sensor node has limited processing, storage, and computational capability. A sensor node “senses” various parameters like humidity, temperature, pressure, motion, vibration, and so forth, according to the requirement of WSN application, converts it into appropriate signal, and forwards it to a central authority known as a base station or sink through the wireless medium. Base station may again send it to another base station or can take the decision based on acquired data on its own. These networks are widely used in various applications like battlefield surveillance [2], environmental monitoring [3], wildlife monitoring [4], and so forth. In most of the applications the WSN is set up in a hostile environment in an ad hoc manner, which makes them vulnerable to several types of security threats [5]. To enhance the survivability of WSN, traditional security mechanisms like encryption, access control, and authentication have been used by the researchers. However, due to resource limitations strong security mechanism cannot be added to prevent misbehavior of a sensor node. These reasons will lead to abnormal functioning of the network. Now a node may misbehave in various ways such as it does not forward the data at all (blackhole attack) or it may forward the data selectively or it may go into the sleep mode (snooze attack). The attacker may do it either due to any commercial
References
[1]
K. Sohraby, D. Minoli, and T. Znati, Wireless Sensor Networks Technology, Protocols, and Applications, John Wiley & Sons, New York, NY, USA, 2007.
[2]
T. Bokareva, W. Hu, S. Kanhere, et al., “Wireless sensor networks for battlefield surveillance,” in Proceedings of the Land Warfare Conference, Brisbane, Australia, 2006.
[3]
F. Ingelrest, G. Barrenetxea, G. Schaefer, M. Vetterli, O. Couach, and M. Parlange, “SensorScope: application-specific sensor network for environmental monitoring,” ACM Transactions on Sensor Networks, vol. 6, pp. 1033–1047, 2010.
[4]
A. Garcia-Sanchez, F. Garcia-Sanchez, F. Losilla et al., “Wireless sensor network deployment for monitoring wildlife passages,” Sensors, vol. 10, no. 8, pp. 7236–7262, 2010.
[5]
C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: attacks and countermeasures,” Special Issue on Sensor Network Applications and Protocols, vol. 1, no. 2-3, pp. 1293–1303, 2003.
[6]
W. R. Heinzelman, J. Kulik, and H. Balakrishnan, “Adaptive protocols for information dissemination in wireless sensor networks,” in Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking, pp. 174–185, Seattle, Wash, USA, 1999.
[7]
D. Braginsky and D. Estrin, “Rumor routing algorithm for sensor networks,” in Proceedings of the 1st ACM International Workshop on Wireless Sensor Networks and Applications (WSNA '02), pp. 22–31, Atlanta, Ga, USA, September 2002.
[8]
C. Intanagonwiwat, R. Govindan, and D. Estrin, “Directed diffusion: a scalable and robust communication paradigm for sensor networks,” in Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MOBICOM '00), pp. 56–57, New York, NY, USA, August 2000.
[9]
C. Qing, T. Abdelzaher, H. Tian, and R. Kravets, “Cluster-based forwarding for reliable end-to-end delivery in wireless sensor networks,” in Proceedings of the 26th IEEE International Conference on Computer Communications (INFOCOM '07), pp. 1928–1936, San Diego, Calif, USA, May 2007.
[10]
W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “Energy-efficient communication protocol for wireless microsensor networks,” in Proceedings of the 33rd Annual Hawaii International Conference on System Siences, pp. 3005–3014, January 2000.
[11]
A. Manjeshwar and D. P. Agrawal, “A protocol for enhanced efficiency in wireless sensor networks,” in Proceedings of the 1st International Workshop on Parallel and Distributed Computing Issues in Wireless Networks and Mobile Computing, in Conjunction with 2001 IPDPS, San Francisco, Calif, USA, 2001.
[12]
S. Lindsey and C. S. Raghavendra, “PEGASIS: power-efficient gathering in sensor information systems,” in Proceedings of the IEEE Aerospace Conference, pp. 1125–1131, Big Sky, Mont, USA, March 2002.
[13]
W. B. Heinzelman, A. P. Chandrakasan, and H. Balakrishnan, “An application-specific protocol architecture for wireless microsensor networks,” IEEE Transactions on Wireless Communications, vol. 1, no. 4, pp. 660–670, 2002.
[14]
T. Murata and H. Ishibuchi, “Performance evaluation of genetic algorithms for flowshop scheduling problems,” in Proceedings of the 1st IEEE Conference on Evolutionary Computation, pp. 812–817, June 1994.
[15]
J. R. Douceur, “The sybil attack,” in Proceedings of the Workshop on Peer-to-Peer Systems (IPTPS '02), Cambridge, Mass, USA, 2002.
[16]
Y. C. Hu, A. Perrig, and D. B. Johns, “Wormhole attacks in wireless networks,” IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, pp. 370–381, 2006.
[17]
M. Tripathi, M. S. Gaur, and V. Laxmi, “Simulation of Snooze attack in LEACH,” in Proceedings of the 3rd International Conference of Computer Science, Engineering and Applicaions (ICCSEA '13), pp. 393–399, New Delhi, India, May 2013.
[18]
L. B. Oliveira, A. C. Ferreira, and M. Aurelio, “SecLEACH-on the security of clustered sensor networks,” Signal Processing, vol. 87, no. 12, pp. 2882–2895, 2007.
[19]
L. Yang, Centralized security protocols for wireless sensor network [M.S. thesis], San Jose State University, 2011.
[20]
K. Ioannis and T. Dimitriou, “Toward intrusiondetection in sensor networks,” in Proceedings of the 13th European Wireless Conference, pp. 1–7, April 2007.
[21]
P. Banerjee, D. Jacobson, and S. N. Lahiri, Performance and security measure of clustering protocols for sensor networks [Ph.D. thesis], Iowa State University, Ames, Iowa, USA.
[22]
S. Pal, D. Bhattacharyya, G. S. Tomar, and T. Kim, “Wireless sensor networks and its routing protocols: a comparative study,” in Proceedings of the International Conference on Computational Intelligence and Communication Networks (CICN '10), pp. 314–319, November 2010.