Abstract
In this paper, we present an Intrusion Detection System designed for wireless sensor networks and show how it can be configured to detect Sinkhole attacks. A Sinkhole attack forms a serious threat to sensor networks. We study in depth this attack by presenting how it can be launched in realistic networks that use the MintRoute protocol of TinyOS. MintRoute is the most widely used routing protocol in sensor network deployments, using the link quality metric to build the corresponding routing tree. Having implemented this attack in TinyOS, we embed the appropriate rules in our IDS system that will enable it to detect successfully the intruder node. We demonstrate this in our own sensor network deployment and we also present simulation results to confirm the effectiveness and accuracy of the algorithm in the general case of random topologies.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Camtepe, S., Yener, B.: Key distribution mechanisms for wireless sensor networks: a survey. Technical Report 05-07, Rensselaer Polytechnic Institute, Troy, New York (March 2005)
Lazos, L., Poovendran, R.: Serloc: Robust localization for wireless sensor networks. ACM Transactions on Sensor Networks 1(1), 73–100 (2005)
Dimitriou, T., Krontiris, I.: Secure In-network Processing in Sensor Networks. In: Security in Sensor Networks, pp. 275–290. CRC Press, Boca Raton, USA (2006)
Yu, B., Xiao, B.: Detecting selective forwarding attacks in wireless sensor networks. In: Proceedings of the 20th International Parallel and Distributed Processing Symposium (SSN2006 workshop), Rhodes, Greece, pp. 1–8 (April 2006)
Ngai, E.C.H., Liu, J., Lyu, M.R.: On the intruder detection for sinkhole attack in wireless sensor networks. In: ICC 2006. Proceedings of the IEEE International Conference on Communications, Istanbul, Turkey (2006)
Hu, Y.C., Perrig, A., Johnson, D.B.: Packet leashes: A defense against wormhole attacks in wireless ad hoc networks. In: INFOCOM 2003. Proceedings of the Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies, San Francisco, CA, USA (2003)
Krontiris, I., Dimitriou, T., Freiling, F.C.: Towards intrusion detection in wireless sensor networks. In: Proceedings of the 13th European Wireless Conference, Paris, France (April 2007)
Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: Attacks and countermeasures. AdHoc Networks Journal 1(2–3), 293–315 (2003)
Baggio, A.: Wireless sensor networks in precision agriculture. In: REALWSN 2005. Proceeding of the Workshop on Real-World Wireless Sensor Networks, Stockholm, Sweden (June 2005)
Werner-Allen, G., Lorincz, K., Welsh, M., Marcillo, O., Johnson, J., Ruiz, M., Lees, J.: Deploying a wireless sensor network on an active volcano. IEEE Internet Computing 10(2), 18–25 (2006)
Schmid, T., Dubois-Ferrière, H., Vetterli, M.: SensorScope: Experiences with a Wireless Building Monitoring Sensor Network. In: REALWSN 2005. Proceeding of the Workshop on Real-World Wireless Sensor Networks, Stockholm, Sweden (June 2005)
da Silva, A.P., Martins, M., Rocha, B., Loureiro, A., Ruiz, L., Wong, H.C.: Decentralized intrusion detection in wireless sensor networks. In: Q2SWinet 2005. Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks, pp. 16–23. ACM Press, New York (2005)
Onat, I., Miri, A.: An intrusion detection system for wireless sensor networks. In: Proceeding of the IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, Montreal, Canada, August 2005, vol. 3, pp. 253–259 (2005)
Datema, S.: A case study of wireless sensor network attacks. MSc thesis, Delft University of Technology (2005)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Krontiris, I., Dimitriou, T., Giannetsos, T., Mpasoukos, M. (2008). Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks. In: Kutyłowski, M., Cichoń, J., Kubiak, P. (eds) Algorithmic Aspects of Wireless Sensor Networks. ALGOSENSORS 2007. Lecture Notes in Computer Science, vol 4837. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77871-4_14
Download citation
DOI: https://doi.org/10.1007/978-3-540-77871-4_14
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-77870-7
Online ISBN: 978-3-540-77871-4
eBook Packages: Computer ScienceComputer Science (R0)