Activity Modelling and Comparative Evaluation of WSN MAC Security Attacks
DOI:
https://doi.org/10.13052/jcsm2245-1439.1234Keywords:
wireless sensor networks (WSNs), media access control (MAC), activity modelling, security attacksAbstract
Applications of wireless sensor networks (WSNs) are growing tremendously in the domains of habitat, tele-health, industry monitoring, vehicular networks, home automation and agriculture. This trend is a strong motivation for malicious users to increase their focus on WSNs and to develop and initiate security attacks that disturb the normal functioning of the network in a severe manner. Such attacks affect the performance of the network by increasing the energy consumption, by reducing throughput and by inducing long delays. Of all existing WSN attacks, medium access control (MAC) layer attacks are considered the most harmful as they directly affect the available resources and thus the nodes’ energy consumption.
The first endeavour of this paper is to model the activities of MAC layer security attacks to understand the flow of activities taking place when mounting the attack and when actually executing it. The second aim of the paper is to simulate these attacks on hybrid MAC mechanisms, which shows the performance degradation of a WSN under the considered attacks. The modelling and implementation of the security attacks give an actual view of the network which can be useful in further investigating secure mechanisms to reduce the degradation of the performance in WSNs due to an attack. Lastly, the paper proposes some solutions to reduce the effects of an attack.
Downloads
References
Bachir, A., Dohler, M., Watteyne, T., and Leung, K.K., MAC essentials for wireless sensor networks. IEEE Communications Surveys & Tutorials, 12(2):222–248, 2010.
Chen, X., Makki, K., Yen, K., and Pissinou, N. Sensor network security: A survey. IEEE Communications Surveys & Tutorials, 11(2):52–73, 2009.
Raymond, D.R., Marchany, R.C., Brownfield, M.I., and Midkiff, S.F. Effects of denial-of-sleep attacks on wireless sensor network MAC protocols. IEEE Transaction on Vehicular Technology, 58(1):367–380, January 2009.
Brownfield, M., Gupta, Y., and Davis IV, N. Wireless sensor network denial of sleep at-tack. In Proceedings of IEEE Workshop on Information Assurance and Security, United States Military Academy, West Point, NY, 15-17 June, pp. 356–364, 2005.
Pawar, P.M., Nielsen, R.H., Prasad, N.R., Ohmori, S., and Prasad, R. Hybrid mechanisms: Towards an efficient wireless sensor network medium access control. In Proceedings of WPMC, Brest, France, 3–6 October, pp. 492–496, 2011.
Reindl, P., Nygard, K., and Xiaojiang, Du. Defending malicious collision attacks in wireless sensor networks. In Proceedings EUC, Hong Kong, China, 11–13 December,pp. 771–776, 2010.
Ren, Q. and Liang, Q. Secure Media Access Control (MAC) in wireless sensor network:Intrusion detections and countermeasures. In Proceedings PIMRC, Berlin, Germany, 5–8September, pp. 3025–3029, 2004.
Law, Y.W., Palaniswami, M., Van Hoesel, L., Doumen, J., Hartel, P., and Havinga,P. Energy-efficient link-layer jamming attacks against wireless sensor network MACprotocols. ACM Transactions on Sensor Networks, 5(1):6.1–6.38, February 2009.
Peder, T. UML Bible, First Edition. John Wiley & Sons, 2003.
Pawar, P.M., Nielsen, R.H., Prasad, N.R., Ohmori, S., and Prasad, R. Behavioural model-ling of WSN MAC layer security attacks: A sequential UML approach. Journal of CyberSecurity and Mobility, 1(1):65–82, January 2012.
Hong, S. and Lim, S. Analysis of attack models via unified modelling language in wire-less sensor networks: A survey study. In Proceedings WCNIS, Beijing, China, 25–27January, pp. 692–696, 2010.
Rhee, I., Warrier, A., Aia, M., Min, J., and Sichitiu, M.L. ZMAC: A hybrid MAC forwireless sensor networks. IEEE/ACM Transactions on Networking, 16(3):511–524, June2008.