Five Basic Types of Insider DoS Attacks of Code Dissemination in Wireless Sensor Networks

Abstract

Code dissemination is one of the important services of wireless sensor networks (WSNs). Securing the process of code dissemination is essential in some certain WSNs applications, state-of-the-art secure code dissemination protocols for WSNs aim for the efficient source authentication and integrity verification of code image, however, due to the resource constrains of WSNs and the epidemic behavior of the code dissemination system, existing secure code dissemination protocols are vulnerable to Denial of Service (DoS) attacks when sensor nodes can be compromised (insider DoS attacks). In this paper, we identify five different basic types of DoS attacks exploiting the epidemic propagation strategies used by Deluge. They are (1) Higher-version Advertisement attack, (2) False Request attack, (3) Larger-numbered Page attack, (4) Lower-version Adv attack, and (5) Same-version Adv attack. Simulation shows these susceptibilities caused by above insider DoS attacks. Some simple models are also proposed which promote understanding the problem of insider DoS attacks and attempt to quantify the severity of these attacks in the course of code dissemination in WSNs.

Share and Cite:

Y. ZHANG, X. ZHOU, Y. JI, Y. LAW and M. PALANISWAMI, "Five Basic Types of Insider DoS Attacks of Code Dissemination in Wireless Sensor Networks," International Journal of Communications, Network and System Sciences, Vol. 2 No. 1, 2009, pp. 64-72. doi: 10.4236/ijcns.2009.21008.

Conflicts of Interest

The authors declare no conflicts of interest.

References

[1] T. Stathopoulos, J. Heidemann, and D. Estrin, “A remote code update mechanism for wireless sensor networks,” Technical Report, UCLA, Los Angeles, CA, USA, 2003.
[2] J. W. Hui and D. Culler, “The dynamic behavior of a data dissemination protocol for network programming at scale,” in ACM International Conference on Embedded Networked Sensor Systems, pp. 81-94, November 2004.
[3] S. S. Kulkarni and L. Wang, “MNP: Multihop network reprogramming service for sensor networks,” in International Conference on Distributed Computing Systems (ICDCS’05), June 2005.
[4] S. S. Kulkarni and M. Arumugam, “INFUSE: A TDMA based data dissemination protocol for sensor networks,” Technical Report, Michigan State University, East Lansing, MI, USA, 2004.
[5] V. Naik, et al., “Sprinkler: A reliable and energy efficient data dissemination service for wireless embedded devices,” 26th IEEE Real-Time System Symposium, December 2005.
[6] L. A. Phillips, “Aqueduct: Robust and efficient code propagation in heterogeneous wireless sensor networks,” Master’s thesis, University of Colorado at Boulder, 2005.
[7] M. D. Krasniewski, R. K. Panta, S. Bagchi, C. L. Yang, and W. J. Chappell, “Energy-efficient on-demand reprogramming of large-scale sensor networks,” ACM Trans- actions on Sensor Networks, 4(1): pp. 1-38, 2008.
[8] P. E. Lanigan, R. Gandhi, and P. Narasimhan, “Sluice: Secure dissemination of code updates in sensor networks,” in IEEE International Conference on Distributed Computing Systems, Lisbon, Portugal, July 2006.
[9] P. K. Dutta, J. W. Hui, D. C. Chu, and D. E. Culler, “Securing the Deluge network programming system,” in the Fifth International Conference on Information Processing in Sensor Networks (IPSN’06), 2006.
[10] J. Deng, R. Han, and S. Mishra, “Secure code distribution in dynamically programmable wireless sensor networks,” in Proceedings of the Fifth International Conference on Information Processing in Sensor Networks (IPSN’06), April 2006.
[11] Crossbow Tech Inc., Mote In-Network Programming User Reference, http://www.tinyos.net/tinyos-1.x/doc/Xnp.pdf, 2003.
[12] TinyOS: An open-source OS for the networked sensor regime, http://www.tinyos.net/.
[13] P. E. Lanigan, P. Narasimhan, R. Gandhi, “Tradeoffs in configuring secure data dissemination in sensor network: An empirical outlook: [CMU-CyLab-07-006],” CyLab, Carnegie Mellon University, PA, 2007.
[14] A. Perring, R. Szewczyk, J. D. Tygar, V. Wem, and D. E. Culler, “SPINS: Security protocols for sensor networks,” Wirelss Networks, 8(5): pp. 521-534, 2002.
[15] H. Chan, A. Perrig, and D. Song, “Random key predistribution schemes for sensor networks,” in IEEE Symposium on Research in Security and Privacy, 2003.
[16] C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: Attacks and countermeasures,” Sensor Network Protocols and Applications (SNPA 03), May 2003.
[17] A. D. Wood and J. A. Stankovic, “Denial of service in sensor networks,” IEEE Computer, pp. 48-56, October 2002.
[18] W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “Energy efficient communication protocol for wireless microsensor networks,” in the 33rd Hawaii International Conference on System Sciences, 2000.
[19] P. Levis, N. Patel, D. Culler, and S. Shenker, “Trickle: A self-regulating algorithm for code propagation and maintenance in wireless sensor networks,” NSDI 2004, pp. 15-28, 2004.
[20] J. Deng, R. Han, and S. Mishra, “Practical study of transitory master key establishment for wireless sensor networks,” in 1st IEEE/CreateNet Conference on Security and Privacy in Communication Networks (SecureComm 2005), Athens, Greece, pp. 289-299, September 2005.
[21] P. Levis, N. Lee, M. Welsh, and D. Culler, “TOSSIM: Accurate and scalable simulation of entire tinyos applications,” in Proceedings of the First ACM Conference on Embedded Networked Sensor Systems (SenSys 2003), ACM Press, November 2003.
[22] D. R. Raymond and S. F. Midkiff, “Denial-of-service in wireless sensor networks: Attacks and defenses,” IEEE Pervasive Computing, 2008.
[23] S. Hyun, P. Ning, A. Liu, and W. L. Du, “Seluge: Secure and DoS-resistant code dissemination in wireless sensor networks,” In Proceedings of the Seventh International Conference on Information Processing in Sensor Networks (IPSN’08), April 2008.
[24] Y. Zhang, X. S. Zhou, Y. M. Ji, Z. Y. Fang, and L. F. Wang, “Secure and DoS-resistant network reprogramming in sensor networks based on CPK,” 4th IEEE International Conference on Wireless Communications, Networking and Mobile Computing, 2008.

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.