This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Quarantine Region Scheme to Mitigate Spam Attacks in Wireless Sensor Networks
August 2006 (vol. 5 no. 8)
pp. 1074-1086
The Quarantine Region Scheme (QRS) is introduced to defend against spam attacks in wireless sensor networks where malicious antinodes frequently generate dummy spam messages to be relayed toward the sink. The aim of the attacker is the exhaustion of the sensor node batteries and the extra delay caused by processing the spam messages. Network-wide message authentication may solve this problem with a cost of cryptographic operations to be performed over all messages. QRS is designed to reduce this cost by applying authentication only whenever and wherever necessary. In QRS, the nodes that detect a nearby spam attack assume themselves to be in a quarantine region. This detection is performed by intermittent authentication checks. Once quarantined, a node continuously applies authentication measures until the spam attack ceases. In the QRS scheme, there is a trade-off between the resilience against spam attacks and the number of authentications. Our experiments show that, in the worst-case scenario that we considered, a not quarantined node catches 80 percent of the spam messages by authenticating only 50 percent of all messages that it processes.

[1] I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “Wireless Sensor Networks: A Survey,” Computer Networks J., vol. 38, no. 4, pp. 393-422, 2002.
[2] C. Karlof and D. Wagner, “Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures,” Ad Hoc Networks, vol. 1, nos. 2-3, pp. 293-315, Sept. 2003.
[3] A.D. Wood and J.A. Stankovic, “Denial of Service in Sensor Networks,” Computer, vol. 35, pp. 54-62, 2002.
[4] W. Stallings, Cryptography and Network Security, third ed. Prentice Hall, 2003.
[5] H. Krawczyk, M. Bellare, and R. Canetti, “RFC 2104— HMAC: Keyed-Hashing for Message Authentication,” 1997.
[6] R.L. Rivest, “RFC 1321— The MD5 Message-Digest Algorithm,” 1992.
[7] J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. Culler, and K. Pister, “System Architecture Directions for Network Sensors,” Proc. Int'l Conf. Architectural Support for Programming Languages and Operating Systems, 2000.
[8] S. Bhattacharya, H. Kim, S. Prabh, and T.F. Abdelzaher, “Energy-Conserving Data Placement and Asynchronous Multicast in Wireless Sensor Networks,” Proc. Int'l Conf. Mobile Systems, Applications, and Services, 2003.
[9] http://www.atmel.com/productsAVR, Oct. 2003.
[10] J. Beutel, “Location Management in Wireless Sensor Networks, Handbook of Sensor Networks,” Compact Wireless and Wired Sensing Systems, July 2004.
[11] A. Nasipuri and K. Li, “A Directionality Based Location Discovery Scheme for Wireless Sensor Networks,” Proc. First ACM Workshop Wireless Sensor Networks and Applications, pp. 105-111, 2002.
[12] A. Savvides, H. Park, and M.B. Srivastava, “The Bits and Flops of the N-Hop Multilateration Primitive for Node Localization Problems,” Proc. First ACM Workshop Wireless Sensor Networks and Applications, pp. 112-121, 2002.
[13] Z. Li, W. Trappe, Y. Zhang, and B. Nath, “Robust Statistical Methods for Securing Wireless Localization in Sensor Networks,” Proc. Int'l Symp. Information Processing in Sensor Networks, 2005.
[14] G. Amato, A. Caruso, S. Chessa, V. Masi, and A. Urpi, “State of the Art and Future Directions in Wireless Sensor Network's Data Management,” Istituto di Scienza e Tecnologie dell'Informazione del CNR, May 2004.
[15] J. Hightower and G. Borriello, “Location Systems for Ubiquitous Computing,” Computer, vol. 34, no. 8, pp. 57-66, Aug. 2001.
[16] L. Lazos and R. Poovendran, “SeRLoc: Secure Range-Independent Localization for Wireless Sensor Networks,” Proc. ACM Workshop Wireless Security, 2004.
[17] L. Fang, W. Du, and P. Ning, “A Beacon-Less Location Discovery Scheme for Wireless Sensor Networks,” Proc. IEEE Infocom, 2005.
[18] H. Chan, A. Perrig, and D. Song, “Random Key Predistribution Schemes for Sensor Networks,” Proc. IEEE Symp. Security and Privacy, pp. 197-213, May 2003.
[19] W. Du, J. Deng, Y. Han, and P. Varshney, “A Pairwise Key Predistribution Scheme for Wireless Sensor Networks,” Proc. 10th ACM Conf. Computer and Comm. Security, Oct. 2003.
[20] L. Eschenauer and V. Gligor, “A Key-Management Scheme for Distributed Sensor Networks,” Proc. Ninth ACM Conf. Computer and Comm. Security, Oct. 2002.
[21] D. Liu and P. Ning, “Establishing Pairwise Keys in Distributed Sensor Networks,” Proc. 10th ACM Conf. Computer and Comm. Security, Oct. 2003.
[22] R. Di Pietro, L.V. Mancini, and S. Jajodia, “Providing Secrecy in Key Management Protocols for Large Wireless Sensors Networks,” Ad Hoc Networks, vol. 1, no. 4, pp. 455-468, Nov. 2003.
[23] A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J.D. Tygar, “SPINS: Security Protocols for Sensor Networks,” Proc. Int'l Conf. Mobile Computing and Networks (MobiCom '01), pp. 189-199, 2001.
[24] Y.C. Hu, A. Perrig, and D.B. Johnson, “Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks,” Proc. IEEE Infocom, Mar. 2003.
[25] C. Intanagonwiwat, R. Govindan, and D. Estrin, “Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks,” Proc. Sixth Ann. Int'l Conf. Mobile Computing and Networks (MobiCom '00), 2000.
[26] A. Perrig, J. Stankovic, and D. Wagner, “Security in Wireless Sensor Networks,” Comm. ACM, vol. 47, no. 6, pp. 53-57, June 2004.
[27] F. Stajano and R. Anderson, “The Resurrecting Duckling: Security Issues for Ad-Hoc Wireless Networks,” Proc. Seventh Int'l Workshop Security Protocols, pp. 172-182, 2000.
[28] L. Zhou and Z.J. Haas, “Securing Ad Hoc Networks,” IEEE Network Magazine, vol. 13, no. 6, pp. 24-30, 1999.
[29] J.P. Hubaux, L. Buttyan, and S. Capkun, “The Quest for Security in Mobile Ad Hoc Networks,” Proc. ACM Symp. Mobile Ad Hoc Networking and Computing, 2001.
[30] S. Marti, T.J. Giuli, K. Lai, and M. Baker, “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks,” Proc. Sixth Ann. Int'l Conf. Mobile Computing and Networking (MobiCom '00), pp. 255-265, 2000.
[31] D.B. Johnson, D.A. Maltz, and J. Broch, “DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks,” Ad Hoc Networking, C.E. Perkins, ed., chapter 5, pp. 139-172, Addison-Wesley, 2001.
[32] P. Michiardi and R. Molva, “Core: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks,” Proc. Comm. and Multimedia Security Conf., 2002.
[33] P. Michiardi and R. Molva, “Prevention of Denial of Service Attacks and Selfishness in Mobile Ad Hoc Networks,” Research Report RR-02-063, Institut Eurecom, 2002.
[34] P. Michiardi and R. Molva, “Simulation-Based Analysis of Security Exposures in Mobile Ad Hoc Networks,” Proc. European Wireless 2002: Next Generation Wireless Networks: Technologies, Protocols, Services and Applications, Feb. 2002.
[35] F. Hu, J. Ziobro, J. Tillett, and N.K. Sharma, “Secure Wireless Sensor Networks: Problems and Solutions,” J. Systemics, Cybernetics, and Informatics, vol. 1, no. 4, 2004.
[36] J.R. Douceur, “The Sybil Attack,” Proc. First Int'l Workshop Peer-to-Peer Systems (IPTPS '02), 2002.
[37] J. Deng, R. Han, and S. Mishra, “INSENS: Intrusion-Tolerant Routing in Wireless Sensor Networks,” Technical Report CU-CS-939-02, Dept. of Computer Science, Univ. of Colorado, Nov. 2002.
[38] J. Deng, R. Han, and S. Mishra, “A Performance Evaluation of Intrusion Tolerant Routing in Wireless Sensor Networks,” Proc. Second IEEE Int'l Workshop Information Processing in Sensor Networks (IPSN 2003), pp. 349-364, Apr. 2003.
[39] F. Ye, H. Luo, S. Lu, and L. Zhang, “Statistical En-Route Detection and Filtering of Injected False Data in Sensor Networks,” Proc. IEEE Infocom, 2004.
[40] S. Zhu, S. Setia, S. Jajodia, and P. Ning, “An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks,” Proc. IEEE Symp. Security and Privacy, pp. 260-272, 2004.
[41] H. Vogt, “Exploring Message Authentication in Sensor Networks,” Proc. First European Workshop Security in Ad Hoc and Sensor Networks, Aug. 2004.
[42] R. Di Pietro, L.V. Mancini, and S. Jajodia, “Secure Selective Exclusion in Ad Hoc Wireless Network,” Security in the Information Society: Visions and Perspectives, M.A. Ghonaimy, M.T. El-Hadidi, and H.K. Aslan, eds., pp. 423-434, Kluwer Academic, 2002.
[43] S. Zhu, S. Xu, S. Setia, and S. Jajodia, “Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach,” Proc. 11th IEEE Int'l Conf. Network Protocols (ICNP '03), Nov. 2003.

Index Terms:
Network-level security and protection, wireless sensor networks, authentication, quarantine region, spam attacks.
Citation:
Vedat Coskun, Erdal Cayirci, Albert Levi, Serdar Sancak, "Quarantine Region Scheme to Mitigate Spam Attacks in Wireless Sensor Networks," IEEE Transactions on Mobile Computing, vol. 5, no. 8, pp. 1074-1086, Aug. 2006, doi:10.1109/TMC.2006.121
Usage of this product signifies your acceptance of the Terms of Use.