Research Article
BibTex RIS Cite

Gerçek-Zamanlı Kablosuz Algılayıcı Ağlarda Toplama Ağacı Protokolünün Yönlendirme Saldırılarına Karşı Dayanıklılığının Analizi ve Saldırı Tespit Sistemi Tasarımı

Year 2020, Volume: 8 Issue: 2, 249 - 257, 26.05.2020
https://doi.org/10.21541/apjes.617854

Abstract

Bu
çalışmada, Kablosuz Algılayıcı Ağlarda (KAA) çıkış deliği, kara delik, seçici
yönlendirme ve sahte düğüm saldırılarına karşı Toplama Ağacı Protokolü’nün
(CTP) dayanıklılığı gerçek zamanlı test ortamında analiz edilmiştir. Elde
edilen sonuçlar, bu saldırıların sistemde veri kayıplarına, ağda gereksiz
trafik yaratılmasına ve alternatif rotaların yok edilmesine neden olduğu;
CTP’nin bu saldırılara karşı herhangi bir önlem almadığını göstermektedir.
CTP’nin yönlendirme saldırılarına karşı dayanıksız olması, bu mimari için
gerçek zamanlı savunma sistemi tasarımını önemli kılmaktadır. Bu nedenle bu
çalışmada kara delik ve seçici yönlendirme saldırıları için komşu izleme
tabanlı bir saldırı tespit sistemi tasarlanmış ve sistem gerçek zamanlı olarak
test edilmiştir.  Bu çalışmanın, CTP
üzerinde saldırıların gerçek zamanlı davranış modellerini şekillendirmesi
açısından gelecekte tasarlanacak olan tespit ve yanıt sistemleri için temel
oluşturacağı düşünülmektedir.

References

  • I. Butun, S. D. Morgera and R. Sankar, "A Survey of Intrusion Detection Systems in Wireless Sensor Networks," in IEEE Communications Surveys & Tutorials, vol. 16, no. 1, pp. 266-282, First Quarter 2014.
  • Y. Zhou, Y. Fang and Y. Zhang, "Securing wireless sensor networks: a survey," in IEEE Communications Surveys & Tutorials, vol. 10, no. 3, pp. 6-28, Third Quarter 2008.
  • J. Horneber and A. Hergenröder, "A Survey on Testbeds and Experimentation Environments for Wireless Sensor Networks," in IEEE Communications Surveys & Tutorials, vol. 16, no. 4, pp. 1820-1838, Fourthquarter 2014.
  • O. R. M. Boudia, S. M. Senouci, and M. Feham, “A novel secure aggregation scheme for wireless sensor networks using stateful public key cryptography,” Ad Hoc Networks, vol. 32, pp. 98–113, 2015.
  • M. V. Ramesh, A. B. Raj and T. Hemalatha, "Wireless Sensor Network Security: Real-Time Detection and Prevention of Attacks," 2012 Fourth International Conference on Computational Intelligence and Communication Networks, Mathura, 2012, pp. 783-787.
  • K. Biswas, V. Muthukkumarasamy and K. Singh, "An Encryption Scheme Using Chaotic Map and Genetic Operations for Wireless Sensor Networks," in IEEE Sensors Journal, vol. 15, no. 5, pp. 2801-2809, May 2015.
  • Y. Tsou, C. Lu and S. Kuo, "MoteSec-Aware: A Practical Secure Mechanism for Wireless Sensor Networks," in IEEE Transactions on Wireless Communications, vol. 12, no. 6, pp. 2817-2829, June 2013.
  • F. Ishmanov and Y. B. Zikria, “Trust Mechanisms to Secure Routing in Wireless Sensor Networks: Current State of the Research and Open Research Issues,” Journal of Sensors, vol. 2017, pp. 1–16, 2017.
  • G. Zhan, W. Shi and J. Deng, "Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs," in IEEE Transactions on Dependable and Secure Computing, vol. 9, no. 2, pp. 184-197, March-April 2012.
  • S. Sultana, D. Midi, and E. Bertino, “Kinesis: a security incident response and prevention system for wireless sensor networks” Proceedings of the 12th ACM Conference on Embedded Network Sensor Systems - SenSys 14, 2014.
  • H. Sedjelmaci, S. M. Senouci and M. A. Abu-Rgheff, "An Efficient and Lightweight Intrusion Detection Mechanism for Service-Oriented Vehicular Networks," in IEEE Internet of Things Journal, vol. 1, no. 6, pp. 570-577, Dec. 2014.
  • P. Peter, H. Petr and N. Jan, "Simulation and Evaluation of CTP and Secure-CTP Protocols," Radioengineering, vol. 2010, no. 1, pp. 89-98.
  • A. Stetsko, L. Folkman and V. Matyas, "Neighbor-Based Intrusion Detection for Wireless Sensor Networks," 2010 6th International Conference on Wireless and Mobile Communications, Valencia, 2010, pp. 420-425.
  • L. Almon, M. Riecker and M. Hollick, "Lightweight Detection of Denial-of-Service Attacks on Wireless Sensor Networks Revisited," 2017 IEEE 42nd Conference on Local Computer Networks (LCN), Singapore, 2017, pp. 444-452.
  • B. Cui and S. J. Yang, "NRE: Suppress Selective Forwarding attacks in Wireless Sensor Networks," 2014 IEEE Conference on Communications and Network Security, San Francisco, CA, 2014, pp. 229-237.
  • C. Ioannou and V. Vassiliou, "The Impact of Network Layer Attacks in Wireless Sensor Networks," 2016 International Workshop on Secure Internet of Things (SIoT), Heraklion, 2016, pp. 20-28.
  • A. Dwivedi and O. Vyas, "An Exploratory Study of Experimental Tools for Wireless Sensor Networks," Wireless Sensor Network, Vol. 3 No. 7, 2011, pp. 215-240.
  • O. Gnawali, R. Fonseca, K. Jamieson, D. Moss, and P. Levis, “Collection tree protocol,” Proceedings of the 7th ACM Conference on Embedded Networked Sensor Systems - SenSys 09, 2009.
  • S. Basagni, C. Petrioli and D. Spenza, "CTP-WUR: The collection tree protocol in wake-up radio WSNs for critical applications," 2016 International Conference on Computing, Networking and Communications (ICNC), Kauai, HI, 2016, pp. 1-6.
  • E. C. H. Ngai, J. Liu and M. R. Lyu, "On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks," 2006 IEEE International Conference on Communications, Istanbul, 2006, pp. 3383-3389.
  • M. Al-Shurman, S.-M. Yoo, and S. Park, “Black hole attack in mobile Ad Hoc networks,” Proceedings of the 42nd annual Southeast regional conference on - ACM-SE 42, 2004.
  • C. Karlof and D. Wagner, "Secure routing in wireless sensor networks: attacks and countermeasures," Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003., Anchorage, AK, USA, 2003, pp. 113-127.
Year 2020, Volume: 8 Issue: 2, 249 - 257, 26.05.2020
https://doi.org/10.21541/apjes.617854

Abstract

References

  • I. Butun, S. D. Morgera and R. Sankar, "A Survey of Intrusion Detection Systems in Wireless Sensor Networks," in IEEE Communications Surveys & Tutorials, vol. 16, no. 1, pp. 266-282, First Quarter 2014.
  • Y. Zhou, Y. Fang and Y. Zhang, "Securing wireless sensor networks: a survey," in IEEE Communications Surveys & Tutorials, vol. 10, no. 3, pp. 6-28, Third Quarter 2008.
  • J. Horneber and A. Hergenröder, "A Survey on Testbeds and Experimentation Environments for Wireless Sensor Networks," in IEEE Communications Surveys & Tutorials, vol. 16, no. 4, pp. 1820-1838, Fourthquarter 2014.
  • O. R. M. Boudia, S. M. Senouci, and M. Feham, “A novel secure aggregation scheme for wireless sensor networks using stateful public key cryptography,” Ad Hoc Networks, vol. 32, pp. 98–113, 2015.
  • M. V. Ramesh, A. B. Raj and T. Hemalatha, "Wireless Sensor Network Security: Real-Time Detection and Prevention of Attacks," 2012 Fourth International Conference on Computational Intelligence and Communication Networks, Mathura, 2012, pp. 783-787.
  • K. Biswas, V. Muthukkumarasamy and K. Singh, "An Encryption Scheme Using Chaotic Map and Genetic Operations for Wireless Sensor Networks," in IEEE Sensors Journal, vol. 15, no. 5, pp. 2801-2809, May 2015.
  • Y. Tsou, C. Lu and S. Kuo, "MoteSec-Aware: A Practical Secure Mechanism for Wireless Sensor Networks," in IEEE Transactions on Wireless Communications, vol. 12, no. 6, pp. 2817-2829, June 2013.
  • F. Ishmanov and Y. B. Zikria, “Trust Mechanisms to Secure Routing in Wireless Sensor Networks: Current State of the Research and Open Research Issues,” Journal of Sensors, vol. 2017, pp. 1–16, 2017.
  • G. Zhan, W. Shi and J. Deng, "Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs," in IEEE Transactions on Dependable and Secure Computing, vol. 9, no. 2, pp. 184-197, March-April 2012.
  • S. Sultana, D. Midi, and E. Bertino, “Kinesis: a security incident response and prevention system for wireless sensor networks” Proceedings of the 12th ACM Conference on Embedded Network Sensor Systems - SenSys 14, 2014.
  • H. Sedjelmaci, S. M. Senouci and M. A. Abu-Rgheff, "An Efficient and Lightweight Intrusion Detection Mechanism for Service-Oriented Vehicular Networks," in IEEE Internet of Things Journal, vol. 1, no. 6, pp. 570-577, Dec. 2014.
  • P. Peter, H. Petr and N. Jan, "Simulation and Evaluation of CTP and Secure-CTP Protocols," Radioengineering, vol. 2010, no. 1, pp. 89-98.
  • A. Stetsko, L. Folkman and V. Matyas, "Neighbor-Based Intrusion Detection for Wireless Sensor Networks," 2010 6th International Conference on Wireless and Mobile Communications, Valencia, 2010, pp. 420-425.
  • L. Almon, M. Riecker and M. Hollick, "Lightweight Detection of Denial-of-Service Attacks on Wireless Sensor Networks Revisited," 2017 IEEE 42nd Conference on Local Computer Networks (LCN), Singapore, 2017, pp. 444-452.
  • B. Cui and S. J. Yang, "NRE: Suppress Selective Forwarding attacks in Wireless Sensor Networks," 2014 IEEE Conference on Communications and Network Security, San Francisco, CA, 2014, pp. 229-237.
  • C. Ioannou and V. Vassiliou, "The Impact of Network Layer Attacks in Wireless Sensor Networks," 2016 International Workshop on Secure Internet of Things (SIoT), Heraklion, 2016, pp. 20-28.
  • A. Dwivedi and O. Vyas, "An Exploratory Study of Experimental Tools for Wireless Sensor Networks," Wireless Sensor Network, Vol. 3 No. 7, 2011, pp. 215-240.
  • O. Gnawali, R. Fonseca, K. Jamieson, D. Moss, and P. Levis, “Collection tree protocol,” Proceedings of the 7th ACM Conference on Embedded Networked Sensor Systems - SenSys 09, 2009.
  • S. Basagni, C. Petrioli and D. Spenza, "CTP-WUR: The collection tree protocol in wake-up radio WSNs for critical applications," 2016 International Conference on Computing, Networking and Communications (ICNC), Kauai, HI, 2016, pp. 1-6.
  • E. C. H. Ngai, J. Liu and M. R. Lyu, "On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks," 2006 IEEE International Conference on Communications, Istanbul, 2006, pp. 3383-3389.
  • M. Al-Shurman, S.-M. Yoo, and S. Park, “Black hole attack in mobile Ad Hoc networks,” Proceedings of the 42nd annual Southeast regional conference on - ACM-SE 42, 2004.
  • C. Karlof and D. Wagner, "Secure routing in wireless sensor networks: attacks and countermeasures," Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003., Anchorage, AK, USA, 2003, pp. 113-127.
There are 22 citations in total.

Details

Primary Language Turkish
Subjects Engineering
Journal Section Articles
Authors

Çağlar Oflazoglu 0000-0001-5074-2617

İpek Abasıkeleş Turgut 0000-0002-5068-969X

Publication Date May 26, 2020
Submission Date September 10, 2019
Published in Issue Year 2020 Volume: 8 Issue: 2

Cite

IEEE Ç. Oflazoglu and İ. Abasıkeleş Turgut, “Gerçek-Zamanlı Kablosuz Algılayıcı Ağlarda Toplama Ağacı Protokolünün Yönlendirme Saldırılarına Karşı Dayanıklılığının Analizi ve Saldırı Tespit Sistemi Tasarımı”, APJES, vol. 8, no. 2, pp. 249–257, 2020, doi: 10.21541/apjes.617854.