Danger theory based node replication attack detection and mitigation in cluster mobile wireless sensor nodes

Mobile wireless sensor networks (MWSNs) comprise a collection of mobile sensor nodes with confined and finite resources. They commonly operate in hostile environments such as battle fields and surveillance zones, and due to their operating nature, MWSNs are often unattended, and generally are not eq...

Full description

Saved in:
Bibliographic Details
Main Author: Shaukat, Haafizah Rameeza
Format: Thesis
Language:English
Published: 2014
Subjects:
Online Access:http://psasir.upm.edu.my/id/eprint/64356/1/FK%202014%20141IR.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
id my-upm-ir.64356
record_format uketd_dc
spelling my-upm-ir.643562018-06-13T01:28:31Z Danger theory based node replication attack detection and mitigation in cluster mobile wireless sensor nodes 2014-09 Shaukat, Haafizah Rameeza Mobile wireless sensor networks (MWSNs) comprise a collection of mobile sensor nodes with confined and finite resources. They commonly operate in hostile environments such as battle fields and surveillance zones, and due to their operating nature, MWSNs are often unattended, and generally are not equipped with tamper-resistant tools. With little effort, an adversary may capture the nodes, analyze and replicate them, and surreptitiously insert these replicas at strategic locations within the network. Such attacks may have severe consequences; they may allow the adversary to corrupt network data or even disconnect significant parts of the network. Therefore, the detection of node replication attacks in MWSN is very important. Existing node replication detection schemes depend primarily on centralized mechanisms with single points of failure and slow detection. Moreover, majority of the schemes do not consider node mobility, thus are unsuitable for implementation in MWSN environment. To address these fundamental limitations, this thesis utilizes the concept of Danger Theory (DT) to secure MWSN from node replication attacks. The DT operates based on a multilevel detection, thereby improving the detection of replica in the network. According to this theory, whenever the meeting frequency of any two nodes in the MWSN goes beyond a certain threshold (i.e., derived based on nodes location and time interval), the witness node will broadcast security message to base station (BS), which is then responsible to set up a Danger Zone (DZ) around the infected cluster. Sensor nodes within the DZ area will then initiate the next level of detection and mitigation process by exchanging security information among them. Specifically, the proposed DT scheme is categorized into three stages, namely the 1st level detection, 2nd level detection and 3rd level detection. To recognize malicious replica in MWSN, the first approach is used to highlight the possibility of replica attack and to identify the infected area in the MWSN. The second approach is used to mitigate the attacks by focusing on the fact that a replica node always has higher voltage compared to the original one, as replica is generated after the deployment of the original node or password check. Lastly, the third approach is used to protect the network (i.e., mitigation process), as BS will alert other BSs (and nodes) about the existence of replica. The evaluations of the proposed scheme in respect of security features and performance overheads are carried out through intensive analysis and simulations, as well as extensive comparison with other schemes. The findings from these evaluations indicate that the proposed DT based node replica detection achieve robust, fast and effective detection (i.e., true positive more than 90%, false positive less than 1% and false negative less than 0.2% rates) while introducing reasonable overheads. Wireless communication systems - Security measures Mobile Wireless 2014-09 Thesis http://psasir.upm.edu.my/id/eprint/64356/ http://psasir.upm.edu.my/id/eprint/64356/1/FK%202014%20141IR.pdf text en public masters Universiti Putra Malaysia Wireless communication systems - Security measures Mobile Wireless
institution Universiti Putra Malaysia
collection PSAS Institutional Repository
language English
topic Wireless communication systems - Security measures
Mobile
Wireless
spellingShingle Wireless communication systems - Security measures
Mobile
Wireless
Shaukat, Haafizah Rameeza
Danger theory based node replication attack detection and mitigation in cluster mobile wireless sensor nodes
description Mobile wireless sensor networks (MWSNs) comprise a collection of mobile sensor nodes with confined and finite resources. They commonly operate in hostile environments such as battle fields and surveillance zones, and due to their operating nature, MWSNs are often unattended, and generally are not equipped with tamper-resistant tools. With little effort, an adversary may capture the nodes, analyze and replicate them, and surreptitiously insert these replicas at strategic locations within the network. Such attacks may have severe consequences; they may allow the adversary to corrupt network data or even disconnect significant parts of the network. Therefore, the detection of node replication attacks in MWSN is very important. Existing node replication detection schemes depend primarily on centralized mechanisms with single points of failure and slow detection. Moreover, majority of the schemes do not consider node mobility, thus are unsuitable for implementation in MWSN environment. To address these fundamental limitations, this thesis utilizes the concept of Danger Theory (DT) to secure MWSN from node replication attacks. The DT operates based on a multilevel detection, thereby improving the detection of replica in the network. According to this theory, whenever the meeting frequency of any two nodes in the MWSN goes beyond a certain threshold (i.e., derived based on nodes location and time interval), the witness node will broadcast security message to base station (BS), which is then responsible to set up a Danger Zone (DZ) around the infected cluster. Sensor nodes within the DZ area will then initiate the next level of detection and mitigation process by exchanging security information among them. Specifically, the proposed DT scheme is categorized into three stages, namely the 1st level detection, 2nd level detection and 3rd level detection. To recognize malicious replica in MWSN, the first approach is used to highlight the possibility of replica attack and to identify the infected area in the MWSN. The second approach is used to mitigate the attacks by focusing on the fact that a replica node always has higher voltage compared to the original one, as replica is generated after the deployment of the original node or password check. Lastly, the third approach is used to protect the network (i.e., mitigation process), as BS will alert other BSs (and nodes) about the existence of replica. The evaluations of the proposed scheme in respect of security features and performance overheads are carried out through intensive analysis and simulations, as well as extensive comparison with other schemes. The findings from these evaluations indicate that the proposed DT based node replica detection achieve robust, fast and effective detection (i.e., true positive more than 90%, false positive less than 1% and false negative less than 0.2% rates) while introducing reasonable overheads.
format Thesis
qualification_level Master's degree
author Shaukat, Haafizah Rameeza
author_facet Shaukat, Haafizah Rameeza
author_sort Shaukat, Haafizah Rameeza
title Danger theory based node replication attack detection and mitigation in cluster mobile wireless sensor nodes
title_short Danger theory based node replication attack detection and mitigation in cluster mobile wireless sensor nodes
title_full Danger theory based node replication attack detection and mitigation in cluster mobile wireless sensor nodes
title_fullStr Danger theory based node replication attack detection and mitigation in cluster mobile wireless sensor nodes
title_full_unstemmed Danger theory based node replication attack detection and mitigation in cluster mobile wireless sensor nodes
title_sort danger theory based node replication attack detection and mitigation in cluster mobile wireless sensor nodes
granting_institution Universiti Putra Malaysia
publishDate 2014
url http://psasir.upm.edu.my/id/eprint/64356/1/FK%202014%20141IR.pdf
_version_ 1747812293986484224