Review On Hello Flood Attack in Wireless Sensor Networks
Review On Hello Flood Attack in Wireless Sensor Networks
Review On Hello Flood Attack in Wireless Sensor Networks
Dinesh Kumar
Department of Computer Science & Engineering
GZS Campus College of Engineering & Technology Bathinda,
Punjab, India
Abstract
Wireless sensor networks have emerged a wide application for monitoring physical environment. Energy efficiency, Processing
capability and communication range are the limitations of sensor networks. Moreover, the wireless networks are vulnerable to
certain types of network attacks. One of them is the hello flood attack, in which a non- legal node in the network can flood hello
requests to the legitimate nodes and break the security of WSN. The solutions for these types of attacks are mainly cryptographic
that suffers from heavy computational complexity. Hence, they are less suitable for wireless sensor networks. In this paper, a
new centralized intrusion detection system is proposed to detect and prevent hello flood attacks in cluster-based wireless sensors
networks. The main idea of using centralized detection scheme, in which the base station decides on potential intrusions based on
the control packets that are being sent from the cluster heads. The proposed energy efficient and simple intrusion detection
technique is thus suitable for sensor nodes with resource constrained. Moreso, the simulation result confirms the expected
performance of the proposed intrusion detection system in the terms of security and energy efficiency.
Keywords: Wireless Sensor Network, Centralized Intrusion Detection System _ Misuse Detection
_______________________________________________________________________________________________________
I.
INTRODUCTION
Military: monitor friendly forces, equipment; battlefield surveillance; reconnaissance of opposing forces; targeting; nuclear,
detection of biological and chemical attack.
Environmental: forest-fire detection; bio complexity-mapping of the environment; flood detection and the precision
agriculture.
Health: tele monitoring of humans physiological data; monitoring as well as tracking doctors and patients inside a hospital;
drug Administration in hospitals.
Home: the home automation; smart environment.
Other commercial areas: environmental control in office buildings; interactive museums; detecting and monitoring the car
thefts; vehicle tracking and detection.
II. CLUSTERING IN WSN
Clustering is a useful mechanism in large multi-hop wireless sensor networks to obtain scalability, low energy consumption and
better network performance. Most of the research has been focused on energy-efficient solutions, but has not thoroughly
133
analyzed the performance of network, e.g. in terms of data collection rate and time. It is evident that by organizing the sensor
nodes in groups i.e., nodes in the form of clusters, we can achieve significant network performance gains. Clustering not only
allows for aggregation, but also limits the transmission of data primarily within the cluster, thereby reducing both the network
traffic and the contention for the channel.
Grouping sensor nodes into clusters has been widely pursued by the research community in order to achieve the network
scalability objective. To support data aggregation through efficient network organization, nodes can be partitioned into a number
of small groups called clusters, where each cluster has a coordinator, referred to as a cluster head, and a no. of member nodes.
Clustering results in a two-tier hierarchy in which cluster heads (CHs) forms higher tier while member nodes form the lower tier.
The member nodes report about their data to the respective CHs. The CHs aggregate the data and send to the central base
through other CHs as CHs often transmit data over longer distances and they lose more energy as compared to member nodes.
The network may be periodically reclustered in order to select the energy abundant nodes to serve as CHs, thus distributing the
load uniformly to all the nodes. Besides achieving energy efficiency, clustering reduces the channel contention and collisions of
packet, resulting in better network throughput under high load.
A CH can schedule the activities in cluster so that the nodes can switch most of the time to the low-power sleep mode and
reduces the rate of energy consumption. Sensors can be engaged in a round-robin order and the time for their transmission and
reception can be determined so to avoid sensors reties, redundancy can be limited and medium access collision is prevented.
Moreso, a CH can aggregate the whole data collected by the sensors in its cluster and thus decrease the no. of relayed packets.
III. HELLO FLOOD ATTACK
Many of the protocols which use HELLO packets make the naive assumption that receiving such a packet means that the sender
is within radio range and is therefore a neighbor. An adversary may use a high-powered transmitter to track a large area of nodes
believing that they are neighbors of that transmitting node. If the adversary broadcasts falsely a superior route to the base station,
all of these nodes will attempt the transmission to the attacking node, despite many being out of radio range in reality.
In WSNs, two of the most important concerns are the requirement of low power consumption and the vulnerability to many types
of security threats. In order to address the above points, we have proposed in this paper an intrusion detection system(IDS)
dedicated to cluster-based wireless sensor networks(WSNs). In fact, our IDS can detect routing attacks such as black hole
attacks. Our IDS uses a simple intrusion detection technique and is energy efficient, it is thus suitable for sensor nodes with
resource constrained .Here the detection of Hello Flood Attacks is done and the protocols which use HELLO packets make the
assumption that receiving such a packet means sender is within radio range and is therefore a neighbor.
REFERENCES
[1]
[2]
[3]
[4]
[5]
A.Stetsko; L. Folkman; V. Matyas , Neighbor-Based Intrusion Detection for Wireless Sensor Networks FIMU-RS-2010-04,May 2010.
C.S Dutta; Utpal Biswas, Intrusion Detection System for Power-Aware OLSR , Jan. 12, 2015 to Jan. 13, 2015, ISBN: 978-1-4799-7548-8, pp: 142147,2015.
Faouzi Hidoussi, Homero Toral-Cruz, Djallel Eddine Boubiche, Kamaljit Lakhtaria, Albena Mihovska, Miroslav Voznak, Centralized IDS Based on
Misuse Detection for Cluster-Based Wireless Sensors Networks,Vol.85, No.1,2015.
Yi-Ying Zhang; Wen-Cheng Yanng; Kee- Bum Kim; Min-Yu Cui; Myong-Soon Park, A Rekey-Boosted Security Protocol in Hierarchical Wireless
Sensor Network International Conference on Multimedia and Ubiquitous Engineering, MUE-2008.
S.Magotra, K. Kumar, Detection of HELLO flood attack on LEACH protocol, IEEE 2014.
134
Haiguang Chen; Huafeng Wu; Xi Zhou; Chuanshan Gao, Key Feature and Rule-based Intrusion Detection for Wireless Sensor Networks, Network and
Parallel computing workshops,2007.
Saleem, M. S. Khalil, N. Fisal, A. A. Ahmed , Efficient Random Key Based Encryption System for Data Packet Confidentiality in WSNs ,IEEE
International Conference on Trust, Security and Privacy in Computing and Communications, 2013.
A.S.K Pathan, Security in wireless sensor networks: issues and challenges, ICACT-2006.
Kun Zhang , A Secure Routing Protocol for Cluster-Based Wireless Sensor Networks Using Group Key Management, IEEE March 2014.
Virendra Pal Singh; Sweta Jain; Jyoti Singhai, Hello Flood Attack and its Countermeasures in Wireless Sensor Networks, IJCSI, May 2010.
X. Zhenghong, C. Zhigang , A Secure Routing Protocol with Intrusion Detection for Clustering Wireless Sensor Networks, IEEE 2010.
B. Kannhavong, A survey of routing attacks in mobile ad hoc networks , IEEE October 2007.
Tanveer A Zia; Md Zahidul Islam, Communal Reputation and Individual Trust (CRIT) in Wireless Sensor Networks, IEEE Feb 2010.
135