Poster: Wormhole Attacks on Asynchronous Duty-Cycling Sensor Networks and Their Countermeasures WenYang Wang

Takashi Minohara

Department of Computer Science Takushoku University

Department of Computer Science Takushoku University

[email protected]

[email protected]

Abstract Because of the open nature of the wireless communication, wireless sensor networks(WSNs) will face security issues. Wormhole attack is one of the most serious attacks against WSNs, since wormholes are created with regular routing procedure, and they are difficult to detect. Most of the proposed methods against wormhole attack assume continuous operation, so it is hard to apply them to actual WSNs which reduce their power consumption by duty-cycling operation. The duty-cycling WSNs can be classified into synchronous and asynchronous. In this paper, we focused on the wormhole attacks to asynchronous duty-cycling WSNs, and propose their countermeasures using signed acknowledgments. We have developed a prototype implementation of the attacker node and the proposed detection mechanism for the Contiki Rime protocol, and evaluated that the wormhole attacks can be detected by the adjacent nodes of the attacker.

1

Introduction

In wireless sensor networks(WSNs), the sensor nodes are required long life time with small size batteries or solar panels, so they usually work in duty-cycling operation in order to reduce their power consumption. In duty-cycling WSNs, radios of sensor nodes are stopped periodically, and any special mechanism must be used for controlling communication timing, WSNs will also face security issues because of the open nature of the wireless communication. The wormhole attack is one of the most serious attacks against WSNs, because wormholes are created with regular routing procedure. Various countermeasures against wormhole attacks are proposed[1, 3], but most of them assume continuous operation, which is not satisfied in duty-cycling WSNs. In this work, we focused on an actual behavior of WSN, and propose their countermeasures.

International Conference on Embedded Wireless Systems and Networks (EWSN) 2018 14–16 February, Madrid, Spain © 2018 Copyright is held by the authors. Permission is granted for indexing in the ACM Digital Library ISBN: 978-0-9949886-2-1

2

Wormhole Attack to Asynchronous Dutycycling WSNs

The duty-cycling operation of WSNs can be classified into synchronous and asynchronous categories. Time synchronization[4] between nodes is necessary for typical synchronous protocols, and wormhole attacks to synchronous WSNs will be detectable by observing delays in the synchronization phase. A variety of asynchronous dutycycling operations are employed in MAC-layer protocols, which can be categorized into sender-initiated or receiverinitiated MAC protocols. An attacker node needs to fake the MAC protocols in either case, in order to communicate with normal nodes. In this paper, we focus on the Contiki-MAC protocol, which is one of the sender-initiated MAC protocols, and has been implemented in a variety of sensor network hardwares with Contiki-OS[2]. As illustrated in Figure 1, which is an example packet transmission of the Contiki-MAC protocol, a sender transmits data packets repeatedly until a receiver replies with an acknowledgment or a period of transmission exceeds a sleeping interval of the receiver. The receiver, thus, can detect radio and receive a data packet when it wakes up. Ns

send recv

Nr

send recv

D

D

D

D A

A D

Reception window

D

Data packet

A

Acknowledgement

Figure 1. Example packet transmission of the ContikiMAC We investigated the attacks to the Contiki-MAC with assuming that a pair of attacker nodes (W1 and W2) can communicate with each other by an outbound link, and they can monitor radio continuously. There are two types of attacks to the Contiki-MAC, in which the attackers use different way to send the acknowledgments. Figure 2 illustrates the type 1 attack, where the attacker W1 receives a data packet from a sender Ns and sends a fake acknowledgment immediately and also transfers the data packet to the corresponding attacker W2. W2 resends the data packet to the receiver Nr with using the Contiki-MAC protocol and accepts its acknowledgment.

183

Ns

send recv

W1

send recv

W2

send recv

Nr

send recv

D1

sender can notice that the correspondence between a challenge and its response is not adequate. We have developed a prototype implementation of the attacker node and the proposed detection mechanism for the Contiki Rime protocol, and conducted some evaluation with the Cooja simulator and also the Memsic’s IRIS motes. The IRIS motes are equipped with 8-bit Atmel AVR ATmega128 clocked at 7.37 MHz, with 8KB SRAM and 128KB of Flash ROM, The outbound link for the wormhole is implemented on TCP connections relayed by an attacker PC using the MIB600 Ethernet interface boards (Figure 4).

A1’

A1’ D1

D1 D1 D1 A1

A1 D1

Reception window

D

A

Data packet

IRIS mote

Acknowledgement

Figure 2. Type 1 attack to the ContikiMAC Ns

send recv

IRIS mote

ethenet I/F

IRIS mote Attacker PC

IRIS mote

ethenet I/F

D1 D2 D3 D4 D5

IP Network

A3

Figure 4. Implementation of a wormhole attack W1

send recv

W2

send recv

Nr

send recv

A3 D1 D2 D3 D4 D5

D1 D2 D3 D4 D5 A3

A3 D3

Reception window

D

Data packet

A

Acknowledgement

Figure 3. Type 2 attack to the ContikiMAC Figure 3 illustrates the type 2 attack, where the attacker W1 transfers every received data packet from sender Ns to the corresponding attacker W2, and W2 resends the packets to the receiver Nr as they are. An acknowledgment packet sent by Nr is transferred through the reverse path, and replayed by W1 so that Ns can receive it.

3

Detection of the Wormhole Attacks by Using Signed Acknowledgments

In the type 1 attacks (Figure 2), the sender-side attacker arbitrarily generates acknowledgments without waiting for the receiver’s responses, thus the attacker cannot reproduce the proper acknowledgments if the receiver changes them every time. We propose a challenge-response type signature attached to the acknowledgment. secret informations used for calculating a response is shared among the proper nodes in the WSN, so that each sender can examine the authenticity of the acknowledgments. In the type 2 attacks, the sender-side attacker replays the acknowledgments received by the receiver-side attacker. And thus the challenges of the sender must be changed on every repetition of the data packets so that the acknowledgments are different for each data packe. As shown in Figure 3, the acknowledgments from attackers are delayed because they go to the other side of wormhole and return, so the

184

We use a simple challenge-response scheme with assuming a secret value s and encryption key k are shared by sender and receiver. A sender sends message with random number r as a challenge. On receiving the message, the receiver concatenates r and s, and encrypts it with key k. Then a part of encrypted response {r, s}K is sent back to the sender in the Ack message. The sender also computes a response value and compares it with the response in the Ack. Although our implementation is simpler than other approaches [5], we encrypt the response value only and the burden is feasible for the motes with limited computational resources.

4

Conclusion

In this paper, we have investigated the wormhole attack to the asynchronous duty-cycling WSNs, and proposed a detection method using signed acknowledgments. Our method can detect the attacker node at the adjacent nodes and wormhole will be avoided by adding penalty cost in the route selection. The implementation of the routing for taking a detour remains as future work.

5

Acknowledgments

A part of this work was supported by JSPS KAKENHI Grant Number 25330158.

6

References

[1] D. Buch and D. Jinwala. Prevention of wormhole attack in wireless sensor netwok. International Journal of Network Security & Its Applications, 3(5):85–98, Sept. 2011. [2] A. Dunkels, B. Gronvall, and T. Voigt. Contiki - a lightweight and flexible operating system for tiny networked sensors. In 29th Annual IEEE International Conference on Local Computer Networks, pages 455–462, Nov 2004. [3] I. Khalil and S. Bagchi. Stealthy attacks in wireless ad hoc networks: Detection and countermeasure. IEEE Transactions on Mobile Computing, 10(8):1096–1112, 2011. [4] M. Mar´oti, B. Kusy, G. Simon, and A. L´edeczi. The flooding time synchronization protocol. In Proceedings of the 2Nd International Conference on Embedded Networked Sensor Systems, SenSys ’04, pages 39–49, New York, NY, USA, 2004. ACM. [5] E. K. Ryu and K. Y. Yoo. Practical techniques for ack authentication in ieee 802.15. 4 networks. Applied Mathematics & Information Sciences, 9(4):2169–2174, 2015.

Wormhole Attacks on Asynchronous Duty-Cycling ...

the open nature of the wireless communication. The worm- hole attack is one of the most serious attacks against WSNs, because wormholes are created with regular routing proce- dure. Various countermeasures against wormhole attacks are proposed[1, 3], but most of them assume continuous oper- ation, which is not ...

138KB Sizes 0 Downloads 178 Views

Recommend Documents

Poster: Detection of Wormhole Attack on Wireless Sensor ... - EWSN
Poster: Detection of Wormhole Attack on Wireless Sensor ... wireless sensor nodes are duty-cycling, i.e. they will period- .... Cambridge Unversity Press, 2009.

On Optimal Probabilistic Asynchronous Byzantine ...
multivalued consensus protocol. We propose the long message multi-valued con- sensus protocols in the asynchronous networks (there is no common global clock and message delivery time is indefinite) using the asynchronous short message broadcast proto

Attacks on Christian refugees - Open Doors
tians in Germany/Munich) called a press conference in Berlin. The organisations ..... quickly ran back into my room to call a few of my friends. Together we went.

Social Engineering Attacks on Government Opponents - Privacy ...
seized) account, and indeed 40% of subjects had no strategy to recover their compromised accounts, and. 57% reported no strategy if they lost their phone.

Social Engineering Attacks on Government Opponents - Privacy ...
find important differences in terms of the subjects' per- ceptions of risk .... tifiers S1–S30) over a two year period between March. 2014 and March 2016.

Attacks on Christian refugees - Open Doors
Operators and the management of the refugee facilities play a pivotal role .... addressed all Muslim staff regarding the religiously motivated attacks. He stressed ... In Rotenburg this became apparent after numerous reports mentioned one of ...... I

Through the Wormhole s04e07.pdf
Through the Wormhole s04e07.pdf. Through the Wormhole s04e07.pdf. Open. Extract. Open with. Sign In. Main menu. Displaying Through the Wormhole ...

472 MHz throughput asynchronous FIFO design on a ...
In the international technology roadmap for semiconductor (ITRS) [1], asyn- chronous circuit design techniques are considered as a promising design al-.

Prevention of Blackhole Attacks on Aodv Routing Protocol In ... - IJRIT
1Assistant Professor, Dept. of Computer Applications, Pachaiyappa's College, ... protocol(DSDV), Wireless Routing Protocol (WRP), Cluster-Head Gateway.

Prevention of Blackhole Attacks on Aodv Routing Protocol In ... - IJRIT
and destination with minimum overhead and minimum bandwidth consumption so that packets are delivered in a timely manner. .... We deploy a credit mechanism to check the next hop whether it can be trusted or not. .... other wireless networks, and the

Differential and Rectangle Attacks on Reduced-Round ...
1 Information Security Group, Royal Holloway, University of London. Egham, Surrey ..... A generic key recovery algorithm based on a rectangle distinguisher was first presented by ... Anyway, as the data requirement of the attack is the entire.

A Survey on Obstruction of Confidential Information Attacks in Social ...
To appreciate the feasibility of probable inference attacks and the efficiency of a variety of techniques of sanitization combating against those attacks, various methods were applied. Keywords: Social networking, K-anonymity, Private information lea

Evil Pickles: DoS attacks based on Object-Graph ...
May 18, 2017 - submitting a large number of different web sites that all have the same hash code ... creating the respective object graph in the host language first. .... 8 s1.add(t1);. 9 s1.add(t2);. 10 s2.add(t1);. 11 s2.add(t2);. 12 s1 = t1; .....

Limiting False Data Attacks on Power System State ...
advantage of the inherent sparsity of the false data injection. Index Terms-Power .... sults and comparisons with the L2 detector on the IEEE 14-bus test system.

Almost Universal Forgery Attacks on the COPA and ...
ABSTRACT. The COPA authenticated encryption mode was proved to have a birthday-bound security on integrity, and its instanti- ation AES-COPA (v1/2) was claimed or conjectured to have a full security on tag guessing. The Marble (v1.0/1.1/1.2) authenti

Posting on North Canton Website - Political Attacks (1).pdf ...
Police Department ... • ... Precinct Map. City Parks. Mayor and ... Osborne appeals to Ohio Supreme Court and receives a third rejection on his claim against City.

Side-channel attacks based on linear approximations
intermediate values by query (i.e. power trace) allowing to reduce data complexity ..... an implementation where countermeasures have been added against DPA but limited to ..... Des and differential power analysis (the ”duplication” method).

Injection attacks on 802.11n MAC frame aggregation (PDF Download ...
duce MAC layer overhead: MAC Service Data Unit (MSDU). aggregation or A-MSDU, and MAC Protocol Data Unit. (MPDU) aggregation or A-MPDU. Figure 1: ...

Stealth DoS Attacks on Secure Channels
Obsoleted by RFC 4301, updated by RFC 3168. [27] S. Kent and K. Seo. Security Architecture for the Internet. Protocol. RFC 4301 (Proposed Standard), Dec.