UnMask

Utilizing neighbor monitoring for attack mitigation in multihop wireless sensor networks

Issa Khalil, Saurabh Bagchi, Cristina N. Rotaru, Ness B. Shroff

Research output: Contribution to journalArticle

38 Citations (Scopus)

Abstract

Sensor networks enable a wide range of applications in both military and civilian domains. However, the deployment scenarios, the functionality requirements, and the limited capabilities of these networks expose them to a wide range of attacks against control traffic (such as wormholes, rushing, Sybil attacks, etc.) and data traffic (such as selective forwarding). In this paper we propose a framework called UnMask that mitigates such attacks by detecting, diagnosing, and isolating the malicious nodes. UnMask uses as a fundamental building block the ability of a node to oversee its neighboring nodes' communication. On top of UnMask, we build a secure routing protocol, Lsr, that provides additional protection against malicious nodes by supporting multiple node-disjoint paths. We analyze the security guarantees of UnMask and use ns-2 simulations to show its effectiveness against representative control and data attacks. The overhead analysis we present shows that UnMask is a lightweight protocol appropriate for securing resource constrained sensor networks.

Original languageEnglish
Pages (from-to)148-164
Number of pages17
JournalAd Hoc Networks
Volume8
Issue number2
DOIs
Publication statusPublished - 1 Mar 2010
Externally publishedYes

Fingerprint

Sensor networks
Wireless sensor networks
Monitoring
Traffic control
Routing protocols
Network protocols
Communication

Keywords

  • Control attack
  • Data attack
  • Neighbor monitoring
  • Secure routing
  • Sensor network security

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Hardware and Architecture
  • Software

Cite this

UnMask : Utilizing neighbor monitoring for attack mitigation in multihop wireless sensor networks. / Khalil, Issa; Bagchi, Saurabh; Rotaru, Cristina N.; Shroff, Ness B.

In: Ad Hoc Networks, Vol. 8, No. 2, 01.03.2010, p. 148-164.

Research output: Contribution to journalArticle

Khalil, Issa ; Bagchi, Saurabh ; Rotaru, Cristina N. ; Shroff, Ness B. / UnMask : Utilizing neighbor monitoring for attack mitigation in multihop wireless sensor networks. In: Ad Hoc Networks. 2010 ; Vol. 8, No. 2. pp. 148-164.
@article{10977b34e33041c2bc8f04c5e98fc325,
title = "UnMask: Utilizing neighbor monitoring for attack mitigation in multihop wireless sensor networks",
abstract = "Sensor networks enable a wide range of applications in both military and civilian domains. However, the deployment scenarios, the functionality requirements, and the limited capabilities of these networks expose them to a wide range of attacks against control traffic (such as wormholes, rushing, Sybil attacks, etc.) and data traffic (such as selective forwarding). In this paper we propose a framework called UnMask that mitigates such attacks by detecting, diagnosing, and isolating the malicious nodes. UnMask uses as a fundamental building block the ability of a node to oversee its neighboring nodes' communication. On top of UnMask, we build a secure routing protocol, Lsr, that provides additional protection against malicious nodes by supporting multiple node-disjoint paths. We analyze the security guarantees of UnMask and use ns-2 simulations to show its effectiveness against representative control and data attacks. The overhead analysis we present shows that UnMask is a lightweight protocol appropriate for securing resource constrained sensor networks.",
keywords = "Control attack, Data attack, Neighbor monitoring, Secure routing, Sensor network security",
author = "Issa Khalil and Saurabh Bagchi and Rotaru, {Cristina N.} and Shroff, {Ness B.}",
year = "2010",
month = "3",
day = "1",
doi = "10.1016/j.adhoc.2009.06.002",
language = "English",
volume = "8",
pages = "148--164",
journal = "Ad Hoc Networks",
issn = "1570-8705",
publisher = "Elsevier",
number = "2",

}

TY - JOUR

T1 - UnMask

T2 - Utilizing neighbor monitoring for attack mitigation in multihop wireless sensor networks

AU - Khalil, Issa

AU - Bagchi, Saurabh

AU - Rotaru, Cristina N.

AU - Shroff, Ness B.

PY - 2010/3/1

Y1 - 2010/3/1

N2 - Sensor networks enable a wide range of applications in both military and civilian domains. However, the deployment scenarios, the functionality requirements, and the limited capabilities of these networks expose them to a wide range of attacks against control traffic (such as wormholes, rushing, Sybil attacks, etc.) and data traffic (such as selective forwarding). In this paper we propose a framework called UnMask that mitigates such attacks by detecting, diagnosing, and isolating the malicious nodes. UnMask uses as a fundamental building block the ability of a node to oversee its neighboring nodes' communication. On top of UnMask, we build a secure routing protocol, Lsr, that provides additional protection against malicious nodes by supporting multiple node-disjoint paths. We analyze the security guarantees of UnMask and use ns-2 simulations to show its effectiveness against representative control and data attacks. The overhead analysis we present shows that UnMask is a lightweight protocol appropriate for securing resource constrained sensor networks.

AB - Sensor networks enable a wide range of applications in both military and civilian domains. However, the deployment scenarios, the functionality requirements, and the limited capabilities of these networks expose them to a wide range of attacks against control traffic (such as wormholes, rushing, Sybil attacks, etc.) and data traffic (such as selective forwarding). In this paper we propose a framework called UnMask that mitigates such attacks by detecting, diagnosing, and isolating the malicious nodes. UnMask uses as a fundamental building block the ability of a node to oversee its neighboring nodes' communication. On top of UnMask, we build a secure routing protocol, Lsr, that provides additional protection against malicious nodes by supporting multiple node-disjoint paths. We analyze the security guarantees of UnMask and use ns-2 simulations to show its effectiveness against representative control and data attacks. The overhead analysis we present shows that UnMask is a lightweight protocol appropriate for securing resource constrained sensor networks.

KW - Control attack

KW - Data attack

KW - Neighbor monitoring

KW - Secure routing

KW - Sensor network security

UR - http://www.scopus.com/inward/record.url?scp=70349743699&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=70349743699&partnerID=8YFLogxK

U2 - 10.1016/j.adhoc.2009.06.002

DO - 10.1016/j.adhoc.2009.06.002

M3 - Article

VL - 8

SP - 148

EP - 164

JO - Ad Hoc Networks

JF - Ad Hoc Networks

SN - 1570-8705

IS - 2

ER -