Abstract

Code dissemination is one of the important services of wireless sensor networks (WSNs). Securing the process of code dissemination is essential in some certain WSNs applications, state-of-the-art secure code dissemination protocols for WSNs aim for the efficient source authentication and integrity verification of code image, however, due to the resource constrains of WSNs and the epidemic behavior of the code dissemination system, existing secure code dissemination protocols are vulnerable to Denial of Service (DoS) attacks when sensor nodes can be compromised (insider DoS attacks). In this paper, we identify five different basic types of DoS attacks exploiting the epidemic propagation strategies used by Deluge. They are (1) Higher-version Advertisement attack, (2) False Request attack, (3) Larger-numbered Page attack, (4) Lower-version Adv attack, and (5) Same-version Adv attack. Simulation shows these susceptibilities caused by above insider DoS attacks. Some simple models are also proposed which promote understanding the problem of insider DoS attacks and attempt to quantify the severity of these attacks in the course of code dissemination in WSNs.

Highlights

  • Wireless sensor networks (WSNs) can provide many services with a large number of resourceconstrained nodes

  • In this paper we identify five different basic types of insider Denial of Service (DoS) attacks exploiting the epidemic propagation strategies used by Deluge

  • We proposed the simple system models for these DoS attacks to try to find out the impact of those attacks on Deluge

Read more

Summary

Introduction

Wireless sensor networks (WSNs) can provide many services with a large number of resourceconstrained nodes. None of them consider the communication security of WSNs. Recently, some research works (Sluice [8], SecureDeluge [9] and Deng-tree [10]) have attempted to provide efficient authentication of code dissemination. Some research works (Sluice [8], SecureDeluge [9] and Deng-tree [10]) have attempted to provide efficient authentication of code dissemination These approaches, are vulnerable to Denial of Service (DoS) attacks because they do not take the authentication of the control packets (in Deluge, they are named as Advertisement (Adv) and Request (Req)) into consideration. The contribution of this paper is that we identify five different basic kinds of DoS attacks made by malicious nodes exploiting control packets.

Related Work
Problem of the Epidemic Propagation of Deluge
Overview of Deluge
Security Vulnerabilities of the Epidemic Propagation Strategies in Deluge
Insider DoS Attacks on Deluge
System Models
Evaluation
Conclusions and Future Work

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.