A Survey on Spoofing and Selective Forwarding Attacks on Zigbee based WSN

Authors

  • Nethra Pingala Suthishni D Avinashilingam Institute for Home Science and Higher Education for Women
  • D. Shanmugapriya Avinashilingam Institute for Home Science and Higher Education for Women

DOI:

https://doi.org/10.12723/mjs.sp2.23

Keywords:

Zigbee, WSN, Protocol Stack, Spoofing, Selective Forwarding

Abstract

The main focus of WSN is to gather data from the physical world. It is often deployed for sensing, processing as well as disseminating information of the targeted physical environments. The main objective of the WSN is to collect data from the target environment using sensors as well as transmit those data to the desired place of choice. In order to achieve an efficient performance, WSN should have efficient as well as reliable networking protocols. The most popular technology behind WSN is Zigbee. In this paper a pilot study is done on important security issues on spoofing and selective forwarding attack on Zigbee based WSN. This paper identifies the security vulnerabilities of Zigbee network and gaps in the existing methodologies to address the security issues and will help the future researchers to narrow down their research in WSN.
Keywords: Zigbee, WSN, Protocol Stack, Spoofing and Selective Forwarding.

References

. A. D. Wood and J. A. Stankovic, "Denial of service in sensor networks," in Computer, vol. 35, no. 10, pp. 54-62, Oct. 2002, doi: 10.1109/MC.2002.1039518

. C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: attacks and countermeasures,” in Ad Hoc Networks, Vol. 1, No. 2, 2003, pp. 293-315. https://doi.org/10.1016/S1570-8705(03)00008-8

. Bo Yu and Bin Xiao, "Detecting selective forwarding attacks in wireless sensor networks," Proceedings 20th IEEE International Parallel & Distributed Processing Symposium, 2006, pp. 8 pp.-, doi: 10.1109/IPDPS.2006.1639675.

. B. Yu and B. Xiao, “CHEMAS: identify suspect nodes in selective forwarding attacks,” in Journal of Parallel and Distributed Computing, Vol. 67, No. 11, 2007, pp. 1218-1230. https://doi.org/10.1016/j.jpdc.2007.04.014

. S. Kaplantzis, A. Shilton, N. Mani and Y. A. Sekercioglu, "Detecting Selective Forwarding Attacks in Wireless Sensor Networks using Support Vector Machines," 2007 3rd International Conference on Intelligent Sensors, Sensor Networks and Information, 2007, pp. 335-340, doi: 10.1109/ISSNIP.2007.4496866.

. Hung-Min Sun, Chien-Ming Chen and Ying-Chu Hsiao, "An efficient countermeasure to the selective forwarding attack in wireless sensor networks," TENCON 2007 - 2007 IEEE Region 10 Conference, 2007, pp. 1-4, doi: 10.1109/TENCON.2007.4428866.

. K. Ioannis and T. Dimitriou, “Toward intrusion detection in sensor networks,” in 13th European Wireless Conference, April 2007, pp.1-7. doi: 10.1119/ISSNIP.2007.55431.

. Hae Young L, Tae Ho C. Fuzzy-based reliable data delivery for countering selective forwarding in sensor networks. Hong Kong, China, Springer-Verlag, 2007, p. 535-544. https://doi.org/10.1007/978-3-540-73549-6_53

. T. H. Hai and E. -N. Huh, "Detecting Selective Forwarding Attacks in Wireless Sensor Networks Using Two-hops Neighbor Knowledge," 2008 Seventh IEEE International Symposium on Network Computing and Applications, 2008, pp. 325-331, doi: 10.1109/NCA.2008.13.

. Y. K. Kim, H. Lee, K. Cho and D. H. Lee, "CADE: Cumulative Acknowledgement Based Detection of Selective Forwarding Attacks in Wireless Sensor Networks," 2008 Third International Conference on Convergence and Hybrid Information Technology, 2008, pp. 416-422, doi: 10.1109/ICCIT.2008.271.

. J. Brown and X. Du, "Detection of Selective Forwarding Attacks in Heterogeneous Sensor Networks," 2008 IEEE International Conference on Communications, 2008, pp. 1583-1587, doi: 10.1109/ICC.2008.306.

. Padmavathi DG, Shanmugapriya M. A survey of attacks,

security mechanisms and challenges in wireless sensor

networks. arXiv preprint arXiv:0909.0576. 2009 Sep 3.

https://doi.org/10.48550/arXiv.0909.0576

. H. Deng, X. Sun, B. Wang and Y. Cao, "Selective forwarding

attack detection using watermark in WSNs," 2009 ISECS

International Colloquium on Computing, Communication,

Control, and Management, 2009, pp. 109-113, doi:

1109/CCCM.2009.5268016

. X. Lei, X. Yong-jun, P. Yong and Z. Yue-fei, "A Polynomial-

Based Countermeasure to Selective Forwarding Attacks in

Sensor Networks," 2009 WRI International Conference on

Communications and Mobile Computing, 2009, pp. 455-459,

doi: 10.1109/CMC.2009.230

. C. Tumrongwittayapak and R. Varakulsiripunth, "Detecting

sinkhole attack and selective forwarding attack in wireless

sensor networks," 2009 7th International Conference on

Information, Communications and Signal Processing (ICICS),

, pp. 1-5, doi: 10.1109/ICICS.2009.5397594.

. W. Xin-sheng, Z. Yong-zhao, X. Shu-ming and W. Liang-min,

"Lightweight defense scheme against selective forwarding

attacks in wireless sensor networks," 2009 International

Conference on Cyber-Enabled Distributed Computing and

Knowledge Discovery, 2009, pp. 226-232, doi:

1109/CYBERC.2009.5342206.

. Y. B. Reddy and S. Srivathsan, "Game theory model for

selective forward attacks in wireless sensor networks," 2009

th Mediterranean Conference on Control and Automation,

, pp. 458-463, doi: 10.1109/MED.2009.5164584.

. G. Li, X. Liu and C. Wang, "A sequential mesh test based

selective forwarding attack detection scheme in wireless

sensor networks," 2010 International Conference on

Networking, Sensing and Control (ICNSC), 2010, pp. 554-558,

doi: 10.1109/ICNSC.2010.5461599.

. S.-B. Lee and Y.-H. Choi, A Resilient Packet-Forwarding

Scheme against Maliciously Packet-Dropping Nodes in

Sensor Networks, In Proceedings of the Fourth ACM

Workshop on Security of Ad Hoc and Sensor

Networks (SASN‟06), pp. 59-70, 2006. “

https://doi.org/10.1145/1180345.1180353

. S. Zhu, S. Setia, and S. Jajodia, LEAP: Efficient Security

Mechanisms for Large-Scale Distributed Sensor Networks,

The 10th ACM Conference on Computer and

Communications Security (CCS ‟03), 62-72, 2003.

https://doi.org/10.1145/1218556.1218559

. S. Marti, T. J. Giuli, K. Lai, and M. Baker, “Mitigating routing

misbehavior in mobile ad hoc networks,” in Proceedings of

the 6th annual international conference on Mobile

Computing and Networking (MobiCom ‟00), 2000, pp. 255–

https://doi.org/10.1145/345910.345955

. N. Nasser and Y. Chen, SEEM: Secure and energy efficient

multipath routing protocol for wireless sensor networks,

Computer Communications, Volume 30, Issue 11-12, pp.

-2412, September 2007.

https://doi.org/10.1016/j.comcom.2007.04.014

. N. Ahmed, S. S. Kanhere, and S. Jha, “Intrusion Detection

Techniques for Mobile Wireless Networks,” Mobile

Computing and Communications Review, Vol. 9, No. 2, pp.

, 2005.

. X. Pu, Z. Yan, S. Mao, Y. Zhang and Y. Li, “The sequential

mesh test for a proportion,” in Journal of East China Normal

University, No. 1, 2006, pp. 63-71.

https://xblk.ecnu.edu.cn/EN/Y2006/V2006/I1/63

. L. Xiao et al., "PHY-Authentication Protocol for Spoofing

Detection in Wireless Networks," 2010 IEEE Global

Telecommunications Conference GLOBECOM 2010, 2010,

pp. 1-6, doi: 10.1109/GLOCOM.2010.5683463.

. F. A. Barbhuiya, S. Biswas and S. Nandi, "An active DES

based IDS for ARP spoofing," 2011 IEEE International

Conference on Systems, Man, and Cybernetics, 2011, pp.

-2748, doi: 10.1109/ICSMC.2011.6084088.

. Ferdous A Barbhuiya, Santosh Biswas and Sukumar Nandi,

“An Active Host-based Intrusion detection system for ARP-

related attacks and its verification”, IEEE Trans. International

Journal of Network Security & Its Applications (IJNSA),

Vol.3, No.3, May 2011.

https://doi.org/10.5121/ijnsa.2011.3311

. Wesam S. Bhaya and Samraa A. AlAsady, “Prevention of

Spoofing Attacks in the Infrastructure Wireless Networks,”

proc IEEE Journal of Computer Science 8 (10): Page(s): 1769-

, 2012.

. A. Broumandan, A. Jafarnia-Jahromi, V. Dehghanian, J.

Nielsen and G. Lachapelle, "GNSS spoofing detection in

handheld receivers based on signal spatial correlation,"

Proceedings of the 2012 IEEE/ION Position, Location and

Navigation Symposium, 2012, pp. 479-487, doi:

1109/PLANS.2012.6236917.

. J. Yang, Y. Chen, W. Trappe and J. Cheng, "Detection and

Localization of Multiple Spoofing Attackers in Wireless

Networks," in IEEE Transactions on Parallel and Distributed

Systems, vol. 24, no. 1, pp. 44-58, Jan. 2013, doi:

1109/TPDS.2012.104.

. Q. Zeng, H. Li and L. Qian, "GPS spoofing attack on time

synchronization in wireless networks and detection scheme

design," MILCOM 2012 - 2012 IEEE Military

Communications Conference, 2012, pp. 1-5, doi:

1109/MILCOM.2012.6415619.

. Z. Zhang, M. Trinkle, L. Qian and H. Li, "Quickest detection

of GPS spoofing attack," MILCOM 2012 - 2012 IEEE Military

Communications Conference, 2012, pp. 1-6, doi:

1109/MILCOM.2012.6415722.

. Hao Yang, Haiyun Luo, Yi Yang, Songwu Lu and Lixia

Zhang, "HOURS: achieving DoS resilience in an open service

hierarchy," International Conference on Dependable Systems

and Networks, 2004, 2004, pp. 83-92, doi:

1109/DSN.2004.1311879.

. Ahmed M.AbdelSalam ,Wail S.Elkilani and Khalid M.Amin,

“An Automated approach for Preventing ARP Spoofing

Attack using Static ARP Entries” Proc IEEE (IJACSA)

International Journal of Advanced Computer Science and

Applications, Vol. 5, No. 1, 2014. doi=10.1.1.676.4047

. Y. Chen, W. Trappe and R. P. Martin, "Detecting and

Localizing Wireless Spoofing Attacks," 2007 4th Annual IEEE

Communications Society Conference on Sensor, Mesh and

Ad Hoc Communications and Networks, 2007, pp. 193-202,

doi: 10.1109/SAHCN.2007.4292831..

. Archana Shelar and M.D.Ingale, ”Modeling Security with

Localization of Multiple Spoofing Attackers in Wireless

Network,” The International Journal Of Engineering And

Science (IJES), Volume 3, Issue 01, Pages 01-06, 2014.

DOI:10.1109/TPDS.2012.104

. J. Yang, Y. Chen, W. Trappe and J. Cheng, "Detection and

Localization of Multiple Spoofing Attackers in Wireless

Networks," in IEEE Transactions on Parallel and Distributed

Systems, vol. 24, no. 1, pp. 44-58, Jan. 2013, doi:

1109/TPDS.2012.104.

. K. Salah, J. M. Alcaraz Calero, S. Zeadally, S. Al-Mulla and

M. Alzaabi, "Using Cloud Computing to Implement a

Security Overlay Network," in IEEE Security & Privacy, vol.

, no. 1, pp. 44-53, Jan.-Feb. 2013, doi: 10.1109/MSP.2012.8

. Patel, Anshuman, and Devesh Jinwala. "A reputation‐based

RPL protocol to detect selective forwarding attack in Internet

of Things." International Journal of Communication Systems

1 (2022): e5007.

. Ezhilarasi, M., Gnanaprasanambikai, L., Kousalya, A. et al. A

novel implementation of routing attack detection scheme by

using fuzzy and feed-forward neural networks. Soft Comput

(2022). https://doi.org/10.1007/s00500-022-06915-1.

. Shafique, Arslan, Abid Mehmood, and Mourad Elhadef.

"Detecting signal spoofing attack in uavs using machine

learning models." IEEE Access 9 (2021): 93803-93815.

Additional Files

Published

2023-12-27