Published 2023-12-27
Keywords
- Zigbee,
- WSN,
- Protocol Stack,
- Spoofing,
- Selective Forwarding
Copyright (c) 2023
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Abstract
The main focus of WSN is to gather data from the physical world. It is often deployed for sensing, processing as well as disseminating information of the targeted physical environments. The main objective of the WSN is to collect data from the target environment using sensors as well as transmit those data to the desired place of choice. In order to achieve an efficient performance, WSN should have efficient as well as reliable networking protocols. The most popular technology behind WSN is Zigbee. In this paper a pilot study is done on important security issues on spoofing and selective forwarding attack on Zigbee based WSN. This paper identifies the security vulnerabilities of Zigbee network and gaps in the existing methodologies to address the security issues and will help the future researchers to narrow down their research in WSN.
Keywords: Zigbee, WSN, Protocol Stack, Spoofing and Selective Forwarding.
References
- . A. D. Wood and J. A. Stankovic, "Denial of service in sensor networks," in Computer, vol. 35, no. 10, pp. 54-62, Oct. 2002, doi: 10.1109/MC.2002.1039518
- . C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: attacks and countermeasures,” in Ad Hoc Networks, Vol. 1, No. 2, 2003, pp. 293-315. https://doi.org/10.1016/S1570-8705(03)00008-8
- . Bo Yu and Bin Xiao, "Detecting selective forwarding attacks in wireless sensor networks," Proceedings 20th IEEE International Parallel & Distributed Processing Symposium, 2006, pp. 8 pp.-, doi: 10.1109/IPDPS.2006.1639675.
- . B. Yu and B. Xiao, “CHEMAS: identify suspect nodes in selective forwarding attacks,” in Journal of Parallel and Distributed Computing, Vol. 67, No. 11, 2007, pp. 1218-1230. https://doi.org/10.1016/j.jpdc.2007.04.014
- . S. Kaplantzis, A. Shilton, N. Mani and Y. A. Sekercioglu, "Detecting Selective Forwarding Attacks in Wireless Sensor Networks using Support Vector Machines," 2007 3rd International Conference on Intelligent Sensors, Sensor Networks and Information, 2007, pp. 335-340, doi: 10.1109/ISSNIP.2007.4496866.
- . Hung-Min Sun, Chien-Ming Chen and Ying-Chu Hsiao, "An efficient countermeasure to the selective forwarding attack in wireless sensor networks," TENCON 2007 - 2007 IEEE Region 10 Conference, 2007, pp. 1-4, doi: 10.1109/TENCON.2007.4428866.
- . K. Ioannis and T. Dimitriou, “Toward intrusion detection in sensor networks,” in 13th European Wireless Conference, April 2007, pp.1-7. doi: 10.1119/ISSNIP.2007.55431.
- . Hae Young L, Tae Ho C. Fuzzy-based reliable data delivery for countering selective forwarding in sensor networks. Hong Kong, China, Springer-Verlag, 2007, p. 535-544. https://doi.org/10.1007/978-3-540-73549-6_53
- . T. H. Hai and E. -N. Huh, "Detecting Selective Forwarding Attacks in Wireless Sensor Networks Using Two-hops Neighbor Knowledge," 2008 Seventh IEEE International Symposium on Network Computing and Applications, 2008, pp. 325-331, doi: 10.1109/NCA.2008.13.
- . Y. K. Kim, H. Lee, K. Cho and D. H. Lee, "CADE: Cumulative Acknowledgement Based Detection of Selective Forwarding Attacks in Wireless Sensor Networks," 2008 Third International Conference on Convergence and Hybrid Information Technology, 2008, pp. 416-422, doi: 10.1109/ICCIT.2008.271.
- . J. Brown and X. Du, "Detection of Selective Forwarding Attacks in Heterogeneous Sensor Networks," 2008 IEEE International Conference on Communications, 2008, pp. 1583-1587, doi: 10.1109/ICC.2008.306.
- . Padmavathi DG, Shanmugapriya M. A survey of attacks,
- security mechanisms and challenges in wireless sensor
- networks. arXiv preprint arXiv:0909.0576. 2009 Sep 3.
- https://doi.org/10.48550/arXiv.0909.0576
- . H. Deng, X. Sun, B. Wang and Y. Cao, "Selective forwarding
- attack detection using watermark in WSNs," 2009 ISECS
- International Colloquium on Computing, Communication,
- Control, and Management, 2009, pp. 109-113, doi:
- 1109/CCCM.2009.5268016
- . X. Lei, X. Yong-jun, P. Yong and Z. Yue-fei, "A Polynomial-
- Based Countermeasure to Selective Forwarding Attacks in
- Sensor Networks," 2009 WRI International Conference on
- Communications and Mobile Computing, 2009, pp. 455-459,
- doi: 10.1109/CMC.2009.230
- . C. Tumrongwittayapak and R. Varakulsiripunth, "Detecting
- sinkhole attack and selective forwarding attack in wireless
- sensor networks," 2009 7th International Conference on
- Information, Communications and Signal Processing (ICICS),
- , pp. 1-5, doi: 10.1109/ICICS.2009.5397594.
- . W. Xin-sheng, Z. Yong-zhao, X. Shu-ming and W. Liang-min,
- "Lightweight defense scheme against selective forwarding
- attacks in wireless sensor networks," 2009 International
- Conference on Cyber-Enabled Distributed Computing and
- Knowledge Discovery, 2009, pp. 226-232, doi:
- 1109/CYBERC.2009.5342206.
- . Y. B. Reddy and S. Srivathsan, "Game theory model for
- selective forward attacks in wireless sensor networks," 2009
- th Mediterranean Conference on Control and Automation,
- , pp. 458-463, doi: 10.1109/MED.2009.5164584.
- . G. Li, X. Liu and C. Wang, "A sequential mesh test based
- selective forwarding attack detection scheme in wireless
- sensor networks," 2010 International Conference on
- Networking, Sensing and Control (ICNSC), 2010, pp. 554-558,
- doi: 10.1109/ICNSC.2010.5461599.
- . S.-B. Lee and Y.-H. Choi, A Resilient Packet-Forwarding
- Scheme against Maliciously Packet-Dropping Nodes in
- Sensor Networks, In Proceedings of the Fourth ACM
- Workshop on Security of Ad Hoc and Sensor
- Networks (SASN‟06), pp. 59-70, 2006. “
- https://doi.org/10.1145/1180345.1180353
- . S. Zhu, S. Setia, and S. Jajodia, LEAP: Efficient Security
- Mechanisms for Large-Scale Distributed Sensor Networks,
- The 10th ACM Conference on Computer and
- Communications Security (CCS ‟03), 62-72, 2003.
- https://doi.org/10.1145/1218556.1218559
- . S. Marti, T. J. Giuli, K. Lai, and M. Baker, “Mitigating routing
- misbehavior in mobile ad hoc networks,” in Proceedings of
- the 6th annual international conference on Mobile
- Computing and Networking (MobiCom ‟00), 2000, pp. 255–
- https://doi.org/10.1145/345910.345955
- . N. Nasser and Y. Chen, SEEM: Secure and energy efficient
- multipath routing protocol for wireless sensor networks,
- Computer Communications, Volume 30, Issue 11-12, pp.
- -2412, September 2007.
- https://doi.org/10.1016/j.comcom.2007.04.014
- . N. Ahmed, S. S. Kanhere, and S. Jha, “Intrusion Detection
- Techniques for Mobile Wireless Networks,” Mobile
- Computing and Communications Review, Vol. 9, No. 2, pp.
- , 2005.
- . X. Pu, Z. Yan, S. Mao, Y. Zhang and Y. Li, “The sequential
- mesh test for a proportion,” in Journal of East China Normal
- University, No. 1, 2006, pp. 63-71.
- https://xblk.ecnu.edu.cn/EN/Y2006/V2006/I1/63
- . L. Xiao et al., "PHY-Authentication Protocol for Spoofing
- Detection in Wireless Networks," 2010 IEEE Global
- Telecommunications Conference GLOBECOM 2010, 2010,
- pp. 1-6, doi: 10.1109/GLOCOM.2010.5683463.
- . F. A. Barbhuiya, S. Biswas and S. Nandi, "An active DES
- based IDS for ARP spoofing," 2011 IEEE International
- Conference on Systems, Man, and Cybernetics, 2011, pp.
- -2748, doi: 10.1109/ICSMC.2011.6084088.
- . Ferdous A Barbhuiya, Santosh Biswas and Sukumar Nandi,
- “An Active Host-based Intrusion detection system for ARP-
- related attacks and its verification”, IEEE Trans. International
- Journal of Network Security & Its Applications (IJNSA),
- Vol.3, No.3, May 2011.
- https://doi.org/10.5121/ijnsa.2011.3311
- . Wesam S. Bhaya and Samraa A. AlAsady, “Prevention of
- Spoofing Attacks in the Infrastructure Wireless Networks,”
- proc IEEE Journal of Computer Science 8 (10): Page(s): 1769-
- , 2012.
- . A. Broumandan, A. Jafarnia-Jahromi, V. Dehghanian, J.
- Nielsen and G. Lachapelle, "GNSS spoofing detection in
- handheld receivers based on signal spatial correlation,"
- Proceedings of the 2012 IEEE/ION Position, Location and
- Navigation Symposium, 2012, pp. 479-487, doi:
- 1109/PLANS.2012.6236917.
- . J. Yang, Y. Chen, W. Trappe and J. Cheng, "Detection and
- Localization of Multiple Spoofing Attackers in Wireless
- Networks," in IEEE Transactions on Parallel and Distributed
- Systems, vol. 24, no. 1, pp. 44-58, Jan. 2013, doi:
- 1109/TPDS.2012.104.
- . Q. Zeng, H. Li and L. Qian, "GPS spoofing attack on time
- synchronization in wireless networks and detection scheme
- design," MILCOM 2012 - 2012 IEEE Military
- Communications Conference, 2012, pp. 1-5, doi:
- 1109/MILCOM.2012.6415619.
- . Z. Zhang, M. Trinkle, L. Qian and H. Li, "Quickest detection
- of GPS spoofing attack," MILCOM 2012 - 2012 IEEE Military
- Communications Conference, 2012, pp. 1-6, doi:
- 1109/MILCOM.2012.6415722.
- . Hao Yang, Haiyun Luo, Yi Yang, Songwu Lu and Lixia
- Zhang, "HOURS: achieving DoS resilience in an open service
- hierarchy," International Conference on Dependable Systems
- and Networks, 2004, 2004, pp. 83-92, doi:
- 1109/DSN.2004.1311879.
- . Ahmed M.AbdelSalam ,Wail S.Elkilani and Khalid M.Amin,
- “An Automated approach for Preventing ARP Spoofing
- Attack using Static ARP Entries” Proc IEEE (IJACSA)
- International Journal of Advanced Computer Science and
- Applications, Vol. 5, No. 1, 2014. doi=10.1.1.676.4047
- . Y. Chen, W. Trappe and R. P. Martin, "Detecting and
- Localizing Wireless Spoofing Attacks," 2007 4th Annual IEEE
- Communications Society Conference on Sensor, Mesh and
- Ad Hoc Communications and Networks, 2007, pp. 193-202,
- doi: 10.1109/SAHCN.2007.4292831..
- . Archana Shelar and M.D.Ingale, ”Modeling Security with
- Localization of Multiple Spoofing Attackers in Wireless
- Network,” The International Journal Of Engineering And
- Science (IJES), Volume 3, Issue 01, Pages 01-06, 2014.
- DOI:10.1109/TPDS.2012.104
- . J. Yang, Y. Chen, W. Trappe and J. Cheng, "Detection and
- Localization of Multiple Spoofing Attackers in Wireless
- Networks," in IEEE Transactions on Parallel and Distributed
- Systems, vol. 24, no. 1, pp. 44-58, Jan. 2013, doi:
- 1109/TPDS.2012.104.
- . K. Salah, J. M. Alcaraz Calero, S. Zeadally, S. Al-Mulla and
- M. Alzaabi, "Using Cloud Computing to Implement a
- Security Overlay Network," in IEEE Security & Privacy, vol.
- , no. 1, pp. 44-53, Jan.-Feb. 2013, doi: 10.1109/MSP.2012.8
- . Patel, Anshuman, and Devesh Jinwala. "A reputation‐based
- RPL protocol to detect selective forwarding attack in Internet
- of Things." International Journal of Communication Systems
- 1 (2022): e5007.
- . Ezhilarasi, M., Gnanaprasanambikai, L., Kousalya, A. et al. A
- novel implementation of routing attack detection scheme by
- using fuzzy and feed-forward neural networks. Soft Comput
- (2022). https://doi.org/10.1007/s00500-022-06915-1.
- . Shafique, Arslan, Abid Mehmood, and Mourad Elhadef.
- "Detecting signal spoofing attack in uavs using machine
- learning models." IEEE Access 9 (2021): 93803-93815.