A Survey on Spoofing and Selective Forwarding Attacks on Zigbee based WSN
DOI:
https://doi.org/10.12723/mjs.sp2.23Keywords:
Zigbee, WSN, Protocol Stack, Spoofing, Selective ForwardingAbstract
The main focus of WSN is to gather data from the physical world. It is often deployed for sensing, processing as well as disseminating information of the targeted physical environments. The main objective of the WSN is to collect data from the target environment using sensors as well as transmit those data to the desired place of choice. In order to achieve an efficient performance, WSN should have efficient as well as reliable networking protocols. The most popular technology behind WSN is Zigbee. In this paper a pilot study is done on important security issues on spoofing and selective forwarding attack on Zigbee based WSN. This paper identifies the security vulnerabilities of Zigbee network and gaps in the existing methodologies to address the security issues and will help the future researchers to narrow down their research in WSN.
Keywords: Zigbee, WSN, Protocol Stack, Spoofing and Selective Forwarding.
References
. A. D. Wood and J. A. Stankovic, "Denial of service in sensor networks," in Computer, vol. 35, no. 10, pp. 54-62, Oct. 2002, doi: 10.1109/MC.2002.1039518
. C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: attacks and countermeasures,” in Ad Hoc Networks, Vol. 1, No. 2, 2003, pp. 293-315. https://doi.org/10.1016/S1570-8705(03)00008-8
. Bo Yu and Bin Xiao, "Detecting selective forwarding attacks in wireless sensor networks," Proceedings 20th IEEE International Parallel & Distributed Processing Symposium, 2006, pp. 8 pp.-, doi: 10.1109/IPDPS.2006.1639675.
. B. Yu and B. Xiao, “CHEMAS: identify suspect nodes in selective forwarding attacks,” in Journal of Parallel and Distributed Computing, Vol. 67, No. 11, 2007, pp. 1218-1230. https://doi.org/10.1016/j.jpdc.2007.04.014
. S. Kaplantzis, A. Shilton, N. Mani and Y. A. Sekercioglu, "Detecting Selective Forwarding Attacks in Wireless Sensor Networks using Support Vector Machines," 2007 3rd International Conference on Intelligent Sensors, Sensor Networks and Information, 2007, pp. 335-340, doi: 10.1109/ISSNIP.2007.4496866.
. Hung-Min Sun, Chien-Ming Chen and Ying-Chu Hsiao, "An efficient countermeasure to the selective forwarding attack in wireless sensor networks," TENCON 2007 - 2007 IEEE Region 10 Conference, 2007, pp. 1-4, doi: 10.1109/TENCON.2007.4428866.
. K. Ioannis and T. Dimitriou, “Toward intrusion detection in sensor networks,” in 13th European Wireless Conference, April 2007, pp.1-7. doi: 10.1119/ISSNIP.2007.55431.
. Hae Young L, Tae Ho C. Fuzzy-based reliable data delivery for countering selective forwarding in sensor networks. Hong Kong, China, Springer-Verlag, 2007, p. 535-544. https://doi.org/10.1007/978-3-540-73549-6_53
. T. H. Hai and E. -N. Huh, "Detecting Selective Forwarding Attacks in Wireless Sensor Networks Using Two-hops Neighbor Knowledge," 2008 Seventh IEEE International Symposium on Network Computing and Applications, 2008, pp. 325-331, doi: 10.1109/NCA.2008.13.
. Y. K. Kim, H. Lee, K. Cho and D. H. Lee, "CADE: Cumulative Acknowledgement Based Detection of Selective Forwarding Attacks in Wireless Sensor Networks," 2008 Third International Conference on Convergence and Hybrid Information Technology, 2008, pp. 416-422, doi: 10.1109/ICCIT.2008.271.
. J. Brown and X. Du, "Detection of Selective Forwarding Attacks in Heterogeneous Sensor Networks," 2008 IEEE International Conference on Communications, 2008, pp. 1583-1587, doi: 10.1109/ICC.2008.306.
. Padmavathi DG, Shanmugapriya M. A survey of attacks,
security mechanisms and challenges in wireless sensor
networks. arXiv preprint arXiv:0909.0576. 2009 Sep 3.
https://doi.org/10.48550/arXiv.0909.0576
. H. Deng, X. Sun, B. Wang and Y. Cao, "Selective forwarding
attack detection using watermark in WSNs," 2009 ISECS
International Colloquium on Computing, Communication,
Control, and Management, 2009, pp. 109-113, doi:
1109/CCCM.2009.5268016
. X. Lei, X. Yong-jun, P. Yong and Z. Yue-fei, "A Polynomial-
Based Countermeasure to Selective Forwarding Attacks in
Sensor Networks," 2009 WRI International Conference on
Communications and Mobile Computing, 2009, pp. 455-459,
doi: 10.1109/CMC.2009.230
. C. Tumrongwittayapak and R. Varakulsiripunth, "Detecting
sinkhole attack and selective forwarding attack in wireless
sensor networks," 2009 7th International Conference on
Information, Communications and Signal Processing (ICICS),
, pp. 1-5, doi: 10.1109/ICICS.2009.5397594.
. W. Xin-sheng, Z. Yong-zhao, X. Shu-ming and W. Liang-min,
"Lightweight defense scheme against selective forwarding
attacks in wireless sensor networks," 2009 International
Conference on Cyber-Enabled Distributed Computing and
Knowledge Discovery, 2009, pp. 226-232, doi:
1109/CYBERC.2009.5342206.
. Y. B. Reddy and S. Srivathsan, "Game theory model for
selective forward attacks in wireless sensor networks," 2009
th Mediterranean Conference on Control and Automation,
, pp. 458-463, doi: 10.1109/MED.2009.5164584.
. G. Li, X. Liu and C. Wang, "A sequential mesh test based
selective forwarding attack detection scheme in wireless
sensor networks," 2010 International Conference on
Networking, Sensing and Control (ICNSC), 2010, pp. 554-558,
doi: 10.1109/ICNSC.2010.5461599.
. S.-B. Lee and Y.-H. Choi, A Resilient Packet-Forwarding
Scheme against Maliciously Packet-Dropping Nodes in
Sensor Networks, In Proceedings of the Fourth ACM
Workshop on Security of Ad Hoc and Sensor
Networks (SASN‟06), pp. 59-70, 2006. “
https://doi.org/10.1145/1180345.1180353
. S. Zhu, S. Setia, and S. Jajodia, LEAP: Efficient Security
Mechanisms for Large-Scale Distributed Sensor Networks,
The 10th ACM Conference on Computer and
Communications Security (CCS ‟03), 62-72, 2003.
https://doi.org/10.1145/1218556.1218559
. S. Marti, T. J. Giuli, K. Lai, and M. Baker, “Mitigating routing
misbehavior in mobile ad hoc networks,” in Proceedings of
the 6th annual international conference on Mobile
Computing and Networking (MobiCom ‟00), 2000, pp. 255–
https://doi.org/10.1145/345910.345955
. N. Nasser and Y. Chen, SEEM: Secure and energy efficient
multipath routing protocol for wireless sensor networks,
Computer Communications, Volume 30, Issue 11-12, pp.
-2412, September 2007.
https://doi.org/10.1016/j.comcom.2007.04.014
. N. Ahmed, S. S. Kanhere, and S. Jha, “Intrusion Detection
Techniques for Mobile Wireless Networks,” Mobile
Computing and Communications Review, Vol. 9, No. 2, pp.
, 2005.
. X. Pu, Z. Yan, S. Mao, Y. Zhang and Y. Li, “The sequential
mesh test for a proportion,” in Journal of East China Normal
University, No. 1, 2006, pp. 63-71.
https://xblk.ecnu.edu.cn/EN/Y2006/V2006/I1/63
. L. Xiao et al., "PHY-Authentication Protocol for Spoofing
Detection in Wireless Networks," 2010 IEEE Global
Telecommunications Conference GLOBECOM 2010, 2010,
pp. 1-6, doi: 10.1109/GLOCOM.2010.5683463.
. F. A. Barbhuiya, S. Biswas and S. Nandi, "An active DES
based IDS for ARP spoofing," 2011 IEEE International
Conference on Systems, Man, and Cybernetics, 2011, pp.
-2748, doi: 10.1109/ICSMC.2011.6084088.
. Ferdous A Barbhuiya, Santosh Biswas and Sukumar Nandi,
“An Active Host-based Intrusion detection system for ARP-
related attacks and its verification”, IEEE Trans. International
Journal of Network Security & Its Applications (IJNSA),
Vol.3, No.3, May 2011.
https://doi.org/10.5121/ijnsa.2011.3311
. Wesam S. Bhaya and Samraa A. AlAsady, “Prevention of
Spoofing Attacks in the Infrastructure Wireless Networks,”
proc IEEE Journal of Computer Science 8 (10): Page(s): 1769-
, 2012.
. A. Broumandan, A. Jafarnia-Jahromi, V. Dehghanian, J.
Nielsen and G. Lachapelle, "GNSS spoofing detection in
handheld receivers based on signal spatial correlation,"
Proceedings of the 2012 IEEE/ION Position, Location and
Navigation Symposium, 2012, pp. 479-487, doi:
1109/PLANS.2012.6236917.
. J. Yang, Y. Chen, W. Trappe and J. Cheng, "Detection and
Localization of Multiple Spoofing Attackers in Wireless
Networks," in IEEE Transactions on Parallel and Distributed
Systems, vol. 24, no. 1, pp. 44-58, Jan. 2013, doi:
1109/TPDS.2012.104.
. Q. Zeng, H. Li and L. Qian, "GPS spoofing attack on time
synchronization in wireless networks and detection scheme
design," MILCOM 2012 - 2012 IEEE Military
Communications Conference, 2012, pp. 1-5, doi:
1109/MILCOM.2012.6415619.
. Z. Zhang, M. Trinkle, L. Qian and H. Li, "Quickest detection
of GPS spoofing attack," MILCOM 2012 - 2012 IEEE Military
Communications Conference, 2012, pp. 1-6, doi:
1109/MILCOM.2012.6415722.
. Hao Yang, Haiyun Luo, Yi Yang, Songwu Lu and Lixia
Zhang, "HOURS: achieving DoS resilience in an open service
hierarchy," International Conference on Dependable Systems
and Networks, 2004, 2004, pp. 83-92, doi:
1109/DSN.2004.1311879.
. Ahmed M.AbdelSalam ,Wail S.Elkilani and Khalid M.Amin,
“An Automated approach for Preventing ARP Spoofing
Attack using Static ARP Entries” Proc IEEE (IJACSA)
International Journal of Advanced Computer Science and
Applications, Vol. 5, No. 1, 2014. doi=10.1.1.676.4047
. Y. Chen, W. Trappe and R. P. Martin, "Detecting and
Localizing Wireless Spoofing Attacks," 2007 4th Annual IEEE
Communications Society Conference on Sensor, Mesh and
Ad Hoc Communications and Networks, 2007, pp. 193-202,
doi: 10.1109/SAHCN.2007.4292831..
. Archana Shelar and M.D.Ingale, ”Modeling Security with
Localization of Multiple Spoofing Attackers in Wireless
Network,” The International Journal Of Engineering And
Science (IJES), Volume 3, Issue 01, Pages 01-06, 2014.
DOI:10.1109/TPDS.2012.104
. J. Yang, Y. Chen, W. Trappe and J. Cheng, "Detection and
Localization of Multiple Spoofing Attackers in Wireless
Networks," in IEEE Transactions on Parallel and Distributed
Systems, vol. 24, no. 1, pp. 44-58, Jan. 2013, doi:
1109/TPDS.2012.104.
. K. Salah, J. M. Alcaraz Calero, S. Zeadally, S. Al-Mulla and
M. Alzaabi, "Using Cloud Computing to Implement a
Security Overlay Network," in IEEE Security & Privacy, vol.
, no. 1, pp. 44-53, Jan.-Feb. 2013, doi: 10.1109/MSP.2012.8
. Patel, Anshuman, and Devesh Jinwala. "A reputation‐based
RPL protocol to detect selective forwarding attack in Internet
of Things." International Journal of Communication Systems
1 (2022): e5007.
. Ezhilarasi, M., Gnanaprasanambikai, L., Kousalya, A. et al. A
novel implementation of routing attack detection scheme by
using fuzzy and feed-forward neural networks. Soft Comput
(2022). https://doi.org/10.1007/s00500-022-06915-1.
. Shafique, Arslan, Abid Mehmood, and Mourad Elhadef.
"Detecting signal spoofing attack in uavs using machine
learning models." IEEE Access 9 (2021): 93803-93815.
Additional Files
Published
Issue
Section
License
Copyright (c) 2023 Nethra Pingala Suthishni D, D. Shanmugapriya
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.