Power Plane: 2.6.2 Attacks On WSN
Power Plane: 2.6.2 Attacks On WSN
It is also responsible for interacting periodically with the mobility planes of other neighboring
nodes, so that it can create and maintain a table of active, power efficient routes.
Power Plane
The power plane focuses on the awareness of power at each horizontal and vertical layer.
The power planes of each node work collectively on deciding efficient routes to sink nodes and
maintain the sleep/awake cycles of sensor nodes.
Eavesdropping
2. Threats to Control
The nodes in the network are unaware that the entire flow control is being handled by the attacker.
Man-in-the-Middle Attack
In this type of attack, the attacker intrudes into the network and attempts to establish an
independent connection between a set of nodes and the sink node.
In a passive state, he simply relays every message among the nodes with the intention of
performing an eavesdropping attack.
In an active state, he can tamper with the intercepted data in an effort to break authentication.
Radio Interference
With the increase in the number of wireless technologies using the same open spectrum band
(2.4 GHz, 5 GHz, or 900 MHz), there is bound to be radio interference.
For example, in a dense urban environment, where cordless phones share the same spectrum,
radio interference can cause a sharp degradation of individual node performance.
Injection Attack
After the attacker has clandestinely intruded into the WSN network, he may impersonate a few
of the sensor nodes (or even sink nodes) and may inject malicious data into the network.
The malicious data might be false advertisement of neighbor-node information to other nodes,
leading to impersonation of sink nodes and aggregation of all data.
Replay Attack
A replay attack is a common attack in WSN, whereby an attacker is able to intercept user data and
retransmit user data at a later time. This attack is also useful during shared key-distribution processes.
Byzantine Attack
In a Byzantine attack, the outside adversary is able to take full control of a subset of authenticated
nodes that can be further used to attack the network from inside. Such attacks by malicious behavior are
known as Byzantine attacks. Examples include:
Black-hole attack – In this type of attack, the attacker drops packets selectively, or all control and data
packets that are routed through him.
Flood rushing attack – This type of attack is common to wireless networks and exploits the flood
duplicate suppression technique. In this attack, the attacker attempts to overthrow the existing routing
path by sending a flood of packets through an alternate route, which will result in discarding the
legitimate route and adopting the adversarial route.
Wormhole attack – In this type of attack, two conniving sensor nodes, or laptops, tunnel control and
data packets between each other, with the intention of creating a shortcut in the WSN. This type of
attack is very closely related to the sinkhole attack, because one of the conniving nodes could falsely
advertise to be the sink node and thereby attract more traffic than usual.
One of the main differences between a Byzantine wormhole and a traditional wormhole is that in a
Byzantine wormhole, the tunnel exists between two compromised nodes, while in a traditional
wormhole, two legitimate nodes are tricked into believing that a secure tunnel exists between them.
Byzantine overlay network wormhole attack – This type of attack is a variant of the wormhole attack
and occurs when the wormhole attack is extended to multiple sensor nodes; resulting in an overlay of
compromised nodes.
Sybil Attack
Sybil is an impersonation attack in which a malicious node masquerades as a set of nodes by claiming
false identities, or generating new identities in the worst case. Such attacks can be easily executed in a
WSN environment because the nodes are invariably deployed in an unstructured and distributed
environment, and communicate via radio transmission.
Sinkhole Attack
In a sinkhole attack, the adversary impersonates a sink node and attracts the whole of traffic to a node
or a set of nodes
3. Threats to Availability
Due to threats to the WSN, some portion of the network or some of the functionalities or services
provided by the network could be damaged and unavailable to the participants of the network.
Denial of Service (DoS) or DDoS - A denial-of-service attack occurs when an attacker floods the
victim with bogus or spoofed packets with the intent of lowering the victim‘s response rate. In the
worst-case scenario, it makes the victim totally unresponsive.
An extension of a DoS attack is a distributed DoS attack, where an attacker takes control of a few nodes
in the network, leading to a distributed flood attack against the victim.
HELLO Flood Attack - One of the common techniques for discovering neighbors is to send HELLO
packets. If a node receives a HELLO packet, it indicates that it is within the range of communication.
However, a laptop-class adversary could easily send HELLO packets with sufficient power to convince
the sensor nodes that it is in proximity of communication and may be a potential neighbor. The
adversary could also impersonate a sink node or a cluster node.
Jamming – Jamming is one of the most lethal types of attacks in WSN and is a direct way to
compromise the entire wireless network. In this type of attack, the attacker jams a spectrum band with a
powerful transmitter and prevents any member of the network in the affected area from transmitting or
receiving any packet. Jamming attacks can be divided into constant jamming and sporadic jamming.
Sporadic jamming can be very effective at times when a change in one bit of a data frame will force the
receiver to drop it.
Collision – Collision attacks target the MAC layer to create costly exponential backoff. Whenever
collision occurs, the nodes should retransmit packets affected by collision, thus leading to multiple
retransmissions.
Node Compromise – Node compromise is one of the most common and detrimental attacks in WSN.
As sensors can be deployed in harsh environments such as a battlefield, ocean bed, or the edge of an
active volcano, they are easily susceptible to capture by a foreign agent.
transmitted packet containing specified parameters. But during peer-to-peer communication the
parameters may be spoofed, replaced, altered, repeated, or even diminished by the single frequency or
intentional intruders.
In FHSS, the signal is modulated at frequencies such that it hops from one frequency to another
in a random fashion at a fixed time interval. The transmitter and the corresponding receiver hop
between frequencies using the same pseudorandom code for modulation and demodulation.
In DSSS, a spreading code is used to map each data bit in the original signal to multiple bits in
the transmitted signal. The pseudorandom code (spreading code) spreads the input data across a wider
frequency range compared to the input frequency. In the frequency domain, the output signals appear as
noise. Since the pseudorandom code provides a wide bandwidth to the input data, it allows the signal
power to drop down below the noise threshold without losing any information.
The above-mentioned schemes can provide security only as long as the hopping pattern or the
spreading code is not disclosed to any adversary.
1. Datacentric Communication
IP networks use a node-centric routing model in which information is exchanged using a unique
addressing scheme. a datacentric model is more focused on the aggregated data rather than on
identifying the exact node‘s identifiers.
The sink node or cluster head initiates a request for interested data and the responsible nodes
respond with the requested data; they vary in the manner in which the nodes send data back to the sink
node or cluster heads. The intermediate routing nodes inspect the data that is being sent to the sink node
and perform some form of consolidation operation, such that the sink node receives aggregated data
from different sources.