0% found this document useful (0 votes)
64 views9 pages

Real Time Intrusion and Wormhole Attack Detection in Internet of Things

This document summarizes a research paper that proposes a novel intrusion detection system for detecting wormhole attacks in Internet of Things (IoT) networks. The system is designed to be resource-efficient to accommodate the constraints of IoT devices. It uses location information and neighbor data to identify wormhole attacks, and received signal strength to identify attacker nodes. The system architecture includes modules for detection algorithms, modeling a wormhole attacker node, and example-based detection. The goal is to secure IoT networks by preventing harmful wormhole and other attacks.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
64 views9 pages

Real Time Intrusion and Wormhole Attack Detection in Internet of Things

This document summarizes a research paper that proposes a novel intrusion detection system for detecting wormhole attacks in Internet of Things (IoT) networks. The system is designed to be resource-efficient to accommodate the constraints of IoT devices. It uses location information and neighbor data to identify wormhole attacks, and received signal strength to identify attacker nodes. The system architecture includes modules for detection algorithms, modeling a wormhole attacker node, and example-based detection. The goal is to secure IoT networks by preventing harmful wormhole and other attacks.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

International Journal of Computer Applications (0975 - 8887)

Volume 121 - No. 9, July 2015

Real Time Intrusion and Wormhole Attack Detection in


Internet of Things

Pavan Pongle Gurunath Chavan


Department of computer Engineering Department of computer Engineering
Sinhgad College of Engineering Sinhgad College of Engineering
Pune, India Pune, India

ABSTRACT receiving the DIO message selects the parent to sender by reply-
ing DAO (Destination Advertisement Object) message asking can
There are currently more objects connected to the Internet than I join you? Parent node gives the permission to join by sending
people in the world. This gap will continue to grow, as more ob- DIO ACK message as yes you can join me. The rank value calcu-
jects gain the ability to directly interface with the Internet. Pro- lated with respect to the parents rank value and other parameters.
viding security in IoT is challenging as the devices are resource The rank value may be depend on the distance from the root node,
constrained, the communication links are lossy, and the devices use energy of link etc. The network owner can decide the rank value
a set of novel IoT technologies such as RPL and 6LoWPAN. Due calculation parameters. If new node want to join the network it first
to this it is easy to attack in IoT network. The proposed system ask is there any DODAG here? By sending DIS (DODAG Info so-
is a novel intrusion detection system for the IoT, which is capable licitation) message. The nodes continue to broadcast the DIO mes-
of detecting Wormhole attack and attacker. The proposed methods sage and form the tree topology. Fig. 1 shows the comparison of
uses the location information of node and neighbor information to protocols used at traditional IP network and IoT.
identify the Wormhole attack and received signal strength to iden-
tify attacker nodes. Design of such system will help in securing the
IoT network and may prevents such attacks. This method is very
energy efficient and only takes fixed number of UDP packets for
attack detection, hence it is beneficial for resource constrained en-
vironment.

Keywords
Intrusion Detection, Internet of Things, RPL, Wormhole,
Packet Relay, Encapsulation, RSSI

1. INTRODUCTION
Internet of Things (IoT) is a fast-growing innovation that
will greatly change the way humans live. It can be thought of as
the next big step in Internet technology. The changing operating
environment associated with the Internet of Things represents
considerable impact to the attack surface and threat environment of
the Internet and Internet-connected systems. IoT is heterogeneous Fig. 1. Protocols used at traditional IP network and IoT
system consisting of various types of sensors nodes or devices
with different kind of technology at each layer. However, due to
the limited address space of IPv4, objects in the IoT uses IPv6 to
accommodate space in Internet. Objects in the IoT can be devices The rest of the paper is organized as follows: Section II discuss
with sensory capabilities, smart metering, health care sensor etc. the related work in Wormhole attack detection techniques and IDS
systems designed for IoT. Section III gives discussion on architec-
RPL (Routing Protocol for low power and Lossy network) [1] ture of system, modules and algorithm used for detecting attack.
is routing protocol used at the network layer in IoT. RPL topol- In section IV we have discussed the algorithms used to detect the
ogy contains one root/sink node directly connected to Internet using attack and design of wormhole attacker node. Section V is on dis-
6BR (IPv6 Border Router). RPL topology forms the DODAG (Des- cussion of how the attacks are detected using proposed system with
tination Oriented Directed Acyclic Graph) tree, which contain only example. Section VI on evaluation of system using various param-
1 root. Root node starts the formation of the topology by broad- eter. Section VII gives the future work and extension for proposed
casting the DIO (DODAG Information Object) messages. Nodes system. Section VIII concludes the work done.

1
International Journal of Computer Applications (0975 - 8887)
Volume 121 - No. 9, July 2015

2. RELATED WORK 2.2 IoT and IDS


2.1 Wormhole Attack The table 1 shows the existence IDS system designed for IoT.
Only the IDS [2] is evaluated for detection of attacks, rest IDS are
RPL can undergo the wormhole attack [2]. The main purpose proposed frameworks and detecting simple RPL specific attacks.
of this attack is Disrupt the network topology and traffic flow. This The existing IDS system does not detects the complex attacks such
attack can takes place by creating tunnel between the two attackers as Wormhole, Blackhole, Sybil and Clone ID attack.
and transmitting the all traffic through it. Wormhole attack tackled
in this methods are as,
Table 1. Comparison of IDS Systems
2.1.1 Wormhole using packet Encapsulation. In this type, at- IDS Method Attack detec- Placement
tacker node encapsulate the packet in payload and send it to other tion
colleague node, where other attacker takeout the packet from pay- RIDES[10] Signature based IDS, No Hybrid
load and transmit again. uses Bloom filter for
signature matching
[11] Network based DOS de- DOS Hybrid
2.1.2 wormhole using Packet Relay. In this mode of the worm- tection IDS architecture
hole attack, a malicious node relays packets between two distant on project ebbits
nodes to convince them that they are neighbors. It can be launched [12] Finite state machine Rank and local Distributed
by even one malicious node. based IDS system repair
SVELTE[13] Host based IDS, con- Sinkhole, Hybrid
Wormhole attack detection techniques broadly classify into the struction of network DODAG in-
following different types as. Hardware Based techniques require topology at 6BR system consistency,
the use of extra hardware such as GPS hardware or some special- Rank, selective
ized nodes. In Clock Based techniques the nodes to have tightly forwarding
synchronized clocks so that they are able to detect any anomalies in [14] Complex event process- No Centralized
the network. Packet Leashes Based techniques limits the journey of ing IDS, uses EPL and
packets across the network beyond a certain limit (either distance SQL to define attack pat-
or time). RTT Based techniques use the Round Trip time for the tern
detection of wormhole attacks present along a path. Neighbor
Discovery/Verification Based techniques uses neighbor/network
information for the detection of wormhole attacks. This may Motivation behind this work is as per now, there is solution
either involve verification from neighbors, neighbor information or against the wormhole attack in RPL based IoT environment yet
neighbor monitoring to detect the wormhole attack. proposed. This could be step towards the design of such system
for detecting and identifying of wormhole attack and attackers.
Statistical Analysis based approach (SAM) [3] monitors the
occurrence of links returned for a particular destination in multi 3. PROPOSED SYSTEM
path protocols for detection of wormhole link. DELPHI [4], Delay
Per Hop Indication. They observe delay per hop from source Proposed system is an novel Intrusion detection system (IDS)1
to destination for different paths for wormhole detection. [5] based wormhole attack detection system for resource constrained
Proposed the use of Directional antennas for handling of wormhole devices.
attacks. Their main motive is to avoid nodes that give incorrect
location information by installing directional antennas. E2SIW The attack always brings the abnormal changes in network. Ev-
(Energy Efficient Scheme Immune to Wormhole attacks) [6] for ery attack leaves its symptoms on system, from which we can con-
the prevention of wormhole attacks, uses location information clude that attack occurred and what kind of that attack was. So we
received from the GPS hardware. The approach only tries to assumed the hypothesis as “more number of neighbor gets formed
prevent the wormhole attack. It doesn’t take into consideration the after attack has been triggered and all new neighbors are from other
detection of the wormhole nodes and their punishment. end of wormhole tunnel”. If neighbor is not in transmission range
of node then this is due to attack only. During the attack lots of con-
Raju et al. [7] proposed the use of Average One hop RTT to trol packets are going to exchange form one end of tunnel to other
calculate average time of larger paths to avoid wormhole links. If in that neighbor advertisement, neighbor solicitation and DIO helps
a link has taken more time than the average RTT times hops of the in formation of neighbors beyond the transmission range.
link, it is considered as suspicious and is not used for further com-
munications. The approach is likely to fail when the attackers are 3.1 Architecture
connected via a high speed link or there is congestion in network
The architecture of IDS is shown in Fig 2 consist of the sensor
hence generating false alarms. Yifeng Zhou et al. [8] proposed, a
network connected to Internet using IPv6 border router (6BR). The
technique for detection of wormhole attacks based on distance ver-
placement for IDS system uses hybrid approach, in which central-
ification is proposed for mobile ad hoc network (MANETs) appli-
ized modules on 6BR and Distributed modules on the sensor nodes
cations. A node estimates its distances to a sender node based on
cooperates to detect attack. We considered the static topology, and
the received signal strength (RSS) of received packets, and uses
them to verify against the distances computed from the location
information in the packets. The details about attacks on RPL and 1 For source code contact [email protected] or visit at
6LoWPAN and their measures on it are well discussed in [9]. https://github.com/pavanpongle/IoT-Wormhole-IDS

2
International Journal of Computer Applications (0975 - 8887)
Volume 121 - No. 9, July 2015

records the RSSI value form other victim colleague and send it to
6BR. The received RSSI values are from the the two victim nodes
and other nodes in the range of attacker node. The duplicate RSSI
received packets from same node are discarded by comparing that
node already sent the RSSI value.
3.2.4 Attacker detection. This module process on received RSSI
value to find the attacker node. Using RSSI to distance d it states
the nodes in that range d, and list the nodes with probability of
having attacker nodes.

3.3 Distributed Modules


3.3.1 Send Neighbor info. In network initialization period this
module stores the initial neighbor as original neighbors before at-
tack. For each periodic time, if node found the change in neighbor
numbers are more than previous then, It send the neighbor informa-
tion packet as shown in Fig 4 to 6BR. This packets is sent to root
node by broadcasting and through the existing route. The code 2
Fig. 2. Architecture of the system indicate that it is neighbor information packet. The sequence num-
ber is to avoid re-processing of the same packet which is received
location information of all sensor node known at deployment time from other node due to packet forwarding nature of algorithm. The
at 6BR and during network initialization period there is no attack second and fourth fields are host id’s of information owned nodes
in network. The working of modules are discussed below, and packet forwarder node respectively. This forwarder and sender
fields avoids the repeated forwarding of packet from both owned
3.2 Centralized modules and sender node. For keeping neighbor count nbr count field added
3.2.1 Neighbor Validation. In this module we are collecting the (16 bit) short int, and followed by the neighbors host ID’s (8 bit un-
neighbor information from all sensor nodes storing them. The signed integer). The information size calculated as (8 + nbr count)
stored neighbors information are verified based on the distance Bytes.
between the node and that neighbor. If the distance found to be
more than transmission range of node then this module send the
victim packet to the information sender node and to the neighbor
whose distance is more than transmission range. The victim packet
is shown in Fig 3, first field is code (16 bit) to identifying victim
packet at application layer, second field is destination node host ID
to which this packet is prepared. and last one is host ID of neighbor Fig. 4. Neighbor information packet structure
which is another victim node. Packet size is 4 Bytes at application
layer, if we takes host id as unsigned integer Byte.

3.3.2 Packet Forwarding. Due to UDP protocol at transport


layer, there is no guaranty of packet delivery. To assure packet
delivery to root node, other nodes helps the sender node in for-
warding packet. Initially the important packets are send through
Fig. 3. Victim packet structure default route and another by the broadcasting the packet. In be-
tween these transmission, the pause for some second (2 in experi-
mentation) are taken to avoid the packet loss due to collision and
3.2.2 Distance RSSI. This module calculates the distance be- buffer over flow. When other node receives the broadcast packets
tween two geographical coordinates. It also convert the RSSI (Re- (nbr info, RSSI val ) it sends this packets to root nodes through its
ceived Signal Strength Indicator) value to distance and vice versa. own default route. If the node receives the victim forward packet
This module provide access to location, range information about from root node it local unicast to the destination node. The packet
each node. For the simulation purpose we have considered the structure of victim forward packets are shown in Fig 5. and the
node’s range as 100 m. We recorded RSSI value for each meter structure of RSSI val, nbr info packets are same as the shown in
and stored in 1 dimensional array. This avoids the re-calculation Fig 6 and Fig. 4 respectively.
of distance from the RSSI value and vice versa. We have assumed
that at initial 5 min are given to network initialization and there is
no attack in this short period. In this period we are calculating the
distance between each node and storing in 2 dimensional array. For
simulation purpose, taking geographical co-ordinates is difficult so
we have used the node’s x,y position obtained from simulator.
Fig. 5. Victim forwarding packet structure
3.2.3 RSSI collection. After detecting the attack, and sending the
attack packet (victim packet) to victim nodes, This module wait for
the period until the nodes finishes victim packet transmission and

3
International Journal of Computer Applications (0975 - 8887)
Volume 121 - No. 9, July 2015

3.3.3 Monitoring RSSI. When node receives the victim packet ei- (c) If other victim neighbor node is 6BR the
ther from the root node or from broadcasting, it initiate the moni- Initiate the Monitoring algorithm
toring process. Node receiving victim packet if it found its own
ID at destination place (second field), and other victim colleague (3) If victim packet is sent then
in third field. it prepare victim broadcast packet containing desti- Wait for time until all RSSI values to be received and until then
nation field as other victim colleague ID and at third field its own no other new attack processing
id (interchange the two IDs). This two node records the each oth- (4) If RSSI value from node Ni is received the drop all further
ers RSSI value receiving from broadcast victim packets. and other RSSI val packets from node Ni as duplicate packets
node records the RSSI value as mentioned in algorithm monitor- (5) If RSSI wait timer expires and at least one RSSI value received
ing algorithm. The two victim node broadcast the N victim packets then
to locate the attacker node.
(a) Find the RSSI to distance d for all received RSSI values
3.3.4 Send RSSI. After broadcasting the n victim packets the (b) Find the all nodes which are in the range of distance d
recorded RSSI value must reach to the sink node for attacker node considering error in measurments of RSSI values. these
detection, so due to unreliable UDP protocol we are sending the nodes are suspect nodes.
RSSI packets repeatedly by unicast, broadcast and through the de- (c) Keep count with all such suspect nodes, for how many
fault route. The each node waits for time until all node finishes time it is suspected as attacker node.
victim packet transmission, and send RSSI packets by taking pause (d) The suspect node having high probability is consider as
of fixed interval between each successive RSSI packet send. The attacker node.
packet structure is shown in Fig. 6. Here first field is code 5 for
RSSI packet, second the RSSI value recored by node and third is to 4.1.3 Algorithm for monitoring node
which node’s it had recorded. and followed by three RSSI values.
(1) When node receives victim packet contains its own ID then
(a) It start monitoring for other victim colleague node (Third
field in victim packet)
(b) Start transmission of n victim packets to other victim col-
Fig. 6. Sending RSSI value packet structure league
(c) Similarly other victim colleague node does same on re-
ceiving such victim packet
4. METHODOLOGY AND ALGORITHMS (2) When node receives victim packet that does not contains its
own ID then
4.1 Algorithms
(a) If both victim nodes are original neighbors of node then it
4.1.1 Algorithm for detection of wormhole attack on sensor nodes does not monitor for any node
(1) For every node N do (b) If both victims are not original neighbors of node then it
Wait for settlement of the network monitor for unknown node, i.e. It records the RSSI value
of received victim packets
(2) After network initialization, stores the current neighbors as
(c) If one victim is original neighbor of node and other isn’t
original neighbors
then it monitor for victim node which is not its original
(3) For every periodic time do neighbor. means record the RSSI value of the victim pack-
Check whether there is change in neighbors ets that it is receiving form non original neighbor node.
If change in neighbors found then
Send nbr info (neighbor information) to 6BR through broad-
cast and default route 4.2 Attacker Node Creation
(4) If node receives the victim packet then Only Packet relay and encapsulation kind of wormhole attacker
Initiate monitoring algorithm are evaluated in experimentation. Various configurations are there
(5) If node finishes the recording of RSSI value then to construct the attacker node, ex. encapsulation kind of wormhole
Broadcasts and unicast the RSSI value packet to reach to sink can be created at network and mac layer also. Let see how attacker
node multiple times node does malicious activity.
(6) If node receives broadcast nbr info and RSSI value packets 4.2.1 Packet Relay Wormhole Attacker. In this kind of attacker
then node, it relays/transmits the packets which are received on its radio
Send the received packets to the root node through default interface without making any changes in packet. In Fig 7 we can
route see the various layers of Contiki OS. At radio layer for listening the
4.1.2 Algorithm for wormhole detection at the 6BR packets from all node first the radio interface is put in promiscuous
mode, so that it can get the packets which are not for him. In cc2420
(1) Calculate distance between each node configuration by making the register bits of CC2420 MDMCTRL0
(2) If neighbor info received from node Ni then (address decoder) to 0 we can achieve it. Now we can get the pack-
If actual distance between Ni and its neighbor is more than the ets of other node. Next step is relaying the packet, here the all
range of node Ni then packets are relayed including unicast, broadcast, packets belongs
(a) Generate Alert for attack to other PAN. This is done at RDC (Radio duty cycling layer) layer
(b) Send victim packet to nbr info sender node and other vic- only know as sicslowmac in Contiki. We are not letting packets to
tim neighbor node go at upper layer.

4
International Journal of Computer Applications (0975 - 8887)
Volume 121 - No. 9, July 2015

Fig. 7. Contiki Layer wise

4.2.2 Encapsulation Type Wormhole Attacker. We are con-


structed the encapsulation kind of wormhole attacker using 3 node,
2 attacker node and 1 intermediate node helping to establish tun-
nel between them. First step is same as to put radio interface in
promiscuous mode. In second step to avoid the loop formation be- Fig. 10. Wormhole Attack in RPL
tween attacker the change in source PAN ID is used. In Fig 9 MAC
PDU is shown, so 2 bytes source PAN ID field is in addressing this scenario if node 5 send the information about 19 as new neigh-
fields of PDU. Consider attacker in Fig 8 the 1 Byte in Source PAN bors, 6BR confirms using location and range information they are
ID is adjusted or changed such that the node can easily identify out of range and declares the existence of attack. 6BR send victim
that from which node it has received this packet and which is now packet to 5 and 19. Then according to algorithm n victim packets
next node to whom to send. If 1 want to send packet to 3 then PAN are broadcast. The nodes which listen broadcast packets follows
ID changes from 170 to 171 to 172 to again 170 which is PAN ID the monitoring algorithm for recording of RSSI value form right
of entire network. During this the normal node listening packets in node. Here 4, 2 records RSSI value of packet received from 19 as
which PAN ID is not 170 are discarded only attacker node process 5 is original neighbor similarly for 7, 14, and 12. Node 6 doesn’t
such packets. monitor for any node as both 5 and 19 are its neighbors and it may
cause confusion for which node to monitor. Node 9, 11, 18, 20 just
records the RSSI value of victim packets it received, as both 5 and
19 are not their neighbors. Node 2 and 7, 14 never receives the
packets from 19 and 5 respectively, so after waiting for fixed time
they will continue to normal operation. When RSSI value received
from all node at 6BR, it find out node at distance di , where di is
calculated form RSSI value Ri . At last the nodes having high count
of suspect is a attacker node.
Fig. 8. Encapsulation Kind of Wormhole Attack
6. RESULTS AND DISCUSSIONS
In this section we present the evaluation of proposed system in
terms of detection rate, energy, packet and memory overhead.

6.1 Experimental setup


We run our experiments in Contiki’s network simulator Cooja
Fig. 9. MAC Layer Packet Format that has shown to produce realistic results. Cooja runs deploy-
able Contiki code. In our simulations, we use emulated Tmote Sky
nodes. In general, we expect that the 6BR is not a constrained node
and it can be a PC or a laptop; however, currently there exists no PC
5. DISCUSSION ON WORMHOLE ATTACK equivalent 802.15.4 devices, therefore we run the 6BR natively i.e.
DETECTION JNI (Java Native Interface) on Linux. The protocol configuration is
as, as Radio interface cc2420 is used, at RDC (Radio Duty Cycling)
Fig 10 shows the RPL tree. Initially during the network initial- layer sicslowmac is used, which is 802.15.4 compatible. Above this
ization period each node stores their original neighbor information. layer, in MAC CSMA (Carrier Sense Multiple Access) protocol is
Node 1 is 6BR, 10 and 13 (Black colored) are attacker nodes. They used. At network layer sicslowpan (6LowPAN), IPv6 and RPL as
formed the wormhole tunnel. When the attack begins, the pack- routing protocol is used. UDP is as transport layer protocol.
ets received on radio interface of 10 will be send to 13 through
wormhole tunnel, and similarly from 13, node 10 will receive the 6.2 Topologies For Experimentation
packets and here node 10 will relay the packets. When node sends
the control packets (Neighbor advertisement, Neighbor solicitation We have considered there topologies 8, 16, 24 nodes as shown
DIO etc.), these packets will reach in other side of tunnel. When in Fig 11, 12, 13 respectively. The placement of node are random.
nodes in the range of attacker realize existence of new neighbors, The node number 1 is 6BR node shown in unique color in each
they send neighbor information to 6BR for validation purpose. In topology. Rest node are the Tmote sky node running same IDS dis-

5
International Journal of Computer Applications (0975 - 8887)
Volume 121 - No. 9, July 2015

tributed module, and 6BR runs centralized modules. Topology is 6.3 True Positive Detection Rate
adjusted such that each node should be in the range of at least one
other node, such that tree structure formed and network partition For detection rate we have performed the various number of
should not be there. simulation on 8, 16, 24 node topology. Taking distinct nodes as
attacker. This result is combination of both Packet relay and En-
capsulation kind of wormhole attack. The result for attack detec-
tion in graph 14 is 94%, and of both attacker and attack is 87%.
Only attack detected but not attacker is more found in Encapsula-
tion kind of attack and where there is not sufficient number of nodes
to monitor RSSI values and if victim packet unable to reach to vic-
tim nodes. The nodes at the leaf of tree are mostly not considered
as attacker as, attack by them does not affect the normal operation
of topology, ex. node 19 in 24 node topology is not considered as
attacker and if attack performed by 19 (Packet relay) the no wrong
neighbors can be formed and thus, unable to detect such attacker.
All detection rate is only depend on successful packet delivery.

Fig. 11. 8 Nodes Topology

Fig. 14. True Positive Detection Rate

6.4 Energy overhead caused by IDS


Fig. 12. 16 Nodes Topology The nodes in the IoT are usually battery powered and hence
energy is a scarce resource. Here we measure IDS’s power
consumption and overhead. We use Contiki Powertrace [15] to
measure the power consumption. The output from the Powertrace
application is the total time the different parts of the system were
on. We calculate the energy consumption using the nominal values,
the typical operating conditions of the Tmote sky, shown in Table
2. We use 3 V in our calculations. Micro-Controller Unit (MCU)
idle while the radio is off is referred to as low power mode, or
LPM (Low Power Mode). The time the MCU is on and the radio is
off is referred to as CPU time. The time the radio is receiving and
transmitting with the MCU on is referred to as listen and transmit
respectively.

We measure energy in both IDS and Hello World application


running for 30 min for knowing overhead energy consumed by IDS
system. We run each experiment in a network of 8, 16 and 24 em-
ulated Tmote sky nodes, with nodes placed at the same locations.
Fig. 15 shows the network-wide energy usage for 30 min by all the
nodes in Hello World application and IDS, calculated as follows

Energy(mJ) = ((CP U ∗ 1.8 + LP M ∗ 0.0545 + T ransmit


Fig. 13. 24 Nodes Topology
∗ 19.5 + Listen ∗ 21.8) ∗ 3)/(4096 ∗ 8) (1)

6
International Journal of Computer Applications (0975 - 8887)
Volume 121 - No. 9, July 2015

there was no attack (clean network with Hello World running on


sensor node) and the other topology in which IDS was installed and
Table 2. Tmote Sky Operating Conditions[16] we detected the attack. We also measured the energy required for
Typical operating Min NOM Max Unit packet during attack detection, i.e. in third bar. This is calculated
conditions by taking difference of Energies of topology in which there was
Voltage 2.1 3.6 V attack but we didn’t detected it and the other topology in which we
MCU on, Radio RX 21.8 23 mA detected the attack. Here In both topologies IDS were installed on
MCU on, Radio TX 19.5 21 mA nodes. The last bar (Yellow color) shows the energy consumption
MCU on, Radio off 1800 2400 µA overhead when attack takes place in 30 min. In all cases we given
MCU idle, Radio off 54.5 1200 µA initial 5 min for network settlement and triggering the attack at 5th
MCU standby 5.1 21.0 µA min.

6.5 Packet Overhead


We have also measured the packet overhead during the attack
detection and due to the attack in network. In Fig 17 we can see
the various packet overhead for the same topologies discussed in
experimental setup section. We ran simulation for 30 min and taken
the difference of packets in clean network and attack occurred at
5th min network. Here we can see the there is no change in DIS
packets in both cases but Neighbor advertisement and neighbor
solicitation found to be more in after attack takes place. The overall
increase in control packet after attack occurred is considerable.

In Fig 18, we have shown the packet overhead in attack de-


tection. Our IDS uses only UDP packets to detect the attack, so in
graph we can see that the increase in UDP packets. We triggered the
attack at 5th min and is detected at average 11th min. The packet
requirement is depend on the location of wormhole attacker and
denseness around the attacker node.

Fig. 15. Energy Consumption in 30 min

Fig. 17. Packet overhead due to wormhole attack

6.6 Memory consumption


In Table 3 we show the ROM and RAM requirements of IDS’s
Fig. 16. Energy overhead for various events different modules. The baseline for each configuration is different
as some depend on different parts of the Contiki system. For exam-
ple, the 6BR that resides in the PC requires more ROM than other
The overhead caused by IDS in 30 min is shown in Fig 16, First nodes. However, the total additional ROM required to host IDS’s
bar in 8, 16, 24 nodes. It is very low for constrained node also. We modules inside a constrained node is 24.9 KB which is well be-
also measured the attack detection overhead, i.e. in second bar. This low the total available ROM in constrained devices such as 48 KB
is calculated by taking difference of Energies of topology in which in Tmote sky. It is important to note the overhead column which

7
International Journal of Computer Applications (0975 - 8887)
Volume 121 - No. 9, July 2015

on sensor nodes causing saving of energy on sensor nodes. Adding


location information of nodes made system more efficient for de-
tection of wormhole attack with lesser overhead and with high true
positive detection rate. This method takes fixed number of UDP
packets for attack detection. The RAM/ROM consumption is also
very small as compared to total available sizes. The method given
94% detection rate which is very good for resource constrained en-
vironment.

Acknowledgment
I am thankful of my guide G. T. Chavan for his guidance and
constant encouragement throughout the course of this work. Lastly,
I thank almighty, my family and friends for their constant encour-
agement without which this work would not be possible.

9. REFERENCES
Fig. 18. Packet overhead in attack detection
[1] IETF, RPL. “Routing Over Low Power and Lossy Networks.”
[2] Wallgren, Linus, Shahid Raza, and Thiemo Voigt. “Routing
shows the pure overhead of IDS modules in Contiki. This overhead
Attacks and Countermeasures in the RPL-based Internet of
is the difference between Hello world application and IDS, as Hello
Things.” International Journal of Distributed Sensor Networks
world application inside Contiki is the lightest application avail-
2013, 2013.
able. Even though centralized modules are not targeted towards
running on constrained nodes it is still lightweight enough and can [3] Song N, Qian L, Li X, “Wormhole attacks detection in wire-
be used for small networks.The total RAM size in the Tmote sky is less ad hoc networks: a statistical analysis approach”, Paral-
10 KB, hence IDS modules with 2.8 KB additional RAM require- lel and Distributed Processing Symposium, 2005. Proceedings.
ment can easily run in constrained nodes. 19th IEEE International,vol., no., pp. 8 pp., 4-8 April 2005.
[4] H. S. Chiu and K. Lui, “DelPHI: Wormhole Detection Mech-
anism for Ad Hoc Wireless Networks”,In Proceedings of In-
Table 3. Additional ROM and RAM usage by IDS ternational Symposium on Wireless Pervasive Computing, pp.
Node ROM RAM ROM RAM ROM RAM 6-11, 2006.
/Size total total occu- occu- Over- Over-
[5] L. Hu and D. Evans, “Using directional antennas to prevent
(B) pied pied head head
wormhole attacks”, Proc. Symp. Netw. Distrib. Syst. Security,
6BR 1 MB - 1,58,813 64,340 96,962 42,636 2004
Sky Mote 48KB 10KB 43,098 7,454B 24,900 2,886
[6] Dhurandher, Sanjay Kumar, et al., “E2SIW: An Energy Effi-
cient Scheme Immune to Wormhole Attacks in Wireless Ad
Hoc Networks. ”, Advanced Information Networking and Ap-
plications Workshops (WAINA), 2012 26th International Con-
7. FUTURE WORK ference on. IEEE, 2012
The proposed IDS system are very easy to extend. There are [7] Raju, V. Karthik, and K. Vinay Kumar, “A Simple and Efficient
a number of potential attacks against the Internet of Things and it Mechanism to Detect and Avoid Wormhole Attacks In Mobile
is likely that more attacks will be discovered. The location infor- Ad Hoc Networks”, Computing Sciences (ICCS), 2012 Inter-
mation of nodes will also help to mitigate the Sybil and Clone ID national Conference on. IEEE, 2012.
attacks and will enhance its intrusion detection capabilities. RPL [8] Yifeng Zhou , Lamont L , Li Li,“Wormhole attack detection
specific attacks Version Number and Local Repair attack can be based on distance verification and the Use of hypothesis test-
detected by validating DODAG version and ID at 6BR [9]. Worm- ing for wireless ad hoc networks”, Military Communications
hole attack can be combined with the selective forwarding attack Conference, MILCOM IEEE, 2009
e.g. sending either data or control packet through tunnel detecting [9] Pavan Pongle, Gurunath Chavan, “A survey: Attacks on RPL
this could be an extension for proposed system. This system also and 6LoWPAN in IoT ”, International Conference on Perva-
able to detect the neighbor attack [17] only but not evaluated yet. sive Computing (ICPC) IEEE, 2015
Minor changes in system will help to detect the Neighbor attacker [10] Amin, Syed Obaid, et al. “A novel coding scheme to im-
also. plement signature based IDS in IP based Sensor Networks.”
Integrated Network Management-Workshops, 2009. IM’09.
8. CONCLUSION IFIP/IEEE International Symposium on. IEEE, 2009.
Considering the potential applications of the IoT it is impor- [11] Kasinathan, Prabhakaran, et al. “Denial-of-Service detection
tant that 6LoWPAN networks are protected against internal and in 6LoWPAN based internet of things.” Wireless and Mobile
external intrusions. This work concludes that, the proposed novel Computing, Networking and Communications (WiMob), 2013
light weight IDS system is basically designed for resource con- IEEE 9th International Conference on. IEEE, 2013.
strained sensor nodes and able to detect Wormhole attacks of two [12] Le, Anhtuan, et al. “Specification-based IDS for securing
kind packet relay and encapsulation. Mostly centralized modules RPL from topology attacks.” Wireless Days (WD), 2011 IFIP.
are used for doing heavy processing and Light weight modules run IEEE, 2011.

8
International Journal of Computer Applications (0975 - 8887)
Volume 121 - No. 9, July 2015

[13] Raza, Shahid, Linus Wallgren, and Thiemo Voigt. “SVELTE:


Real-time intrusion detection in the Internet of Things.” Ad hoc
networks 11.8 (2013): 2661-2674.
[14] Jun, Chen, and Chen Chi. “Design of Complex Event-
Processing IDS in Internet of Things.” Measuring Technology
and Mechatronics Automation (ICMTMA), 2014 Sixth Interna-
tional Conference on. IEEE, 2014.
[15] A. Dunkels, J. Eriksson, N. Finne, N. Tsiftes, Powertrace:
NetworkLevel Power Profiling for Low-Power Wireless Net-
works, 2011.
[16] http://www.eecs.harvard.edu/k̃onrad/projects/shimmer
/references/tmote-sky-datasheet.pdf
[17] Le, Anhtuan, et al. “The impacts of internal threats towards
Routing Protocol for Low power and lossy network perfor-
mance.” Computers and Communications (ISCC), 2013 IEEE
Symposium on. IEEE, 2013.

You might also like