A Survey on Attacks, Security Mechanisms and Secure Extensions of Hierarchical Clustering Based Sensor Networks

Authors

  • Saziya Tabbassum  Department of Computer Science, OPJS University Churu, Rajasthan, India
  • Sanjeev Bangarh   Department of Computer Science, OPJS University Churu, Rajasthan, India

DOI:

https://doi.org//10.32628/CSEIT2176108

Keywords:

Wireless Sensor Network, LEACH, Attacks, Security Threats, Security Mechanism, Secure LEACH

Abstract

Wireless Sensor Networks (WSNs) consists of large number of sensors deployed in regions required by the applications to collect information about the surrounding environment. WSNs are highly vulnerable to security attacks at various levels due to their distributed nature, multi-hop data forwarding, and open wireless medium. A clustering-based routing protocol LEACH is a successful protocol for routing in WSNs as well as evenly utilizing energy of sensor nodes since all sensor nodes have limited source of energy. However, LEACH protocol also has some flaws which can attract attackers and they can cause serious damage either physically or it can also steal information from the network. Due to this reason security is the main problem of LEACH protocol and many secure versions of this protocol have been designed to make it resilient against insider as well as outsider attackers. In this paper, we discuss some of the threats in WSNs along with various kinds of attacks as well as mechanism to deal with such threats. Furthermore, we discuss LEACH protocol and its extensions, various techniques used to define secure LEACH which can protect network from entering intruders. Lastly, we compare some secure LEACH schemes like cryptographic-based or trust-based scheme.

References

  1. N. Bulusu, J. Heidemann, and D. Estrin, “GPS-less Low Cost Out Door Localization for Very Small        Devices,” Tech. rep. 00729, Comp. Sci. Dept., USC, Apr. 2000.
  2. A. Savvides, C.-C. Han, and M. Srivastava, “Dynamic Fine-Grained Localization in Ad-Hoc Networks of Sensors,” Proc. 7th ACM MobiCom, July 2001, pp. 166–79.
  3. Ian F. Akyildiz and Mehmet Can Vuran, Wireless Sensor Networks c 2010 John Wiley & Sons, Ltd.
  4. Siva D. Muruganathan, Daniel C. F. Ma, Rolly I. Bhasin, and Abraham O. Fapojuwo “A Centralized Energy-Efficient Routing Protocol for Wireless Sensor Networks”, IEEE Radio Communications March 2005.
  5. W. Heinzelman, A. Chandrakasan and H. Balakrishnan, “Energy-Efficient Communication Protocol for Wireless Microsensor Networks,” Proc. 33rd Hawaii Int’l. Conf. Sys. Sci., Jan. 2000.
  6. John Paul Walters, Zhengqiang Liang, Weisong Shi, Vipin Chaudhary, “Wireless Sensor Network Security: A Survey”, Security in Distributed, Grid and Pervasive Computing Yang Xiao (Eds), year 2006.
  7. W. Heinzelman, J. Kulik, and H. Balakrishnan, “Adaptive Protocols for Information Dissemination in Wireless Sensor Networks,” Proc. 5th ACM/IEEE Mobicom, Seattle, WA, Aug. 1999. pp. 174–85.
  8. J. Kulik, W. R. Heinzelman, and H. Balakrishnan, “Negotiation-Based Protocols for Disseminating Information in Wireless Sensor Networks,” Wireless Networks, vol. 8, 2002, pp. 169–85.
  9. Culler, D. E and Hong, W., “Wireless Sensor Networks”, Communication of the ACM, Vol. 47, No. 6, June 2004, pp. 30-33.
  10. C. Intanagonwiwat, R. Govindan, and D. Estrin, “Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks,” Proc. ACM Mobi-Com 2000, Boston, MA, 2000, pp. 56–67.
  11. D. Braginsky and D. Estrin, “Rumor Routing Algorithm for Sensor Networks,” Proc. 1st Wksp. Sensor Networks and Apps., Atlanta, GA, Oct. 2002.
  12. S. Lindsey and C. Raghavendra, “PEGASIS: Power-Efficient Gathering in Sensor Information Systems,” IEEE Aerospace Conf. Proc., 2002, vol. 3, 9–16, pp. 1125–30.
  13. A. Manjeshwar and D. P. Agarwal, “TEEN: A Routing Protocol for Enhanced Efficiency in Wireless Sensor Networks,” 1st Int’l. Wksp. on Parallel and Distrib. Comp. Issues in Wireless Networks and Mobile Comp., April 2001.
  14. A. Manjeshwar and D. P. Agarwal, “APTEEN: A Hybrid Protocol for Efficient Routing and Comprehensive Information Retrieval in Wireless Sensor Networks,” Proc. Int’l. Parallel and Distrib. Proc. Symp., pp. 195–202.
  15. J. N. Al-Karaki et al., “Data Aggregation in Wireless Sensor Networks — Exact and Approximate Algorithms,” Proc. IEEE Wksp. High Perf. Switching and Routing 2004, Phoenix, AZ, Apr. 18–21, 2004.
  16. S. Capkun, M. Hamdi, and J. Hubaux, “GPS-free Positioning in Mobile Ad-hoc Networks,” Proc. 34th Annual Hawaii Int’l. Conf. Sys. Sci., 2001 pp. 3481–90.
  17. Y. Xu, J. Heidemann, and D. Estrin, “Geography informed Energy Conservation for Ad-hoc Routing,” Proc. 7th Annual ACM/IEEE Int’l. Conf. Mobile Comp. and Net., 2001, pp. 70–84.
  18. B. Chen et al., “SPAN: An Energy-efficient Coordination Algorithm for Topology Maintenance in Ad Hoc Wireless Networks,” Wireless Networks, vol. 8, no. 5, Sept. 2002, pp. 481–94.
  19. Y. Yu, D. Estrin, and R. Govindan, “Geographical and Energy-Aware Routing: A Recursive Data Dissemination Protocol for Wireless Sensor Networks,” UCLA Comp. Sci. Dept. tech. rep., UCLA-CSD TR-010023, May 2001.
  20. I. Stojmenovic and X. Lin, “GEDIR: Loop-Free Location Based Routing in Wireless Networks,” Int’l. Conf. Parallel and Distrib. Comp. and Sys., Boston, MA, Nov. 3–6, 1999.
  21. Tahir Naeem, Kok-Keong Loo, Common Security Issues and Challenges in Wireless Sensor Networks and IEEE 802.11 Wireless Mesh Networks, International Journal of Digital Content Technology and its Applications, Page 89-90 Volume 3, Number 1, year 2009.
  22. Culler, D. E and Hong, W., “Wireless Sensor Networks”, Communication of the ACM, Vol. 47, No. 6, June 2004, pp. 30-33.
  23. Adrian Perrig, John Stankovic, David Wagner, “Security in Wireless Sensor Networks” Communications of the ACM, Page53-57, year 2004.
  24. Pathan, A.S.K.; Hyung-Woo Lee; Choong Seon Hong, “Security in wireless sensor networks: issues and challenges” Advanced Communication Technology (ICACT), Page(s):6, year 2006
  25. Md. Solaiman Ali, Tanay Dey, and Rahul Biswas, “Advanced LEACH Routing Protocol for Wireless Microsensor Networks”, Department of Computer Science & Engineering Khulna-9203, 5th International Conference on Electrical and Computer Engineering ICECE 20-22 December 2008.
  26. Muhammad Omer Farooq, Abdul Basit Dogar, Ghalib Asadullah Shah,” Multi-hop Routing with Low Energy Adaptive Clustering Hierarchy”, 2010 Fourth International Conference on Sensor Technologies and Applications, IEEE Computer Society.
  27. Wendi Rabiner Heinzelman, Anantha Chandrakasan, and Hari Balakrishnan, “Energy-Efficient Communication Protocol for Wireless Micro-Sensor Networks”, Proceedings of the 33rd Hawaii International Conference on System Sciences – 2000.
  28. Wang, J, Yang, G, Chen, S, Sun, Y., Secure leach routing protocol based on low- power cluster-head selection algorithm for wireless sensor networks, Inter- national Symposium on Intelligent Signal Processing and Communication Systems, 2007, PP.341-344.
  29. Xiao-Yun W, Li-Zhen Y, Ke-fei C., “SLEACH: Secure Low Energy Adaptive Clustering Hierarchy Protocol for Wireless Sensor Networks”, Wuhan University Journal of Natural Sciences 2005;10(1):127–31.
  30. Oliveira LB, Ferreira A, Vilaca MA, Wong H C, Bern M, Dahab R, Loureiro, “Sec LEACH On the security of clustered sensor networks”, Journal of Signal Processing 2007:2882–95.
  31. Xiao Y, Rayi VK, Sun B, Du X, Hu F, Galloway M., “A survey of key management schemes in WSNs”, journal of Computer Communications 2007.
  32. Simplcio Jr MA, Barreto PSLM, Margi CB, Carvalho TCMB, “A survey on key management mechanisms for distributed Wireless Sensor Networks”, Journal of Computer Networks 2010.
  33. Zhu, S, Setia, S, Jajodia, S, “Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks”, 10th ACM conference on Computer and communications security, 2004.
  34. Jøsang, A and Ismail, R., ‘‘The Beta Reputation System”, 15th Bled Electronic Commerce Conference Bled, Slovenia, 2002.
  35. Abuhelaleh, MA, Mismar, TM, Abuzneid, AA, “Armor-LEACH – Energy Efficient, Secure Wireless Networks Communication”, 17th International Conference on Computer Communications and Networks, 2008.
  36. Abbasi AA, Younis M, “A survey on clustering algorithms for WSNs”, Computer Communications 2007.
  37. Zhang, K, Wang, C, Wang, C., “A Secure Routing Protocol for Cluster-Based Wireless Sensor Networks Using Group Key Management”.
  38. Jangra, A. Swati, Priyanka, “Securing LEACH Protocol from Sybil Attack using Jakes Channel Scheme (JCS)”, International Conference on Advances in ICT, 2011.
  39. Muneer Alshowkan, Khaled Elleithy, Hussain AlHassan, “A New Secure and Energy Efficient Routing Protocol for Wireless Sensor Networks”, Department of Computer Science and Engineering University of Bridgeport, USA.
  40. Weichao, W, Fei, D, Qijian, X, “an Improvement of LEACH Routing Protocol Based on Trust for Wireless Sensor Networks, 2009, 5th Conference on Wireless Communications and Mobile Computing, 2009, PP.1-4.
  41. Bhuvaneswari PTV, Vaidehi V, “Enhancement techniques incorporated in LEACH- a survey”, Indian Journal of Science and Technology 2009.
  42. Yang, Li, “Centralized security protocol for wireless sensor networks”, Master’s Project, San Jose State University, spring 2011.

Downloads

Published

2021-01-30

Issue

Section

Research Articles

How to Cite

[1]
Saziya Tabbassum, Sanjeev Bangarh , " A Survey on Attacks, Security Mechanisms and Secure Extensions of Hierarchical Clustering Based Sensor Networks, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 8, Issue 1, pp.05-24, January-February-2022. Available at doi : https://doi.org/10.32628/CSEIT2176108