TY - JOUR
T1 - The sleep deprivation attack in sensor networks
T2 - Analysis and methods of defense
AU - Pirretti, Matthew
AU - Zhu, Sencun
AU - Vijaykrishnan, N.
AU - McDaniel, Patrick
AU - Kandemir, Mahmut
AU - Brooks, Richard
PY - 2006/9/1
Y1 - 2006/9/1
N2 - The ability of sensor nodes to enter a low power sleep mode is very useful for extending network longevity. We show how adversary nodes can exploit clustering algorithms to ensure their selection as cluster heads for the purpose of launching attacks that prevent victim nodes from sleeping. We present two such attacks: the barrage attack and the sleep deprivation attack. The barrage attack bombards victim nodes with legitimate requests, whereas the sleep deprivation attack makes requests of victim nodes only as often as in necessary to keep the victims awake. We show that while the barrage attack causes its victims to spend slightly more energy, it is more easily detected and requires more effort on behalf of the attacker. Thus, we have focused our research on the sleep deprivation attack. Our analysis indicates that this attack can nullify any energy savings obtained by allowing sensor nodes to enter sleep mode. We also analyze three separate methods for mitigating this attack: the random vote scheme, the round robin scheme, and the hash-based scheme. We have evaluated these schemes based upon their ability to reduce the adversary's attack, the amount of time required to select a cluster head, and the amount of energy required to perform each scheme. We have found that of the three clustering methods analyzed, the hash-based scheme is the best at mitigating the sleep deprivation attack.
AB - The ability of sensor nodes to enter a low power sleep mode is very useful for extending network longevity. We show how adversary nodes can exploit clustering algorithms to ensure their selection as cluster heads for the purpose of launching attacks that prevent victim nodes from sleeping. We present two such attacks: the barrage attack and the sleep deprivation attack. The barrage attack bombards victim nodes with legitimate requests, whereas the sleep deprivation attack makes requests of victim nodes only as often as in necessary to keep the victims awake. We show that while the barrage attack causes its victims to spend slightly more energy, it is more easily detected and requires more effort on behalf of the attacker. Thus, we have focused our research on the sleep deprivation attack. Our analysis indicates that this attack can nullify any energy savings obtained by allowing sensor nodes to enter sleep mode. We also analyze three separate methods for mitigating this attack: the random vote scheme, the round robin scheme, and the hash-based scheme. We have evaluated these schemes based upon their ability to reduce the adversary's attack, the amount of time required to select a cluster head, and the amount of energy required to perform each scheme. We have found that of the three clustering methods analyzed, the hash-based scheme is the best at mitigating the sleep deprivation attack.
UR - http://www.scopus.com/inward/record.url?scp=35348879637&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=35348879637&partnerID=8YFLogxK
U2 - 10.1080/15501320600642718
DO - 10.1080/15501320600642718
M3 - Article
AN - SCOPUS:35348879637
SN - 1550-1329
VL - 2
SP - 267
EP - 287
JO - International Journal of Distributed Sensor Networks
JF - International Journal of Distributed Sensor Networks
IS - 3
ER -