Skip to main content
Erschienen in: The Journal of Supercomputing 4/2019

19.11.2018

A comprehensive security analysis of LEACH++ clustering protocol for wireless sensor networks

verfasst von: Farrukh Aslam Khan, Ashfaq Hussain Farooqi, Abdelouahid Derhab

Erschienen in: The Journal of Supercomputing | Ausgabe 4/2019

Einloggen

Aktivieren Sie unsere intelligente Suche um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Wireless sensor networks (WSNs) will play a major role in future technologies in the development of the cyber-physical society. Studies show that WSNs are vulnerable to various insider attacks that may degrade its performance and affect the application services. Various intrusion detection system-based solutions have been proposed for WSNs to secure them from such attacks; however, these solutions have certain limitations with respect to completeness and evaluation. Recently, we proposed an intrusion detection framework to secure WSNs from insider attacks and proposed a protocol called LEACH++. In this paper, we perform a detailed security analysis of LEACH++ against black-hole, sink-hole and selective forwarding attacks by launching a number of attacks with different patterns. The results of our experiments performed in network simulator-2 show that the proposed scheme is highly efficient and achieves higher accuracy and detection rates with very low false-positive rate when compared to an anomaly based detection scheme.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Jaladi AR, Khithani K, Pawar P, Malvi K, Sahoo G (2017) Environmental monitoring using wireless sensor networks(WSN) based on IoT. Int Res J Eng Technol 4(1):1371–1378 Jaladi AR, Khithani K, Pawar P, Malvi K, Sahoo G (2017) Environmental monitoring using wireless sensor networks(WSN) based on IoT. Int Res J Eng Technol 4(1):1371–1378
2.
Zurück zum Zitat Shinde AT, Prasad JR (2017) IoT based animal health monitoring with naive bayes classification. Int Trends Emerg Trends Technol 4(2):8104–8107 Shinde AT, Prasad JR (2017) IoT based animal health monitoring with naive bayes classification. Int Trends Emerg Trends Technol 4(2):8104–8107
3.
Zurück zum Zitat Botta A, Donato W, Persico V, Pescape A (2016) Integration of cloud computing and internet of things: a survey. Future Gener Comput Syst 56:684–700CrossRef Botta A, Donato W, Persico V, Pescape A (2016) Integration of cloud computing and internet of things: a survey. Future Gener Comput Syst 56:684–700CrossRef
4.
Zurück zum Zitat Aazam M, Huh E, St-Hilaire M, Lung CH, Lambadaris I (2015) Cloud of things: integration of IoT with cloud computing. Robots Sens Clouds 36:77–94CrossRef Aazam M, Huh E, St-Hilaire M, Lung CH, Lambadaris I (2015) Cloud of things: integration of IoT with cloud computing. Robots Sens Clouds 36:77–94CrossRef
5.
Zurück zum Zitat Shanthi S, Rajan EG (2016) Comprehensive analysis of security attacks and intrusion detection system in wireless sensor networks. In: 2nd International Conference on Next Generation Computing Technologies, 2016, pp 426–431 Shanthi S, Rajan EG (2016) Comprehensive analysis of security attacks and intrusion detection system in wireless sensor networks. In: 2nd International Conference on Next Generation Computing Technologies, 2016, pp 426–431
6.
Zurück zum Zitat Yassen MB, Aljawaerneh S, Abdulraziq R (2016) Secure low energy adaptive clustering hierarchal based on internet of things for wireless sensor network (WSN): survey. In: IEEE International Conference on Engineering & MIS, Agadir, Morocco, 2016, pp 1–9 Yassen MB, Aljawaerneh S, Abdulraziq R (2016) Secure low energy adaptive clustering hierarchal based on internet of things for wireless sensor network (WSN): survey. In: IEEE International Conference on Engineering & MIS, Agadir, Morocco, 2016, pp 1–9
7.
Zurück zum Zitat Imran M, Khan FA, Abbas H (2014) Detection and Prevention of black hole attacks in mobile ad hoc networks. In: Security in Ad Hoc Networks (SecAN) Workshop, 13th International Conference on Ad-Hoc and Wireless Networks (Ad Hoc Now 2014), Benidorm, Spain, June 22–27, 2014 Imran M, Khan FA, Abbas H (2014) Detection and Prevention of black hole attacks in mobile ad hoc networks. In: Security in Ad Hoc Networks (SecAN) Workshop, 13th International Conference on Ad-Hoc and Wireless Networks (Ad Hoc Now 2014), Benidorm, Spain, June 22–27, 2014
8.
Zurück zum Zitat Ho CY et al (2012) False positives and negatives from real traffic with intrusion detection/prevention systems. Int J Future Comput Commun 1(2):87–90CrossRef Ho CY et al (2012) False positives and negatives from real traffic with intrusion detection/prevention systems. Int J Future Comput Commun 1(2):87–90CrossRef
9.
Zurück zum Zitat Heinzelman WB, Chandrakasan AP, Balakrishnan H (2002) An application-specific protocol architecture for wireless microsensor networks. IEEE Trans Wirel Commun 1(4):660–670CrossRef Heinzelman WB, Chandrakasan AP, Balakrishnan H (2002) An application-specific protocol architecture for wireless microsensor networks. IEEE Trans Wirel Commun 1(4):660–670CrossRef
10.
Zurück zum Zitat WB Heinzelman, AP Chandrakasan, H Balakrishnan (2000) Energy-efficient routing protocols for wireless microsensor networks. In: 33rd Hawaii International Conference System Sciences, Maui, HI, 2000 WB Heinzelman, AP Chandrakasan, H Balakrishnan (2000) Energy-efficient routing protocols for wireless microsensor networks. In: 33rd Hawaii International Conference System Sciences, Maui, HI, 2000
11.
Zurück zum Zitat Tripathi M, Laxmi V (2013) Comparing the impact of black hole and gray hole attack on LEACH in WSN. Procedia Comput Sci 19(1):1101–1107CrossRef Tripathi M, Laxmi V (2013) Comparing the impact of black hole and gray hole attack on LEACH in WSN. Procedia Comput Sci 19(1):1101–1107CrossRef
12.
Zurück zum Zitat Karlof C, Wagner D (2003) Secure routing in wireless sensor networks: attacks and countermeasures. In: The 1st IEEE International Workshop on Sensor Network Protocols and Applications, 2003, pp 113–127 Karlof C, Wagner D (2003) Secure routing in wireless sensor networks: attacks and countermeasures. In: The 1st IEEE International Workshop on Sensor Network Protocols and Applications, 2003, pp 113–127
13.
Zurück zum Zitat Ferreira AC et al (2005) On the security of cluster-based communication protocols for wireless sensor networks. In: 4th IEEE International Conference on Networking, 2005, pp 449–458 Ferreira AC et al (2005) On the security of cluster-based communication protocols for wireless sensor networks. In: 4th IEEE International Conference on Networking, 2005, pp 449–458
14.
Zurück zum Zitat Zhang K, Wang C, Wang C (2008) A secure routing protocol for cluster-based wireless sensor networks using group key management. In: 4th IEEE International Conference on Wireless Communications, Networking and Mobile Computing, 2008, pp 1–5 Zhang K, Wang C, Wang C (2008) A secure routing protocol for cluster-based wireless sensor networks using group key management. In: 4th IEEE International Conference on Wireless Communications, Networking and Mobile Computing, 2008, pp 1–5
15.
Zurück zum Zitat Wu D, Hu G, Ni G (2008) Research and improve on secure routing protocols in wireless sensor networks. In: 4th IEEE International Conference on Circuits and Systems for Communications, 2008, pp 853–856 Wu D, Hu G, Ni G (2008) Research and improve on secure routing protocols in wireless sensor networks. In: 4th IEEE International Conference on Circuits and Systems for Communications, 2008, pp 853–856
16.
Zurück zum Zitat Su CC, Chang KM, Kuo YH, Horng MF (2005) The new intrusion prevention and detection approaches for clustering-based sensor networks. In: IEEE Wireless Communications and Networking Conference, 2005, pp 1927–1932 Su CC, Chang KM, Kuo YH, Horng MF (2005) The new intrusion prevention and detection approaches for clustering-based sensor networks. In: IEEE Wireless Communications and Networking Conference, 2005, pp 1927–1932
17.
Zurück zum Zitat Lee S, Lee Y, Yoo SG (2012) A specification based intrusion detection mechanism for the LEACH protocol. J Inf Technol 11(1):40–48CrossRef Lee S, Lee Y, Yoo SG (2012) A specification based intrusion detection mechanism for the LEACH protocol. J Inf Technol 11(1):40–48CrossRef
18.
Zurück zum Zitat Kumar SR, Umamakeswari A (2016) SSLEACH: Specification based secure LEACH protocol for wireless sensor networks. In: IEEE WiSPNET, 2016, pp 1672–1676 Kumar SR, Umamakeswari A (2016) SSLEACH: Specification based secure LEACH protocol for wireless sensor networks. In: IEEE WiSPNET, 2016, pp 1672–1676
19.
Zurück zum Zitat Almomani I, Al-Kasasbeh B, Al-Akhras M (2016) WSN-DS: a dataset for intrusion detection systems in wireless sensor networks. J Sens 2016:1–16CrossRef Almomani I, Al-Kasasbeh B, Al-Akhras M (2016) WSN-DS: a dataset for intrusion detection systems in wireless sensor networks. J Sens 2016:1–16CrossRef
20.
Zurück zum Zitat Farooqi AH, Khan FA (2012) A survey of intrusion detection systems for wireless sensor networks. Int J Ad Hoc Ubiquit Comput 9(2):69–83CrossRef Farooqi AH, Khan FA (2012) A survey of intrusion detection systems for wireless sensor networks. Int J Ad Hoc Ubiquit Comput 9(2):69–83CrossRef
21.
Zurück zum Zitat Farooqi AH, Khan FA, Wang J, Lee S (2013) A novel intrusion detection framework for wireless sensor networks. Pers Ubiquit Comput 17(5):907–919CrossRef Farooqi AH, Khan FA, Wang J, Lee S (2013) A novel intrusion detection framework for wireless sensor networks. Pers Ubiquit Comput 17(5):907–919CrossRef
22.
Zurück zum Zitat Farooqi AH, Khan FA (2017) Securing wireless sensor networks for improved performance in cloud-based environments. Ann Telecommun 72(5):265–282CrossRef Farooqi AH, Khan FA (2017) Securing wireless sensor networks for improved performance in cloud-based environments. Ann Telecommun 72(5):265–282CrossRef
23.
Zurück zum Zitat Masdari M, Bazarchi SM, Bidaki M (2013) Analysis of secure LEACH-BASED clustering protocols in wireless sensor networks. J Netw Comput Appl 36(2013):1243–1260CrossRef Masdari M, Bazarchi SM, Bidaki M (2013) Analysis of secure LEACH-BASED clustering protocols in wireless sensor networks. J Netw Comput Appl 36(2013):1243–1260CrossRef
24.
Zurück zum Zitat Sundararajan RK, Arumugam U (2015) Intrusion detection algorithm for mitigating sinkhole attack on LEACH protocol in wireless sensor networks. J Sens 2015:1–12CrossRef Sundararajan RK, Arumugam U (2015) Intrusion detection algorithm for mitigating sinkhole attack on LEACH protocol in wireless sensor networks. J Sens 2015:1–12CrossRef
25.
Zurück zum Zitat Bansal V, Saluja KK (2016) Anomaly based detection of black hole attack on LEACH protocol in WSN. In: IEEE International conference on Wireless Communications, Singal processing and Networking, Chennai, India, 2016, pp 1924–1928 Bansal V, Saluja KK (2016) Anomaly based detection of black hole attack on LEACH protocol in WSN. In: IEEE International conference on Wireless Communications, Singal processing and Networking, Chennai, India, 2016, pp 1924–1928
26.
Zurück zum Zitat Mcdermott CD, Petrovki A (2017) Investigation of computational intelligence techniques for intrusion detection in wireless sensor networks. Int J Comput Netw Commun 9(4):45–56 Mcdermott CD, Petrovki A (2017) Investigation of computational intelligence techniques for intrusion detection in wireless sensor networks. Int J Comput Netw Commun 9(4):45–56
27.
Zurück zum Zitat Rizwan R, Khan FA, Abbas H, Chauhdary SH (2015) Anomaly detection in wireless sensor networks using immune-based bio-inspired mechanism. Int J Distrib Sens Netw 2015:Article ID 684952 Rizwan R, Khan FA, Abbas H, Chauhdary SH (2015) Anomaly detection in wireless sensor networks using immune-based bio-inspired mechanism. Int J Distrib Sens Netw 2015:Article ID 684952
28.
Zurück zum Zitat Da Silva APR et al (2005) Decentralized intrusion detection in wireless sensor networks. In: Proceedings of the 1st ACM International Workshop on Quality of Service & Security in Wireless and Mobile Networks, Quebec, Canada, 2005, pp 16–23 Da Silva APR et al (2005) Decentralized intrusion detection in wireless sensor networks. In: Proceedings of the 1st ACM International Workshop on Quality of Service & Security in Wireless and Mobile Networks, Quebec, Canada, 2005, pp 16–23
29.
Zurück zum Zitat Roman R, Zhou J, Lopez J (2006) Applying intrusion detection systems to wireless sensor networks. In: 3rd IEEE Consumer Communications and Networking Conference, 2006, pp 640–644 Roman R, Zhou J, Lopez J (2006) Applying intrusion detection systems to wireless sensor networks. In: 3rd IEEE Consumer Communications and Networking Conference, 2006, pp 640–644
30.
Zurück zum Zitat Krontiris I, Dimitriou T (2007) Towards intrusion detection in wireless sensor networks. In: 13th European Wireless Conference, Paris, 2007 Krontiris I, Dimitriou T (2007) Towards intrusion detection in wireless sensor networks. In: 13th European Wireless Conference, Paris, 2007
31.
Zurück zum Zitat Krontiris I, Dimitriou T, Giannetsos T (2008) LIDeA: a distributed lightweight intrusion detection architecture for sensor networks. In: ACM Secure Communication, Istanbol, Turkey Krontiris I, Dimitriou T, Giannetsos T (2008) LIDeA: a distributed lightweight intrusion detection architecture for sensor networks. In: ACM Secure Communication, Istanbol, Turkey
32.
Zurück zum Zitat Marchang N, Datta R (2008) Collaborative techniques for intrusion detection in mobile ad-hoc networks. Ad Hoc Netw VI:508–523CrossRef Marchang N, Datta R (2008) Collaborative techniques for intrusion detection in mobile ad-hoc networks. Ad Hoc Netw VI:508–523CrossRef
33.
Zurück zum Zitat Khan FA, Imran M, Abbas H, Durad MH (2017) A detection and prevention system against collaborative attacks in mobile ad hoc networks. Future Gener Comput Syst (Elsevier) 68:416–427CrossRef Khan FA, Imran M, Abbas H, Durad MH (2017) A detection and prevention system against collaborative attacks in mobile ad hoc networks. Future Gener Comput Syst (Elsevier) 68:416–427CrossRef
34.
Zurück zum Zitat Otoum S, Kantarci B, Hussein TM (2017) Mitigating false negative intruder decisions in WSN-based smart grid monitoring. In: IEEE 13th International Wireless Communications and Mobile Computing Conference, 2017, pp 153–158 Otoum S, Kantarci B, Hussein TM (2017) Mitigating false negative intruder decisions in WSN-based smart grid monitoring. In: IEEE 13th International Wireless Communications and Mobile Computing Conference, 2017, pp 153–158
35.
Zurück zum Zitat Bahl S, Sharma SK (2015) Improving classification accuracy of intrusion detection system using feature subset selection. In: IEEE 5th International Conference on Advanced Computing & Communication Technologies, 2015, pp 431–436 Bahl S, Sharma SK (2015) Improving classification accuracy of intrusion detection system using feature subset selection. In: IEEE 5th International Conference on Advanced Computing & Communication Technologies, 2015, pp 431–436
36.
Zurück zum Zitat Milenkoski A, Jayaram KR, Antunes N, Vieira M, Kounev S (2016) Quantifying the attack detection accuracy of intrusion detection systems in virtualized environments. In: IEEE 27th International Symposium on Software Reliability Engineering, 2016, pp 276–286 Milenkoski A, Jayaram KR, Antunes N, Vieira M, Kounev S (2016) Quantifying the attack detection accuracy of intrusion detection systems in virtualized environments. In: IEEE 27th International Symposium on Software Reliability Engineering, 2016, pp 276–286
37.
Zurück zum Zitat Jabbar MA, Aluvalu R, Sai Reddy S (2017) Cluster based ensemble classification for intrusion detection system. In: ACM 9th International Conference on Machine Learning and Computing, 2017, pp 253–257 Jabbar MA, Aluvalu R, Sai Reddy S (2017) Cluster based ensemble classification for intrusion detection system. In: ACM 9th International Conference on Machine Learning and Computing, 2017, pp 253–257
38.
Zurück zum Zitat Deng H, Li W, Agrawal Dharma P (2002) Routing security in ad hoc networks. IEEE Commun Mag Spec Top Sec Telecommun Netw 40(10):70–75 Deng H, Li W, Agrawal Dharma P (2002) Routing security in ad hoc networks. IEEE Commun Mag Spec Top Sec Telecommun Netw 40(10):70–75
39.
Zurück zum Zitat Al-Shurman M, Yoo SM, Park S (2004) Black hole attack in mobile ad hoc networks. In: 42nd Annual Southeast Regional Conference ACM-SE, 2004, pp 96–97 Al-Shurman M, Yoo SM, Park S (2004) Black hole attack in mobile ad hoc networks. In: 42nd Annual Southeast Regional Conference ACM-SE, 2004, pp 96–97
40.
Zurück zum Zitat Ghugar U, Pradhan J (2016) A study on black hole attack in wireless sensor networks. In: National Conference on Next Generation Computing and Its Applications in Science & Technology, IGIT, Sarang, 2016, pp 1–3 Ghugar U, Pradhan J (2016) A study on black hole attack in wireless sensor networks. In: National Conference on Next Generation Computing and Its Applications in Science & Technology, IGIT, Sarang, 2016, pp 1–3
41.
Zurück zum Zitat Javaid A, Niyaz Q, Sun W, Alam M (2015) A deep learning approach for network intrusion detection system. In: 9th EAI International Conference on Bio-inspired Information and Communications Technologies, New York City, United States, 2015, pp 21–26 Javaid A, Niyaz Q, Sun W, Alam M (2015) A deep learning approach for network intrusion detection system. In: 9th EAI International Conference on Bio-inspired Information and Communications Technologies, New York City, United States, 2015, pp 21–26
42.
Zurück zum Zitat Krontiris I, Giannetsos T, Dimitriou T (2008) Launching a Sinkhole attack in wireless sensor networks; the intruder side. In: International Conference on Wireless and Mobile Computing Networking and Communications, 2008, pp 526–531 Krontiris I, Giannetsos T, Dimitriou T (2008) Launching a Sinkhole attack in wireless sensor networks; the intruder side. In: International Conference on Wireless and Mobile Computing Networking and Communications, 2008, pp 526–531
43.
Zurück zum Zitat Agrwal SL, Khandelwal R, Sharma P, Gupta SK (2016) Analysis of detection algorithm of Sinkhole attack & QoS on AODV for MANET. In: 2nd International Conference on Next Generation Computing Technologies, Dehradun, India, 2016, pp 839–842 Agrwal SL, Khandelwal R, Sharma P, Gupta SK (2016) Analysis of detection algorithm of Sinkhole attack & QoS on AODV for MANET. In: 2nd International Conference on Next Generation Computing Technologies, Dehradun, India, 2016, pp 839–842
Metadaten
Titel
A comprehensive security analysis of LEACH++ clustering protocol for wireless sensor networks
verfasst von
Farrukh Aslam Khan
Ashfaq Hussain Farooqi
Abdelouahid Derhab
Publikationsdatum
19.11.2018
Verlag
Springer US
Erschienen in
The Journal of Supercomputing / Ausgabe 4/2019
Print ISSN: 0920-8542
Elektronische ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-018-2680-3

Weitere Artikel der Ausgabe 4/2019

The Journal of Supercomputing 4/2019 Zur Ausgabe