Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/224599281

A Model for Classifying Threats and Framework Association in Wireless


Sensor Networks

Conference Paper · September 2009


DOI: 10.1109/ICASID.2009.5277037 · Source: IEEE Xplore

CITATIONS READS

3 120

5 authors, including:

Adnan Ashraf Marvie Mussadiq


Mehran University of Engineering and Technology Unifiedcrest
15 PUBLICATIONS   41 CITATIONS    5 PUBLICATIONS   20 CITATIONS   

SEE PROFILE SEE PROFILE

Bhawani Shankar Chowdhry Manzoor Hashmani


Mehran University of Engineering and Technology Universiti Teknologi PETRONAS
245 PUBLICATIONS   746 CITATIONS    98 PUBLICATIONS   284 CITATIONS   

SEE PROFILE SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Improving Student’s Learning Efficiency with Effective Learning Techniques Based on Bloom’s Taxonomy View project

Short Word-Length Signal Processing (SWL) View project

All content following this page was uploaded by Adnan Ashraf on 30 July 2021.

The user has requested enhancement of the downloaded file.


A Model for Classifying Threats and Framework
Association in Wireless Sensor Networks

Adnan Ashraf Abdul Rauf


Research Scholar (CREST Group) Research Scholar (CREST Group)
Mehran UET, Jamshoro, Sindh, Pakistan Mehran UET, Jamshoro, Sindh, Pakistan
adnanlooking@ieee.org

Marvie Mussadiq B.S.Chowdhry Manzoor Hashmani


IT Consultant, XEVIOUS Co. Chairman, Electronics/ Bio-Medical Professor Foreign Faculty
Karachi, Pakistan Engineering, Mehran UET Higher Education Comm. Pakistan

Abstract—Security of wireless sensor network (WSN) remained framework [3] [4]. It provides a real time testing for security
an open research area throughout the current decade. New tools before WSNs adopts them for its security needs. It is
research and developments seems protecting sensor networks observed that work in this direct has not been done before..
from various security threats but at the same time raise many
questions, confusions and conflicts regarding their own viability.
Such viability issues become major hindrances in security II. RELATED WORK
assessment of WSNs against posed security threats. This results Study of VTA (security vulnerability, threat and attack)
in less reliable sensor networks and applications. In our strong aids in the development of countermeasures and security
opinion, there are two root-causes of this problem; 1) a frameworks of WSNs. A review of related work is presented
comprehensive list of security threats is overlooked as here. We observe a relatively little work in the area of
researchers’ work appear limited in classification of security
threats and, 2) security threats are not associated with security
classification of security threats. In the existing work, most of
frameworks. In this paper, we perform classification of security researchers used security terms interchangeably, such as
threats comprehensively whereas, associating these threats to a vulnerability, attacks and threats [5] [6] [7]. Using alternate
security framework; we lead in this direction. We find that terms may create problems and mislead the prospective
specifically to assess the impact of these threats. researchers. It is not logical to use these terms interchangeably
because of wide differences in these terms. In this paper, we
Keywords-component; WSN security; security vulnerability; differentiate these terms for research community for sake of
threats and atacks; security frameworke research in right directions and then we comprehend a list of
security threats for wireless sensor networks.
I. INTRODUCTION From literature, we observe that classification of WSN is
The focus of this paper has been long standing open based on features and mechanism that WSN exhibits today.
problem for developing some approach for achieving For example, distance to base station (single or multi hops),
maximum security in wireless sensor networks. In particular, data dependency (aggregating or non-aggregating),
an approach is aimed to address fundamental security deployment (deterministic or dynamic), control schemes (self
objectives in WSNs while these objectives keep varying or non-self configurable) and application domain (features
among applications of WSNs. Hence, these varying security dependent) [8] [9] [10]. In a WSN, the exposure of features is
objectives do not allow any single security approach to prove application specific therefore a WSN should be selected for an
best-fit in other applications [1] [2]. This is possible that a application by security and reliability, instead of features, that
most CRITICAL security objective of one application may be it offers. We present here a revised classification of security
ranked as MODERATED in other type of application, such as VTA.
SENSOR-ID (as source of information) in a military The most recent and maximum work in classification of
SURVEILLANCE and in a SMART-PARKING. security models of WSNs appeared by S., Kaplantzis [9] in
Ranking of security objectives should be performed 2006. While interchanging terms of security threats,
carefully by first analyzing the security threats to a WSN and vulnerability and attacks in WSN, the researcher has dispersed
then its application. Here, we draft a comprehensive list of many of those in network layers [12]. Contrary to the classic
security threats and then, by classifying the security threats, we work in WSN security we propose an analytical association of
analytically associate those threats with the security assessment security threats with security framework.

Authorized licensed use limited to: MEHRAN UNIV OF ENGINEERING AND TECHNOLOGY. Downloaded on July 30,2021 at 04:22:55 UTC from IEEE Xplore. Restrictions apply.
III. CLASSFICIATION NEEDS OF SECURITY VTAS IN WSN At preliminary stages as the threat and the losses caused by
It is obvious from literature survey (also, we compile a such threats are unknown therefore, threats are usually
comprehensive list from this survey, shown in fig.1) that WSN considered as ‘security threats’. Therefore, we comprehend a
still experiences classical (bit modified though) approaches of list of vulnerability, threats and attacks found in WSN in Fig
traditional wireless or wired networks. Probably, this is due to 1. We observe that differentiating vulnerabilities, security
the likely names of attacks that are present in classical threats and attacks resolves the terminology conflict. In the

Fig. 1. A segregated view of vulnerability, threats and attacks in WSNs

wireless networks. On the contrary, VTA (vulnerability, threat next section we discuss classification and association.
and attack) have quite different impact in the WSN due to its
B. Re-Classification of Security Threats using Security
unique in-network communication processing. Hence,
Assessment Framework
classification of VTA and development of security
frameworks should be revisited to counter such security VTA. Usually, security VTAs are classified as physical-threat,
In this paper, our approach for classification and accidental-error, natural, man-made, unauthorized access,
association of security VTA is proposed to remodel malicious-user, etc. It is notable that if traditional ciphering,
application-specific WSNs that may fulfill their missions in topology, routing and security schemes are not appropriate for
timely manner, in hostile environments WSN then how can a traditional way of security classification
be appropriate for WSN? We take this opportunity first to
A. Security VTAs classify the security threats using security assessment
framework [3] [4] in table 1.
A profound study leads to differentiate among security
related terms that are being interchangeably used among Table 1. Classification and Association of Security VTAs with
Discrete Security Assessment Framework
researchers in published literature (discussed in section II). In
order to eliminate these ambiguities from the future literature N
Vulnerability: Average energy exhaustion (network), low
we compile a list of vulnerabilities, threats and attacks in the computational capacity, limited network storage time, self-
E
light of standard definitions. organization, fault-tolerance level, distributed storage, task
T
The vulnerability is a weak-point in the system or a details, simple ciphering, and node deployment
W
network that may be exploited, whereas a threat is considered O Threat: Topology change, change of frequency, large
messaging overhead, non-scalability, recursive routing,
as an external or internal influence that may exploit the R
K system failures
vulnerability (weak-point). An attack is the occurrence of a Attack: Complete DoS or DDoS
threat, causes an unwanted event to be occurred in a system Vulnerability: Radio link, Signal transmission range
such as data steal, denial of service, sniffing, spoofing, etc (916MHz, 2.4GHz), Broadcasting, Topology-less
[11] [13][ 14]. An attack can also be termed as an exposure in L infrastructure, Ad hoc Topology information
a system. I Threat: Non-Reachable, Link-failure, High-density of
Thinking WSN, for example, the wireless medium is prone N nodes, Indefinite jamming of signals, Data tampering, High
to exposure or attack and it’s a known vulnerability. This K noise, unmanaged mobility, Higher delays (link-setup)
vulnerability may be (or may not be) exploited depending Attack: Collision or checksum mismatch, Unfairness,
upon the nature of WSN environment. Any object blocking Spoofing, Sybil, Wormholes, Hello-flood, ACK-spoofing
this communication medium from responding shall be Vulnerability: Energy exhaustion @ Sink, Task details
S
considered as a threat under definition of external influence.
I Threat: Unauthorized access
Similarly, if any inherent feature (or circuitry) causes N
unwanted delay of communication signals it’ll also be a K Attack: Sinkhole, de-synchronization
threat.

Authorized licensed use limited to: MEHRAN UNIV OF ENGINEERING AND TECHNOLOGY. Downloaded on July 30,2021 at 04:22:55 UTC from IEEE Xplore. Restrictions apply.
Vulnerability: Energy exhaustion @ node, Resilience to ACKNOWLEDGMENT
N physical security, Limited memory, short-storage time
O We are thankful to the Vice Chancellor (Prof. Dr. A.Q.K.
Threat: Node failure, Recursive localization, Indefinite
D Rajput) and Project Director In-Chief (Engr. G.S. Kandhir),
flooding
E Mehran UET and for facilitating us in all means.
Attacks: Selective Forwarding
O Vulnerability: --- REFERENCES
T Threat: Natural hazards, Environmental interference,
H [1] Tanveer Zia and Albert Zomaya.: “A security Framework for Wireless
Human Interaction (to damage network), Catastrophic Sensor Networks”, SAS 2006 – IEEE Sensors Application Symposium,
E (man-made) Houston, Texas, USA, 7-9 February 2006
R Attack: Nil [2] K., C., Y., Zou.: “Uncertainty-aware and Coverage-oriented Deployment
for Sensor Networks”, Journal of Parallel and Distributed Computing, 64
(7): pp. 788-798, July 2004
[3] Adnan Ashraf, Manzoor Hashmani, Marvie Mussadiq, B.S. Chowdhry,
IV. CRITICAL ANALYSIS OF SECURITY VTAS et. al.: “A Pretty Safe Strategy for Analyzing Discrete Security
Assessment Framework in Wireless Sensor Networks”, Communications
This paper performs a critical analysis of available literature in Computer and Information Science, ISSN: 1865-0929 (Print) 1865-
on security classification. Criticizing the trend of 0937 (Online), Volume 20, Book of Wireless Networks, Information
interchanging terms for security VTAs, it elaborates the Processing and Systems, Springer-Verlag Berlin Heidelberg 2008,
ISBN: 978-3-540-89852-8 (Print) 978-3-540-89853-5 (Online), Friday,
possible losses of this trend to research. pp. 445-448, November 14, 2008
A comprehensive list of security VTAs is helpful to model [4] Adnan Ashraf,; Manzoor Hashmani; Marvie Mussadiq; B.S. Chowdhry.:
new security protocols, frameworks, as well as to assess the “Design and Analysis of the Security Assessment Framework for
existing security solutions. It allows better understanding with Achieving Discrete Security Values in Wireless Sensor Networks”,
Electrical and Computer Engineering, 2008, CCECE 2008. Canadian
security issues in WSN. Customization of VTA list can also be Conference on Electrical and Computer Engineering, pp. 000855 –
done as per demand of an application. Similarly, any low 000860 4-7 May 2008
priority constraint, threat or attack can be eliminated from the [5] M., Ilyas and I., Mahgoub.: “Handbook of Sensor Networks: Compact
VTA list for a specific type of WSN. Wireless and Wired Sensing Systems”- edited by Mohammad Ilyas and
Administrators of WSN will then, have a simplified Imad Mahgoub, ISBN 0-8493-1968-4, TK7872.D48.H36, 2004
management of network. Renewing policy is considered as [6] R., Muraleedharan and L., A., Osadciw.: “Jamming Attack Detection
and Countermeasures In Wireless Sensor Network Using Ant System”,
energy hungry process in WSN. By classifying VTA, any Department of Electrical Engineering and Computer Science, Syracuse
layer of network under attack can be known and then University, Syracuse, NY 13244-1240
revitalized using selective forwarding for policy renewing or [7] Prof. RG Crespo, Slides on “Mobile Systems Security, WSN Security
countermeasures. Distribution of security VTAs is done by Threats”, Copyright Departmento de Engenharia, Electrotecnica, e de
assessing impact of each entry in the list and, taking into Computadores., Fall 2006
account, the infected area that could be involved in sharing [8] S., G., Akojwar and R., M. Patrikar.: “Classification Techniques with
Cooperative Routing for Industrial Wireless Sensor Networks”,
losses in a WSN. Furthermore, confidentiality as task details Advances in Computer and Information Sciences and Engineering,
(at node) is assumed as network asset. This ensures an Publisher Springer Netherlands, DOI 10.1007/978-1-4020-8741-7, ISBN
uncompromised security strategy used throughout our work. 978-1-4020-8740-0 (Print) 978-1-4020-8741-7 (Online), pp. 503-508,
2008
In short, we can be able to distinguish the presence of any
VTA component in security layers of WSN using the [9] S., Kaplantzis and N. Mani.: “A Study on Classification Techniques for
Network Intrusion Detection”, published in proceedings of the IASTED
assessment framework. From an application s’ perspective, any International Conference on Networks and Communication Systems,
vulnerability, threat or attack can be subjugated if any network year of publication 2006
layer or segment of the framework is protected by that VTA [10] Y., KIM, S., JEONG and D., KIM.: A GMM-Based Target
component. This is the real benefit of associating security VTA “Classification Scheme for a Node in Wireless Sensor Networks”,
to a security framework. IEICE Transactions on Communications, E91-B(11):3544-3551;
doi:10.1093/ietcom/e91-b.11.3544, The Institute of Electronics,
Information and Communication Engineers 2008
V. CONCLUSION AND FUTURE WORK [11] D., S., Kim, K., M., Shazzad, J., S., Park.: “A Framework of
Survivability Model for Wireless Sensor Network”, Proceedings of the
This paper differentiates among concepts of security First International Conference on Availability, Reliability and Security,
vulnerability, threat and attack by redefining them from WSN ISBN:0-7695-2567-9, Pages: 515 – 522, 2006
s’ perspective. On the basis of this differentiation we are able [12] S., Kaplantzis and N. Mani, “Security Models of Wireless Sensor
to comprehend a list of security VTAs. It helps to eliminate Networks”, final review report for PhD, (2007)
ambiguities regarding security literature on VTAs. Then, by http://users.monash.edu.au/~skap3/
examining each of VTAs we associate it with a security [13] S., Barnum and M., Gegick.: “Defense in Depth”, published by Cigital,
Inc, on 2005-09-13, Copyright 2005
assessment framework for analysis. Impact of these security
“The Living Dictionary”, Series of Longman Dictionary of
VTAs on a sensor network depends on various factors and is Contemporary English, Copyright Pearsons Education, Published in
an open research issue. Also, we plan to review this approach 2008.
with other security frameworks, in future to achieve good
assessment in WSN applications.

Authorized licensed use limited to: MEHRAN UNIV OF ENGINEERING AND TECHNOLOGY. Downloaded on July 30,2021 at 04:22:55 UTC from IEEE Xplore. Restrictions apply.
View publication stats

You might also like