Overlapped Detection Via Approximate Entropy Estimation Against Flooding Attack in Mobile Sensor Networks

  • Mihui Kim
  • Kijoon Chae
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3992)


To achieve security in sensor networks, it is important to be able to defend against flooding attack recently considered as an extremely threatening attack. In this paper, we propose a flooding attack detection method as the first defense step, through approximate entropy estimation reflecting resource constraints of sensors. Each detector performs both basic estimation for its own region and overlapped estimation for its own and neighbor regions, against the mobility of attack node. Also, in order to enhance the accuracy of detection even in the various deployments of attack agents, we deploy hierarchically detectors according to network topology. This detector by entropy estimation is simplified by only multiplication calculation instead of logarithm, in addition to providing higher estimation precision of entropy compared to the conventional entropy estimation. Our simulation results indicate that this hierarchical defense is a feasible method, being especially promising for accurate decision through overlapped detection even in frequent handoffs of mobile attack agents.


Sensor Network Sensor Node Wireless Sensor Network Detection Node Approximate Entropy 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Wood, A., Stankovic, J.A.: Denial of Service in Sensor Networks. IEEE Computer 35(10), 54–62 (2002)Google Scholar
  2. 2.
    Sancak, S., Cayirci, E., Coskun, V., Levi, A.: Sensor wars: Detecting and defending against spam attacks in wireless sensor networks. In: ICC 2004 - IEEE International Conference on Communications, June 2004, vol. 27(1), pp. 3668–3672 (2004)Google Scholar
  3. 3.
    Wood, A.D., Stankovic, J.A., Son, S.H.: Jammed-Area Mapping Service for Sensor Networks. In: 24th IEEE International Real-Time Systems Symposium (December 2003)Google Scholar
  4. 4.
    Ye, F., Luo, H., Lu, S., Zhang, L.: Statistical En-route Filtering of Injected False Data. In: IEEE Infocom 2004 (March 2004)Google Scholar
  5. 5.
    Schmidt, S., Krahn, H., Fischer, S., Watjen, D.: A Security Architecture for Mobile Wireless Sensor Networks. In: Castelluccia, C., Hartenstein, H., Paar, C., Westhoff, D. (eds.) ESAS 2004. LNCS, vol. 3313, pp. 166–177. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  6. 6.
    Karl, H., Wilig, A.: Protocols and Architectures for Wireless Sensor Networks, pp. 62–63. John Wiley & Sons, Ltd., Chichester (2005)CrossRefGoogle Scholar
  7. 7.
    Feinstein, L., et al.: Statistical Approaches to DDoS AttackDetection and Response. In: Proc. of the DARPA Information Survivability Conference and Exposition (2003)Google Scholar
  8. 8.
    Kim, M., Chae, K.: A Hierarchical Key Management based on Multiple Regression in Mobile Sensor Networks. Submitted to a ConferenceGoogle Scholar
  9. 9.
    Yokota, Y.: An Approximate Method for Bayesian Entropy Estimation for a Discrete Random Variable. In: Proc. of the 26th IEEE EMBS (September 2004)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Mihui Kim
    • 1
  • Kijoon Chae
    • 1
  1. 1.Department of Computer Science and EngineeringEwha Womans UniversityKorea

Personalised recommendations