International Journal of Computer Network and Information Security(IJCNIS)

ISSN: 2074-9090 (Print), ISSN: 2074-9104 (Online)

Published By: MECS Press

IJCNIS Vol.4, No.12, Nov. 2012

Swarm Flooding Attack against Directed Diffusion in Wireless Sensor Networks

Full Text (PDF, 936KB), PP.18-30

Views:17   Downloads:2


Ibrahim S. I. Abuhaiba,Huda B. Hubboub

Index Terms

Wireless sensor network, denial of service attack, directed diffusion, swarming, flooding


The objective of this paper is to study the vulnerabilities of sensor networks, design, and implement new approaches for routing attack. As one of the cornerstones of network infrastructure, routing systems are facing more threats than ever; they are vulnerable by nature and challenging to protect. 
We present a new attack, Swarm Flooding Attack, against Directed Diffusion based WSNs, which targets the consumption of sensors computational resources, such as bandwidth, disk space, or processor time. Two variants of swarm attack have been introduced: Bee and Ant. Both approaches are inspired from the natural swarming difference between bees and ants. In all cases, the strategy used to mount an attack is the same. An attack consists of a set of malicious user queries represented by interests that are inserted into the network. However, the two forms of attack vary in the synchronization aspects among attackers. These types of attacks are hard to defend against as illustrated. For each of the proposed attack models, we present analysis, simulation, and experimental measurements. We show that the system achieves maximal damage on system performance represented by many metrics.

Cite This Paper

Ibrahim S. I. Abuhaiba,Huda B. Hubboub,"Swarm Flooding Attack against Directed Diffusion in Wireless Sensor Networks", IJCNIS, vol.4, no.12, pp.18-30, 2012.


[1]A. D. Wood, J. A. Stankovic, "Denial of service in sensor networks," IEEE Computer, Vol. 35, pp. 54-62, 2002.

[2]C. Intanagonwiwat, R. Govindan, D. Estrin, "Directed diffusion: a scalable and robust communication paradigm for sensor networks", MobiCom 2000, pp. 56-67, 2000.

[3]P. Ning, K. Sun, "How to misuse AODV: A case study of insider attacks against mobile ad-hoc routing protocols," Ad Hoc Networks, Vol. 3, pp. 795-819, 2005.

[4]V. L. Chee, W. C. Yau, "Security analysis of TORA routing protocol," Lecture Notes in Computer Science, Vol. 4705, pp. 975-986, 2007.

[5]C. Karlof, D. Wagner, "Secure routing in wireless sensor networks: Attacks and countermeasures," Ad Hoc Networks, Vol. 1, pp. 293-315, 2003.

[6]V. R. Kumar, J. Thomas, A. Abraham, "Secure directed diffusion routing protocol for sensor networks using the LEAP protocol," NATO Security through Science Series - D: Information and Communication Security, Vol.6, pp. 183-203, 2006.

[7]A. Kalambur, "Secure routing in wireless sensor networks: A study on directed diffusion," available at, 2004.

[8]S. Moon, T. Cho, "Intrusion detection scheme against sinkhole attacks in directed diffusion based sensor networks," International Journal of Computer Science and Network Security, Vol. 9, pp. 118-122, 2009.

[9]J. Kim, P. Bentley, C. Wallenta, M. Ahmed, S. Hailes, "Danger is ubiquitous: Detecting malicious activities in sensor networks using the dendritic cell algorithm," ICARIS 2006, pp. 390–403, 2006.

[10]P. Yi, Z. Dai, S. Zhang, Y. Zhong, "A new routing attack in mobile ad hoc networks," International Journal of Information Technology, Vol. 11, pp. 83-94, 2005.

[11]M. J. Warren, M. Dougall, K. Pascoe, "Swarming attacks and agents," available at, 2002.

[12]C. Hartung, J. Balasalle, R. Han, "Node compromise in sensor networks: The need for secure systems," University of Colorado Technical Report CU-CS-990-05, 2005.

[13]O. Younis, S. Fahmy, "Distributed clustering in ad hoc sensor networks: A hybrid, energy-efficient approach," INFOCOM, pp. 629-640, 2004.

[14]W. B. Heinzelman, "Application-specific protocol architectures for wireless networks," PhD thesis, Massachusetts Institute of Technology, USA, 2000.

[15]A. Cerpa, D. Estrin, "Ascent: Adaptive self-configuring sensor networks topologies," IEEE Transactions on Mobile Computing, Vol. 3, pp. 272-285, 2004.

[16]L. Eschenauer, V. D. Gligor, "A key-management scheme for distributed sensor networks," CCS 2002, pp. 41-47, 2002.

[17]M. G. Hinchey, R. Sterritt, C. Rouff, "Swarms and Swarm Intelligence," IEEE Computer Society, Vol. 40, pp. 111-113, 2007.

[18]K. Fall, K. Varadhan, "NS notes and documentation, the VINT project," available at, 2011.

[19]P. Pancardo, J. C. Dueñas, "A proposal for system architecture to integrate scarce-resources wireless sensor neworks into ubiquitous environments," available at, 2006.

[20]A. Pathan, H. Lee, C. Hong, "Security in wireless sensor networks: Issues and challenges", ICACT 2006, Vol. 2, pp. 1048-1054, 2006.