Resiliency of Wireless Sensor Networks: Definitions and Analyses
|
|
- Erin Hubbard
- 8 years ago
- Views:
Transcription
1 Resiliency of Wireless Sensor Networks: Definitions and Analyses Orange Labs & CITI Labs INSA-Lyon O.Erdene-Ochir, M. Minier, F. Valois, A. Kountouris February 10, 2010, presentation to CITI seminar
2 Thesis context Research area: Sensor Networking (routing in particular) Focus: Security beyond cryptography (protocol resiliency) Our goal: Analyze and create inherently resilient protocols against internal (insider) attacks CRE between Orange Labs (TECH/MATIS/CITY) and CITI Laboratory of INSA-Lyon (ANR VERSO ARESA2) Advisors (academic): M. Minier, F. Valois Advisor (Orange Labs): A. Kountouris Start date: 1/10/2009 2/27
3 Contents Context Motivation Related works Simulation and analysis Worldsens, a small sensor node developed in the CITI lab Conclusion and future directions 3/27
4 Context: Wireless Sensor Networks Characteristics Wireless Sensor Networks Applications of WSNs: Radio communication No infrastructure Decentralized architecture Open network architecture Multi-hop routing Why sensor networks? Rapid deployment Cheap Self organized Fault-tolerant scientific data collection military applications environmental monitoring (temperature, pollution, pressure ) home, building, industrial automation (electricity, water metering ) Challenges Scalability Adaptability Low energy, long lifetime Security 4/27
5 Motivations (1/2) Why not use traditional cryptography-based security? limited resources (memory, energy, computation power ) an open and hostile environment (physical attacks) not always a solution against multiple internal attacks stemming from node compromise Our goal: Analyze and create inherently resilient protocols against internal (insider) attacks Our definition: Resiliency is the ability of a network to continue to operate in presence of k compromised nodes, i.e. the capacity of a network to endure and overcome internal (insider) attacks. 5/27
6 Motivations (2/2) Definition of Survivability [ELLM1999] : Survivability in information systems is defined as the ability of the network computing system to provide essential services in the presence of attacks and/or failures, and recover full service in a timely manner. Definition of Robustness [SKHJ2002] : Robustness is defined as the requirement to accommodate hardware and software failures, asymmetric and unidirectional links, or limited range of wireless communication. 6/27
7 Related works: Attacks and Defenses (1/3) [KW2003], [WS2002] Hardware attacks (node compromise) [BBD2006] Physical layer attacks Jamming [WSS2003] Link layer attacks Collision Exhaustion Link layer jamming [LPHDHH2009] Routing layer attacks Sybil [NSSP2004] Node replication [PPG2005] Selective forwarding Blackhole Sinkhole Wormhole [HE2004], [HPJ2003] 7/27
8 Related works: Attacks and Defenses (2/3) Routing layer attacks Sybil [NSSP2004] Node replication [PPG2005] Selective forwarding 8/27
9 Related works: Attacks and Defenses (3/3) Routing layer attacks Blackhole Sinkhole Wormhole [HE2004], [HPJ2003] 9/27
10 Related works: Routing layer security (1/5) Goal: find a route between source and destination Routing layer responsibility: Naming and addressing Neighborhood discovery Multi-hop routing Specific secure protocols: SRP [PH2002] ARIADNE [HPJ2005] ARAN [SDLSB2002] SPINS (SNEP+μTESLA) [PSW2001] Use cryptography 10/27
11 Related works: WSN routing protocols (2/5) Multi-hop routing different ways to find the route message traverse many hops intermediate nodes can be compromised Study of existing routing protocols enumerate the various routing mechanisms classification is required for efficient choice analysis of some routing protocols under multiple attacks determine good properties for resiliency 11/27
12 Related works: Classification (3/5) 12/27
13 Related works: Choice of routing protocols (4/5) Dynamic source routing [JM1996] Flooding based Route discovery Greedy forwarding [KK2000] Geographical Location information required Gradient based routing [MS2001] Flooding based Gradient setup Random walk routing [SB2002] Probabilistic routing Random choice of neighbor 13/27
14 Related works: Implemented attacks (5/5) DATA packet oriented attacks Selective forwarding Sinkhole CONTROL packet oriented attacks Blackhole HELLO packet oriented attacks Sybil 14/27
15 Simulations and analysis (1/8) Simulator: WSNet [HCG2008] Assumptions: Sensors can be compromised A unique sink at the center of the network Sensor nodes are static Ideal MAC/PHY: no interferences, no collisions, (consider only impact of attacks) 95% confidence interval Parameter Value Number of nodes 300 Area size Transmission range Topology tested Traffic generation 100X100m 20m Number of runs 100 Simulation time Uniformly and randomly distributed Poisson distribution with λ = 1 packet per sec, per node 100 sec 15/27
16 Simulations and analysis (2/8) We tested three different evaluation metrics: Average delivery ratio: success of routing function (reliability ) percentage of successfully received packets Average degree of nodes: detect neighborhood abnormalities average number of neighbors Average path length: number of retransmission (hops) 16/27
17 Simulations and analysis (3/8) Case 1: 10% compromised nodes of 300 are uniformly and randomly distributed across the whole network Case 2: 10% compromised nodes of 300 are uniformly and randomly distributed around the sink 17/27
18 Simulations and analysis (4/8) Scenario 1: Uniformly distributed across the whole network (case 1) Selective forwarding (drop all DATA packets) Scenario 2: Uniformly distributed around the sink (case 2) Sinkhole attack (drop all DATA packets) Average delivery ration decreases when percentage of compromised node increases RWR is worst in successful packet delivery Impact of attacks is more important than scenario 1 Malicious nodes receive for retransmission more packets than other nodes 18/27
19 Simulations and analysis (5/8) Scenario 1: Uniformly distributed across the whole network (case 1) Selective forwarding (drop all DATA packets) Scenario 2: Uniformly distributed around the sink (case 2) Sinkhole attack (drop all DATA packets) When path length is high, the number of intermediate nodes is high. The probability to meet malicious node increases. Delivery ratio is inversely proportional to the path length Malicious nodes attract most of the traffic creating a ``donut effect'' around the sink 19/27
20 Simulations and analysis (6/8) Scenario 1: Uniformly distributed across the whole network (case 1) Selective forwarding (drop all DATA packets) Double sent of each DATA packet RWR has better average delivery ratio with double sent No changes for DSR,GBR and GF Route should be diversified 20/27
21 Simulations and analysis (7/8) Scenario 3 : Uniformly distributed across the whole network (case 1) Sybil attack (false HELLO packets, multiple identities) Average degree increases, when the number of compromised nodes increases 10% of compromised node create 75 false identities 21/27
22 Simulations and analysis (8/8) Scenario 4 : Uniformly distributed across the whole network (case 1) Blackhole attack (false CONTROL packets, attract the DATA traffic) Impact of attacks is much more important than in previous attacks GBR: over 2/3 of the traffic are lost with only 10% of compromised nodes DSR: a single compromised node can impact 197 legitimate nodes over /27
23 Conclusion and future directions Preliminary study for WSNs security of the routing layer. The more the protocol is statefull, the more it will be vulnerable to attacks targeting this information. Requirements for Resiliency : Graph representing WSNs should be connected (reliability) Degree of the nodes must be high (increases the number of candidates for next hop) Route must be diversified in order to exploit the structural redundancy (randomness on their behavior) Redundant sent of packets In the future, Extending our simulations; taking into account energy consumption (tradeoff energy consuming-resiliency) Quantify a measure of resiliency: which metric? Improve the resiliency of existing protocols or propose a new protocol. Using some entropy concept as a means to detect local attacks. 23/27
24 thank you Orange, the Orange mark and any other Orange product or service names referred to in this material are trade marks of Orange Personal Communications Services Limited. Orange Personal Communications Services Limited. France Telecom Group restricted.
25 References [KW2003] [WS2002] [BBD2006] [WSS2003] [HE2004] [HPJ2003] [LPHDHH2009] [NSSP2004] C. Karlof and D. Wagner, Secure routing in wireless sensor networks: attacks and countermeasures, Ad Hoc Networks, vol. 1, no. 2-3, pp , August Anthony D. Wood and John A. Stankovic. Denial of service in sensor networks. Computer, 35(10):54_62, Alexander Becher, Zinaida Benenson, and Maximillian Dornseif. Tampering with motes: Real-world attacks on wireless sensor networks. In Sicherheit, pages 26_29, Anthony D. Wood, John A. Stankovic, and Sang H. Son. Jam: A jammed-area mapping service for sensor networks. In 24th IEEE Real-Time Systems Symposium, pages 286_297, L. Hu and D. Evans, Using directional antennas to prevent wormhole attacks, in Network and Distributed System Security Symposium. San Diego, USA: The Internet Society, February 2004, pp Y.-C. Hu, A. Perrig, and D. B. Johnson, Packet leashes: A defense against wormhole attacks in wireless networks, in 22nd Annual Joint Conference of the IEEE Computer and Communications Societies, San Fransisco, USA, April 2003, pp Yee Wei Law, Marimuthu Palaniswami, Lodewijk Van Hoesel, Jeroen Doumen, Pieter Hartel, and Paul Havinga. Energy-efficient link-layer jamming attacks against wireless sensor network mac protocols. ACM Trans. Sen. Netw., 5(1):1_38, J. Newsome, E. Shi, D. Song, and A. Perrig, The sybil attack in sensor 25/27 networks: analysis & defenses, in Information Processing in Sensor
26 References [PPG2005] [JM1996] [MS2001] [KK2000] [SB2002] [HCG2008] B. Parno, A. Perrig, and V. Gligor, Distributed detection of node replication attacks in sensor networks, in IEEE Symposium on Security and Privacy. Oakland, USA: IEEE Computer Society, May 2005, pp D. B. Johnson and D. A. Maltz, Dynamic source routing in ad hoc wireless networks, in Mobile Computing, S. US, Ed., vol. 353, 1996, pp C. S. Mani and M. B. Srivastava, Energy efficient routing in wireless sensor networks, in Military Communications Conference roceedings on Communications for Network-Centric Operations: Creating the Information Force, vol. 1, McLean, USA, October 2001, pp B. Karp and H. T. Kung, Gpsr: greedy perimeter stateless routing for wireless networks, in Proceedings of the 6th annual international conference on Mobile computing and networking, Boston, USA, August 2000, pp S. D. Servetto and G. Barrenechea, Constrained random walks on random graphs: routing algorithms for large scale wireless sensor networks, in Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications, Atlanta, USA, September 2002, pp E. Hamida, G. Chelius, and J.-M. Gorce, Scalable versus accurate physical layer modeling in wireless network simulations, in 22 nd Workshop on Principles of Advanced and Distributed Simulation, Roma, Italy, June 2008, pp /27
27 References [PH2002] [HPJ2005] P. Papadimitratos and Z. Haas, Secure rotuing for mobile ad hoc networks, in Communication Networks and Distributed Systems Modeling and Simulation Conference, San Antonio, Texas, 2002, pp Y. C. Hu, A. Perrig, and D. B. Johnson, Ariadne: a secure on-demand routing protocol for ad hoc networks, Wireless Networks, vol. 11, no. 1-2, pp , January [SDLSB2002] K. Sanzgiri, B.Dahill, B. N. Levine, C. Shields, and E. M. Belding-Royer, A secure routing protocol for ad hoc networks, in IEEE International Conference on Network Protocols. Paris, France: IEEE Computer Society, November 2002, pp [PSW2001] [ELLM1999] [SKHJ2002] A. Perrig, R. Szewczyk, V. Wen, D. E. Culler, and J. D. Tygar, Spins: security protocols for sensor netowrks, in Seventh Annual International Conference on Mobile Computing and Networks, Rome, Italy, July 2001, pp R. J. Ellison, R. C. Linger, T. Longstaff, and N. R. Mead, Survivable network system analysis: A case study, IEEE Software, vol. 16, no. 4, pp , July J. P. G. Sterbenz, R. Krishnan, R. Hain, A. Jackson, D. Levin, R. Ramanathan, and J. Zao, Survivable mobile wireless networks: issues, challenges, and research directions, in Workshop on Wireless Security, W. Maughan and N. Vaidya, Eds. Atlanta, USA: ACM, September 2002, pp /27
A Security Architecture for. Wireless Sensor Networks Environmental
Contemporary Engineering Sciences, Vol. 7, 2014, no. 15, 737-742 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4683 A Security Architecture for Wireless Sensor Networks Environmental
More informationWireless Sensor Networks Chapter 14: Security in WSNs
Wireless Sensor Networks Chapter 14: Security in WSNs António Grilo Courtesy: see reading list Goals of this chapter To give an understanding of the security vulnerabilities of Wireless Sensor Networks
More informationSecure Routing in Wireless Sensor Networks
Secure Routing in Wireless Sensor Networks Introduction to Wireless Sensor Networks Ida Siahaan / Leonardo Fernandes DIT Ida Siahaan / Leonardo Fernandes (DIT) Secure Routing in Wireless Sensor Networks
More informationWireless Sensor Network Security. Seth A. Hellbusch CMPE 257
Wireless Sensor Network Security Seth A. Hellbusch CMPE 257 Wireless Sensor Networks (WSN) 2 The main characteristics of a WSN include: Power consumption constrains for nodes using batteries or energy
More informationAnomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches
Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches Md. Safiqul Islam *1, Syed AshiqurRahman *2 Department of Computer Science and Engineering Daffodil
More informationDenial of Service in Sensor Networks
Denial of Service in Sensor Networks Authors : From: Anthony D. Wood John A. Stankovic University of Virginia Presented by: Luba Sakharuk Agenda for the DOS in Sensor Networks Abstract Theory and Application
More informationSecurity for Ad Hoc Networks. Hang Zhao
Security for Ad Hoc Networks Hang Zhao 1 Ad Hoc Networks Ad hoc -- a Latin phrase which means "for this [purpose]". An autonomous system of mobile hosts connected by wireless links, often called Mobile
More informationStudy of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,
More informationEvaluation of Security Mechanisms for Information Dissemination. in Wireless Sensor Networks
2013 First International Conference on Artificial Intelligence, Modelling & Simulation Evaluation of Security Mechanisms for Information Dissemination in Wireless Sensor Networks Mohamad Nazim Jambli,
More informationAN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION K.Anusha 1, K.Sudha 2 1 M.Tech Student, Dept of CSE, Aurora's Technological
More informationMobile Security Wireless Mesh Network Security. Sascha Alexander Jopen
Mobile Security Wireless Mesh Network Security Sascha Alexander Jopen Overview Introduction Wireless Ad-hoc Networks Wireless Mesh Networks Security in Wireless Networks Attacks on Wireless Mesh Networks
More informationIntrusion Detection of Sinkhole Attacks in Wireless Sensor Networks
Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks Ioannis Krontiris, Tassos Dimitriou, Thanassis Giannetsos, and Marios Mpasoukos Athens Information Technology, P.O.Box 68, 19.5 km Markopoulo
More informationWireless Sensor Network Attacks:An Overview and Critical Analysis
Wireless Sensor Network Attacks:An Overview and Critical Analysis Arash Tayebi Department of Electrical and Computer Engineering University of Auckland Auckland, New Zealand atay530@aucklanduni.ac.nz Setevan
More informationProtecting Privacy Secure Mechanism for Data Reporting In Wireless Sensor Networks
ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference
More informationPERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS Reza Azizi Engineering Department, Bojnourd Branch, Islamic Azad University, Bojnourd, Iran reza.azizi@bojnourdiau.ac.ir
More informationIntroduction to Wireless Sensor Network Security
Smartening the Environment using Wireless Sensor Networks in a Developing Country Introduction to Wireless Sensor Network Security Presented By Al-Sakib Khan Pathan Department of Computer Science and Engineering
More informationConsecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks
21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks Jeongcheol Lee, Euisin
More informationADVANCED NETWORK SECURITY SYSTEM FOR SETUP STAGE OF LEACH PROTOCOL
ADVANCED NETWORK SECURITY SYSTEM FOR SETUP STAGE OF LEACH PROTOCOL 1 Rajesh C. Ramannavar, 2 Suma K.V 1 Student, 2 Assistant Professor M S Ramaiah Institute of Technology,Bengaluru,India Email: 1 raaj.rc586@gmail.com,
More informationCERIAS Tech Report 2007-04
CERIAS Tech Report 2007-04 SECURITY IN WIRELESS SENSOR NETWORKS - A LAYER BASED CLASSIFICATION by Mohit Saxena Center for Education and Research in Information Assurance and Security, Purdue University,
More informationA NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS
A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS Sumanta Saha, Md. Safiqul Islam, Md. Sakhawat Hossen School of Information and Communication Technology The Royal Institute of Technology (KTH) Stockholm,
More informationAriadne A Secure On-Demand Routing Protocol for Ad-Hoc Networks
Ariadne A Secure On-Demand Routing Protocol for Ad-Hoc Networks Authors: Yih-Chun Hu, Adrian Perrig, David B Johnson Presenter: Sameer Korrapati Date: 4/21/2003 Overview of presentation Introduction :
More informationWireless sensor network
SECURITY IN WIRELESS SENSOR NETWORKS By ADRIAN PERRIG, JOHN STANKOVIC, and DAVID WAGNER They are susceptible to a variety of attacks, including node capture, physical tampering, and denial of service,
More informationWireless Sensor Network: Challenges, Issues and Research
ISBN 978-93-84468-20-0 Proceedings of 2015 International Conference on Future Computational Technologies (ICFCT'2015) Singapore, March 29-30, 2015, pp. 224-228 Wireless Sensor Network: Challenges, Issues
More informationA Novel Multi Ring Forwarding Protocol for Avoiding the Void Nodes for Balanced Energy Consumption
International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-4 E-ISSN: 2347-2693 A Novel Multi Ring Forwarding Protocol for Avoiding the Void Nodes for Balanced Energy
More informationSecurity Analysis of Routing Protocols in Wireless Sensor Networks
www.ijcsi.org 465 Security Analysis of Routing Protocols in Wireless Sensor Networks Mohammad Sadeghi 1, Farshad Khosravi 2, Kayvan Atefi 3, Mehdi Barati 4 1 Faculty of Computer and Mathematical Sciences,
More informationSecurity and Privacy Issues in Wireless Ad Hoc, Mesh, and Sensor Networks
Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 4 (2014), pp. 381-388 Research India Publications http://www.ripublication.com/aeee.htm Security and Privacy Issues in Wireless
More informationPreventing Resource Exhaustion Attacks in Ad Hoc Networks
Preventing Resource Exhaustion Attacks in Ad Hoc Networks Masao Tanabe and Masaki Aida NTT Information Sharing Platform Laboratories, NTT Corporation, 3-9-11, Midori-cho, Musashino-shi, Tokyo 180-8585
More informationLIST OF FIGURES. Figure No. Caption Page No.
LIST OF FIGURES Figure No. Caption Page No. Figure 1.1 A Cellular Network.. 2 Figure 1.2 A Mobile Ad hoc Network... 2 Figure 1.3 Classifications of Threats. 10 Figure 1.4 Classification of Different QoS
More informationINTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AN OVERVIEW OF MOBILE ADHOC NETWORK: INTRUSION DETECTION, TYPES OF ATTACKS AND
More informationWIRELESS SENSOR NETWORKS ARCHITECTURE, SECURITY REQUIREMENTS, SECURITY THREATS AND ITS COUNTERMEASURES
WIRELESS SENSOR NETWORKS ARCHITECTURE, SECURITY REQUIREMENTS, SECURITY THREATS AND ITS COUNTERMEASURES Ranjit Panigrahi 1, Kalpana Sharma 2, M.K. Ghose 1 Department of Computer Sc. & Engineering, SMIT,
More informationCyber-Physical Security for Wireless Sensor Networks
Cyber-Physical Security for Wireless Sensor Networks Position Paper Gordon W. Skelton, PhD Center for Defense Integrated Data (CDID) Jackson State University 1230 Raymond Road Box 1200 Jackson, MS 39204
More informationAnalysis of Typical Secure Routing Protocols in WSN
, pp.41-50 http://dx.doi.org/10.14257/ijsia.2014.8.6.04 Analysis of Typical Secure Routing Protocols in WSN Jingsha He 1,2,a, Bo Zhou 1,b and Ruohong Liu 2,c 1 School of Software Engineering, Beijing University
More informationSecurity Scheme for Distributed DoS in Mobile Ad Hoc Networks
Security Scheme for Distributed DoS in Mobile Ad Hoc Networks Sugata Sanyal 1, Ajith Abraham 2, Dhaval Gada 3, Rajat Gogri 3, Punit Rathod 3, Zalak Dedhia 3 and Nirali Mody 3 1 School of Technology and
More information15 th TF-Mobility Meeting Sensor Networks. Torsten Braun Universität Bern braun@iam.unibe.ch www.iam.unibe.ch/~rvs
15 th TF-Mobility Meeting Sensor Networks Torsten Braun Universität Bern braun@iam.unibe.ch www.iam.unibe.ch/~rvs Overview 2 Ubiquitous Computing > Vision defined by Mark Weiser in 1991 Seamless integration
More informationLoad Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation
Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation Anthony Kleerekoper 2nd year PhD Multi-Service Networks 2011 The Energy Hole Problem Uniform distribution of motes Regular,
More informationReview of Prevention techniques for Denial of Service Attacks in Wireless Sensor Network
Review of Prevention techniques for Denial of Service s in Wireless Sensor Network Manojkumar L Mahajan MTech. student, Acropolis Technical Campus, Indore (MP), India Dushyant Verma Assistant Professor,
More informationAssessing trade-offs between energy consumption and security in sensor networks: simulations or testbeds?
Assessing trade-offs between energy consumption and security in sensor networks: simulations or testbeds? F. Maraninchi 1, Grenoble INP/Ensimag, VERIMAG mainly summarizing discussions with: Laurent Mounier,
More informationSECURE ROUTING PROTOCOL IN SENSOR NETWORK FOR VAMPIRE ATTACK
IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 2, Issue 3, Mar 2014, 45-50 Impact Journals SECURE ROUTING PROTOCOL IN
More informationSECURITY KEY MANAGEMENT AND AUTHENTICATION SCHEME FOR WIRELESS SENSOR NETWORKS
SECURITY KEY MANAGEMENT AND AUTHENTICATION SCHEME FOR WIRELESS SENSOR NETWORKS S. Jayapraba 1 and A.F.Sheik Hakkani 2 1 Department of MCA, Jayam College of Engineering and Technology, Bharathiyar University,
More informationSecurity in Ad Hoc Network
Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops
More informationSTUDY OF VARIOUS WIRELESS NETWORK SECURITY ISSUES: A REVIEW
STUDY OF VARIOUS WIRELESS NETWORK SECURITY ISSUES: A REVIEW Jyoti 1, Mrs. Sonal Beniwal 2 1 M.Tech Scholar BPSMV, Khanpur, Sonepat 2 Assistant Professor, BPSMV, Khanpur, Sonepat Abstract: Wireless security
More informationSIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS
Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 243-250 School of Engineering, Taylor s University College SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS SHEENU SHARMA
More informationSome Security Trends over Wireless Sensor Networks
Some Security Trends over Wireless Sensor Networks ZORAN BOJKOVIC, BOJAN BAKMAZ, MIODRAG BAKMAZ Faculty of Transport and Traffic Engineering University of Belgrade Vojvode Stepe 305 SERBIA Abstract: -
More informationSecure Data Transmission in Wireless Sensor Network Using Randomized Dispersive Routing Algorithm
Secure Data Transmission in Wireless Sensor Network Using Randomized Dispersive Routing Algorithm Pallavi Motharkar 1, Dr.P.R.Deshmukh 2 and Prof.G.S.Thakare 3 1 M.E. (Computer Engineering), 2,3 Department
More informationssumathy@vit.ac.in upendra_mcs2@yahoo.com
S. Sumathy 1 and B.Upendra Kumar 2 1 School of Computing Sciences, VIT University, Vellore-632 014, Tamilnadu, India ssumathy@vit.ac.in 2 School of Computing Sciences, VIT University, Vellore-632 014,
More informationSecuring MANET Using Diffie Hellman Digital Signature Scheme
Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 Karanvirk09@gmail.com 2
More informationSecured Data Transmissions In Manet Using Neighbor Position Verfication Protocol
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue3 March, 2014 Page No. 5067-5071 Secured Data Transmissions In Manet Using Neighbor Position Verfication
More informationDESIGNING SECURE SENSOR NETWORKS
WIRELESS SENSOR NETWORKS DESIGNING SECURE SENSOR NETWORKS ELAINE SHI AND ADRIAN PERRIG, CARNEGIE MELLON UNIVERSITY Sensor networks are a promising approach for a variety of applications, such as monitoring
More informationVampire Attack Detecting and Preventing in Wireless Sensor Network
International Journal of Emerging Engineering Research and Technology Volume 2, Issue 4, July 2014, PP 306-310 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) Vampire Attack Detecting and Preventing in
More informationComparison of Various Passive Distributed Denial of Service Attack in Mobile Adhoc Networks
Comparison of Various Passive Distributed Denial of Service in Mobile Adhoc Networks YOGESH CHABA #, YUDHVIR SINGH, PRABHA RANI Department of Computer Science & Engineering GJ University of Science & Technology,
More informationTowards Efficient Routing in Vehicular Ad Hoc Networks
Towards Efficient Routing in Vehicular Ad Hoc Networks Moez Jerbi*, Sidi-Mohammed Senouci* and Yacine Ghamri-Doudane** *France Telecom R&D, Core Network Laboratories, Lannion, France **Networks and Multimedia
More informationDetecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks
Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks Donggang Liu Peng Ning North Carolina State University {dliu,pning}@ncsu.edu Wenliang Du Syracuse University wedu@ecs.syr.edu
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
Volume 3, Issue 2, February 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Stochastic
More informationVulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem
Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem Ernesto Jiménez Caballero Helsinki University of Technology erjica@gmail.com Abstract intrusion detection
More informationSunitha K R Lecturer, Dept. of ISE, Sambhram Institute of Technology Bangalore
A Survey on Security Attacks in Wireless Sensor Network Rajkumar Assistant Professor, Dept. of ISE, Sambhram Institute of Technology Bangalore Sunitha K R Lecturer, Dept. of ISE, Sambhram Institute of
More informationEFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK
EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK S.Abarna 1, R.Padmapriya 2 1 Mphil Scholar, 2 Assistant Professor, Department of Computer Science,
More informationPosition and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks
Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks 1 Taifei Zhao, 2 Xizheng Ke, 3 Peilin Yang *1,Corresponding Author Department of Electronics Engineering, Xi an University of Technology,
More informationDoS Attack and Its Countermeasure in Energy-Constrained Wireless Networks
DoS Attack and Its Countermeasure in Energy-Constrained Wireless Networks Sunho Lim (Ph.D., Assistant Professor) T 2 WISTOR: TTU Wireless Mobile Networking Laboratory Dept. of Computer Science Texas Tech
More informationAbout the Authors Preface Acknowledgements List of Acronyms
Contents About the Authors Preface Acknowledgements List of Acronyms xiii xv xvii xix Part One Wireless Ad Hoc, Sensor and Mesh Networking 1 1 Introduction 3 1.1 Information Security 4 1.1.1 Computer Security
More informationSECURE AND RELIABLE DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS
SECURE AND RELIABLE DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS Kokilavani.V Mother Teresa College Of Engineering And Technology,Pudhukottai Abstract Network security involves the authorization of access
More informationCHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS
137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of
More informationEnergy Consumption analysis under Random Mobility Model
DOI: 10.7763/IPEDR. 2012. V49. 24 Energy Consumption analysis under Random Mobility Model Tong Wang a,b, ChuanHe Huang a a School of Computer, Wuhan University Wuhan 430072, China b Department of Network
More informationA Catechistic Method for Traffic Pattern Discovery in MANET
A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer
More informationAnalysis of Denial-of-Service attacks on Wireless Sensor Networks Using Simulation
Analysis of Denial-of-Service attacks on Wireless Sensor Networks Using Simulation 1 Doddapaneni.krishna Chaitanya, 2 Ghosh.Arindam Middlesex University Abstract Evaluation of Wireless Sensor Networks
More informationIntelligent Agents for Routing on Mobile Ad-Hoc Networks
Intelligent Agents for Routing on Mobile Ad-Hoc Networks Y. Zhou Dalhousie University yzhou@cs.dal.ca A. N. Zincir-Heywood Dalhousie University zincir@cs.dal.ca Abstract This paper introduces a new agent-based
More informationENHANCED GREEN FIREWALL FOR EFFICIENT DETECTION AND PREVENTION OF MOBILE INTRUDER USING GREYLISTING METHOD
ENHANCED GREEN FIREWALL FOR EFFICIENT DETECTION AND PREVENTION OF MOBILE INTRUDER USING GREYLISTING METHOD G.Pradeep Kumar 1, R.Chakkaravarthy 2, S.Arun kishorre 3, L.S.Sathiyamurthy 4 1- Assistant Professor,
More informationRobust Security Solution to Countermeasure of Malicious Nodes for the Security of MANET
Robust Security Solution to Countermeasure of Malicious Nodes for the Security of MANET Kritika Sharma M.tech(CSE) Doon Valley Insttitute of Enggineering & Technology, Karnal Parikshit Singla Assistant
More informationMobile Network Analysis - Hole Healing
, pp.143-150 http://dx.doi.org/10.14257/ijfgcn.2013.6.6.15 Decentralized Mobile Sensor Navigation for Hole Healing Policy in Wireless Hybrid Sensor Networks Fu-Tian Lin 1, 2, Chu-Sing Yang 1, Tien-Wen
More informationAshok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram.
Protection of Vulnerable Virtual machines from being compromised as zombies during DDoS attacks using a multi-phase distributed vulnerability detection & counter-attack framework Ashok Kumar Gonela MTech
More informationSECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET MR. ARVIND P. PANDE 1, PROF. UTTAM A. PATIL 2, PROF. B.S PATIL 3 Dept. Of Electronics Textile and Engineering
More informationCROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
More informationPreventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System
Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System Shams Fathima M.Tech,Department of Computer Science Kakatiya Institute of Technology & Science, Warangal,India
More informationDESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate
More informationTHIS: THreshold security for Information aggregation in Sensor networks
THIS: THreshold security for Information aggregation in Sensor networks Hai Vu Neeraj Mittal S. Venkatesan Department of Computer Science The University of Texas at Dallas Richardson, TX 75083, USA hai.vu@student.utdallas.edu
More informationEnergy Optimal Routing Protocol for a Wireless Data Network
Energy Optimal Routing Protocol for a Wireless Data Network Easwar Vivek Colloborator(s): Venkatesh Ramaiyan, Srikrishna Bhashyam Department of Electrical Engineering, Indian Institute of Technology, Madras.
More informationWireless Sensor Network: Improving the Network Energy Consumption
Wireless Sensor Network: Improving the Network Energy Consumption Ingrid Teixeira, José Ferreira de Rezende and Aloysio de Castro P. Pedroza Abstract-- In a remote sensor application it is desirable that
More informationDENIAL OF SERVICE IN WIRELESS SENSOR NETWORKS: ISSUES AND CHALLENGES
In: Advances in Communications and Media Research ISBN 978-1-60876-576-8 Editor: Anthony V. Stavros, pp. 2010 Nova Science Publishers, Inc. Chapter 3 DENIAL OF SERVICE IN WIRELESS SENSOR NETWORKS: ISSUES
More informationMS EE Scholarly Paper Spring, 2009. Secure Routing in Wireless Sensor Networks
MS EE Scholarly Paper Spring, 2009 Secure Routing in Wireless Sensor Networks Srividya Shanmugham Scholarly Paper Advisor: Dr. Jens-Peter Kaps George Mason University Fairfax, VA SRIVIDYA SHANMUGHAM, SCHOLARLY
More informationmlab: A Mobile Ad Hoc Network Test Bed
mlab: A Mobile Ad Hoc Network Test Bed A. Karygiannis and E. Antonakakis National Institute of Standards and Technology {karygiannis, manos}@nist.gov Abstract Over the last few years, research in the area
More informationNetwork Security Vulnerability and Attacks on Wireless Sensor Networks: Survey
International Journal of Scientific & Engineering Research, Volume 3, Issue 9, September-2012 1 Network Security Vulnerability and Attacks on Wireless Sensor Networks: Survey K.M.Saravana 1, Dr. A. Kovalan
More informationSECURITY VULNERABILITY ISSUES IN WIRELESS
SECURITY VULNERABILITY ISSUES IN WIRELESS SENSOR NETWORKS: A SHORT SURVEY C K Marigowda 1, Manjunath Shingadi 2 Associate Professor, Department of Information Science & Eng, Acharya Institute of Technology,
More informationSECURITY IN WIRELESS SENSOR NETWORKS IMPROVING THE LEAP PROTOCOL
SECURITY IN WIRELESS SENSOR NETWORKS IMPROVING THE LEAP PROTOCOL Delan Alsoufi 1, Khaled Elleithy 1, Tariq Abuzaghleh 2 and Ahmad Nassar 1 1 Department of Computer Engineering, University of Bridgeport,
More informationPerformance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com
More informationPower Efficiency Metrics for Geographical Routing In Multihop Wireless Networks
Power Efficiency Metrics for Geographical Routing In Multihop Wireless Networks Gowthami.A, Lavanya.R Abstract - A number of energy-aware routing protocols are proposed to provide the energy efficiency
More informationSecurity Threats in Mobile Ad Hoc Networks
Security Threats in Mobile Ad Hoc Networks Hande Bakiler, Aysel Şafak Department of Electrical & Electronics Engineering Baskent University Ankara, Turkey 21020013@baskent.edu.tr, asafak@baskent.edu.tr
More informationRT-QoS for Wireless ad-hoc Networks of Embedded Systems
RT-QoS for Wireless ad-hoc Networks of Embedded Systems Marco accamo University of Illinois Urbana-hampaign 1 Outline Wireless RT-QoS: important MA attributes and faced challenges Some new ideas and results
More informationQUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering
More informationSecure and Efficient Data Collection in Sensor Networks
Secure and Efficient Data Collection in Sensor Networks Cristina Cano 1, Manel Guerrero 2, Boris Bellalta 1 (1) Universitat Pompeu Fabra (2) Universitat Politecnica de Catalunya cristina.cano@upf.edu,
More informationNecessitate for Security in Wireless Sensor Network and its Challenges
Technology Volume 1, Issue 1, July-September, 2013, pp. 21-25, IASTER 2013 www.iaster.com, Online: 2347-5099, Print: 2348-0009 ABSTRACT Necessitate for Security in Wireless Sensor Network and its Challenges
More informationSECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS)
SECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS) Neha Maurya, ASM S IBMR ABSTRACT: Mobile Ad hoc networks (MANETs) are a new paradigm of wireless network, offering unrestricted mobility without any underlying
More informationBehavior Monitoring Framework in Large-Scale Wireless Sensor Networks
Behavior Monitoring Framework in Large-Scale Wireless Sensor Networks Feng Wang Mathematical and Natural Sciences Arizona State University fwang25@asu.edu Jianhua Gao Computer School Wuhan University Jianhua.Gao@asu.edu
More informationPrediction of DDoS Attack Scheme
Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
Volume 3, Issue 1, January 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Analysis of
More informationTOWARD A FORMAL FRAMEWORK TO EVALUATE WIRELESS SENSOR NETWORK SECURITY
TOWARD A FORMAL FRAMEWORK TO EVALUATE WIRELESS SENSOR NETWORK SECURITY Anas Abou El Kalam 1, Andrea Atzeni 2, Alberto Cappadonia 3, Emanuele Cesena 2, Simone Fischer-Hübner 4, Stefan Lindskog 4, Leonardo
More informationSecure Network Discovery in Wireless Sensor Networks Using Combinatorial Key Pre-Distribution
Secure Network Discovery in Wireless Sensor Networks Using Combinatorial Key Pre-Distribution Kevin Henry Cryptography, Security, and Privacy (CrySP) Lab Cheriton School of Computer Science University
More informationAttacks on neighbor discovery
Cryptographic Protocols (EIT ICT MSc) Dr. Levente Buttyán associate professor BME Hálózati Rendszerek és Szolgáltatások Tanszék Lab of Cryptography and System Security (CrySyS) buttyan@hit.bme.hu, buttyan@crysys.hu
More informationHow To Balance Network Load In A Wireless Sensor Network
Balancing Network Traffic Load in Geographic Hash Table (GHT) R. Asha, V.Manju, Meka Sindhu & T. Subha Department of Information Technology, Sri Sai Ram Engineering College, Chennai. E-mail : ashaniteesh@gmail.com,
More informationSPY AGENT BASED SECURE DATA AGGREGATION IN WSN
ISSN: 2229-6948(ONLINE) ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, DECEMBER 214, VOLUME: 5, ISSUE: 4 SPY AGENT BASED SECURE DATA AGGREGATION IN WSN T. Lathies Bhasker 1 and G. Arul Jagan 2 1 Department
More informationFast and Scalable Key Establishment in. Sensor Networks
Fast and Scalable Key Establishment in 1 Sensor Networks Tassos Dimitriou, Ioannis Krontiris and Fotios Nikakis Athens Information Technology [tdim, ikro, fnik]@ait.gr Abstract We present a protocol for
More informationIEQGOR to Increase the Quality of Service in Wireless Sensor Network
IEQGOR to Increase the Quality of Service in Wireless Sensor Network K.Mythilipriya 1, B.Arunkumar 2 III M.E., Dept of CSE, Karpagam University, Coimbatore, India 1 Assistant Professor, Dept of CSE, Karpagam
More information