Defending Wireless Sensor Networks Against Adversarial Localization
|
|
|
- Derick Ray
- 10 years ago
- Views:
Transcription
1 Defending Wireless Sensor Networks Against Adversarial Localization Neelanjana Dutta, Abhinav Saxena and Sriram Chellappan Department of Computer Science Missouri University of Science and Technology Rolla, MO 65401, U.S.A. {nd2n8, arsnt7, Abstract In this paper, we study the issue of defending against adversarial localization in wireless sensor networks. Adversarial localization refers to attacks where an adversary attempts to disclose physical locations of sensors in the network. The adversary accomplishes this by physically moving in the network while eavesdropping on communication messages exchanged by sensors, and measuring raw physical properties of messages like Angle of Arrival, Signal Strength of the detected signal. In this paper, we aim to defend sensor networks against such kinds of adversarial localization. The core challenge comes from the sensors performing two conflicting objectives simultaneously: localize the adversary, and hide from the adversary. The principle of our approach and the subsequent defense protocol is to allow sensors intelligently predict their own importance as a measure of these two conflicting requirements. Only a few important sensors will participate in any message exchanges. This ensures high degree of adversary localization, while also protecting location privacy of many sensors. Extensive simulations are conducted to demonstrate the performance of our protocol. I. Introduction Recently, a critical component of research in the networking arena has been Wireless Sensor Networks (WSNs). Numerous civilian and military applications are possible with wireless sensor networks. Towards this extent, a vast amount of theory in the realm of sensor deployment, data dissemination, sensor mobility, localization, tracking, security [1], [2], [3], [4], [5] etc. have been developed by researchers. In parallel, many wireless sensor network test-beds have also been successfully deployed, tested and validated [6], [7]. The conclusions from these efforts serve to demonstrate the significant promise WSNs have to impact humans in a variety of applications. In this paper, we focus on an important security threat in WSNs, called adversarial localization. Adversarial location refers to attacks wherein an adversary aims to discover positions of sensors in a network. We claim that under such attacks location privacy of sensors is compromised. A host of benefits are patent to adversaries when sensor location privacy is compromised. For instance, the number of sensor nodes in the network can be estimated which can help gauge network strength; optimal intrusion paths involving minimal detection through the network can be determined, physical destruction of sensors can be accomplished to compromise network functionality etc. Protecting location privacy of sensors against adversarial localization is hence a critical security requirement. There are two intuitive approaches to protect location privacy in WSNs. The first is to encrypt all sensor messages [5], [8], [9]. Adversaries will hence not be able to decrypt messages, and hence the identities of sensors are preserved. Unfortunately, this technique fails since the adversary can measure raw physical (and location specific) properties of the wireless signals like Angle of Arrival (AoA) and Receive Signal Strength Indicator (RSSI). Repeated messages from the same sensors naturally leak more location information until eventually sensors are localized. The second approach is to let all sensors sleep, and so no information of sensors positions is leaked. Unfortunately, the sensors do not accomplish the WSN mission in this case, and the network is rendered useless. Preserving location privacy of sensors while still maintaining sufficient network performance is very challenging. In this paper, we make the following contributions: Attack and Network Model: In this paper, we define a representative adversarial localization attack model. A physically mobile adversary (typically a robot) will move in the network while simultaneously listening for sensor
2 communication signals. To maintain stealthiness, the adversary will be passive, that is, it will not attempt to physically tamper with sensors. As such, the adversary will not be able to infer any information privy to sensors like identities, stored keys, message content etc. However, since the nature of the medium is wireless, the adversary will be able to detect wireless signals and measure their physical properties like Angle of Arrival (AoA) and Receive Signal Strength Indicator (RSSI) and localize sensor positions using existing techniques in [10], [11], [12]. Clearly, more the number of messages sent by a sensor, the more location information its leaks to the adversary. The sensor network on the other hand is deployed to localize such an adversary. However, the sensors are also aware that the adversary will attempt to locate sensor positions. The goal of the sensor network is to localize the adversary, while simultaneously preserving its location privacy from the adversary. A light-wight and distributed protocol: In this paper, we design a light-weight and purely distributed protocol for preserving sensor location privacy against adversarial localization. The core challenge comes from the sensors performing two conflicting objectives simultaneously: localize the adversary, and hide from the adversary. The principle of our approach is to allow sensors intelligently predict their own importance as a measure of these two conflicting requirements. Only a few important sensors will participate in any message exchanges. This ensures high degree of adversary localization, while also protecting locations of many sensors. We then design a localized light weight and purely distributed protocol based on this approach. Extensive simulations are conducted to demonstrate the performance of our protocol from the perspective both adversary localization and sensor location privacy. The rest of the paper is organized as follows. In Section II, we present the system model and problem definition. In Section III, we present our defense protocol against adversarial localization. Performance Evaluations are presented in Section IV, and the paper is concluded in Section V. II. System Model and Problem Definition In this section, we will first define the system model, from the perspective of both the sensor network and the adversary. The formal problem definition is presented next A. System Model Sensor Network Model: In this paper, we consider a sensor network where the deployment field is clustered into multiple grids. Clustering a sensor network has been widely adopted in practice [13], [14], [4]. Advantages of clustering include better network scalability, decreased routing complexity, improved power efficiency etc. We assume that sensors know their positions in the network, which can be accomplished using localization techniques in [15], [16]. We also assume that sensors encrypt their messages using light weight techniques like [5], [8]. The mission of the sensors is to localize adversaries physically moving in the network. To do so, sensors are equipped with ranging hardware that they use to determine distances from the adversary (can be accomplished by typical vibration or infrared sensors). For a grid of size r, the sensing range is assumed to be (2)r, and the radio transmission range is assumed to be (5)r. The localizing accuracy is expected to be grid level, i.e., the adversary is considered to be localized at all times when sensors are correctly aware of the grid where the adversary is physically present, and lost at other times. In this paper, we initially assume (for ease of elucidation) that the deployment field is fully covered, i.e., every point in the field is within the sensing range of one or more sensors 1. Note that in order to localize any adversary in the network, sensors will have to exchange communication messages on adversary position. Since multiple sensors will likely be sensing the adversary at any point in time, there may be multiple messages exchanged. Clearly there is a tradeoff between accuracy of localizing the adversary and number of messages exchanged by sensors. Adversary model: In this paper, we consider an adversary that is physically moving in the network like a programmable robot. The adversary s movement is either random or controlled. While the adversary can have any objective in its mobility, it also has the objective of localizing sensor positions passively. By passive, we mean the adversary will not launch any active attack on the network like breaking into sensors to determine their positions, or disclose encryption keys. Rather the adversary will discover sensor positions based on information leakage of wireless signals which sensors exchange in the network. The adversary will accomplish this by passively intercepting communication messages, and measuring its raw physical properties like Received Signal Strength or Angle of Arrival or both. Any number of existing techniques for sensor localization [3], [17], [10] with subtle modifications can then be applied to localize sensors. Clearly, more the number of messages from the sensors, more is the information leaked to the adversary, and better is the adversary s estimate of the sensor positions. B. Problem Definition We model our problem as a game played between two opposing entities - the sensors in the network and the adversary. The goal of the sensors is to localize the adversary, while simultaneously minimizing information leakage in terms of communication messages. The adversary s goal is to physically move in the network, while 1 However, the proposed scheme will work without modification even if this assumption does not hold in practice.
3 simultaneously attempting to localize sensors. The success of the sensors is measured by means of a metric called Adversary Location Certainty, which denotes the degree of accuracy of adversary localization by sensors. The success of the adversary is measured by a metric called Sensor Location Leakage, which is defined as a function of number of message sent out by a sensor within the radio range of the adversary. In simple terms, our problem is to design a protocol to be executed by sensors at runtime that maximizes Adversary Location Certainty, while simultaneously minimizing Sensor Location Leakage. III. Our Protocol In this section, we present a light-weight and distributed protocol for defending wireless sensor networks against adversarial localization. As indicated in Section II, the goal is to maximize the accuracy of adversary tracking by the sensors (i.e., Adversary Location Certainty), while simultaneously protecting location privacy of sensors from the adversary (i.e., Sensor Location Leakage). A. Preliminaries Before discussing the protocol, we first discuss and define important definitions used later in the paper. 1) Fixed Parameters: In this section, we discuss definitions for Fixed Parameters, which are those parameters in our protocol whose values are unchanged during the entire network mission. Neighboring Grids: For each grid in the network, we divide their neighboring grids into two classes Regular Neighbors and Corner Neighbors. Regular Neighbors of a Grid g are those neighboring grids which are in the immediate Up, Down, Left and Right position of Grid g. Corner Neighbors of a Grid g are those neighboring grids which are in the immediate diagonal positions of Grid g. d i max: For each grid in the network, d i max is the minimum Euclidian distance between the sensor i in the grid and the adversary, beyond which the sensor i can deterministically assume that the adversary is not in the same grid as itself. In other words, it is the distance between a sensor and the furthest boundary point of that grid in which the sensor is present. We consider every grid has a vertical axis passing through its center, and clockwise angle is measured to be positive. Consider a sensor i (represented as a dot) in Figure 1 (a). Let the angle made by a straight line drawn between the center of the grid and the sensor i, and the vertical axis be θ. Let the distance between the center of the grid and the sensor be ϵ. Considering that the sensor might be included in any of the four quadrants, d i max = (2r 2 + ( 1) n 2rϵ(sinθ + ( 1) k Cosθ) + ϵ 2 ), (1) where n = θ 180 and k = θ 90. sin dmax i cos r r- cos r- sin Fig. 1. Determination of d i min and di min for Sensor i in A Grid r dmin i d i min : For each grid in the network, di min is the maximum Euclidian distance between the sensor i in the grid and the adversary, within which a sensor can deterministically assume that the adversary is in the same grid as itself. That is, it is the distance between a sensor and the closest boundary point of that grid in which the sensor is present, as shown in Figure 1 (b), and given by, d i min = min[(r + ( 1) n ϵsinθ), (r + ( 1) m ϵcosθ)] (2) where n = θ θ and m = 180. d max and d min sensor: For each grid, the sensor with the minimum value of d i max among all sensors in that grid is the d max sensor of the grid. Similarly, the sensor with the maximum value of d i min among all sensors in that grid is the d max sensor. We also define the d max and d min circles as the circles whose centers are the positions of the d max and d min sensors, and whose radii are d max and d min respectively for each grid. We wish to point out that each sensor can calculate the above parameters independently with knowledge of other sensor positions in the grid. The parameters once determined are fixed, and do not change subsequently. 2) Dynamic Parameters: We now discuss the parameters in our protocol whose values are dynamically altered as a function of where the adversary is currently located. For all subsequent discussions in this section, consider that the adversary is currently localized in Grid g. d i max: For each sensor i in a corner neighbor of grid g, we define its d i max as the distance between sensor i and the edge of the corner neighbor, closest to the adversary. d i min : For each sensor i in the neighboring grids (both regular and corner neighbors) of grid g, we define its d i min
4 as the distance between sensor i and the perpendicular distance between sensor i and the boundary of Grid g. d max sensor: Recall that there can be different values for d i max for each sensor i in the neighboring grids of grid g. For each sensor in a neighboring grid, we define its d i max circle as a circle of radius d i max centered at the location of sensor i. Among all such sensors, the one whose d i max circle overlaps the most with its neighboring grids is considered to be d i max sensor of Grid g. d min sensor: Recall that there can be different values for d i min for each sensor i in the corner neighbors of grid g. For each sensor in a particular corner neighbor, we define its d i min circle as a circle of radius d i min centered at the location of sensor i. Among all such sensors, the one whose d i min circle covers the most area in its grid is considered to be d i min sensor of Grid g. We wish to point out here that the values for these parameters can change based on which grid the adversary is currently localized. However, irrespective of where the adversary is localized, depending on the current position of the adversary, each sensor can calculate each of the above parameters independently assuming each sensor knows the positions of other sensors in the grid. B. Defense Protocol Description Pseudocode 1 presents the pseudocode of our defense protocol, which is divided into two phases: Initialization Phase, and Post Initialization Phase as discussed below. Initialization Phase: Initially when the adversary first enters the network, the first three sensors sensing the adversary will perform simple message exchanges and triangulation to localize the adversary to a grid. This is the initialization phase, which notifies all sensors to execute the protocol for adversary localization and sensor location privacy preservation as discussed below. Post Initialization Phase: With this start of the protocol, the sensors in neighboring grid of the adversary calculates d min and d max sensors and updates them with each new grid location of the adversary. We define adversarysensing circle of a sensor S x to be the circle with S x at center and radius equal to the distance between adversary and sensor S x. The aim of this paper being grid level localization, the protocol allows message exchange among sensors only when a grid switch by the adversary is detected. At different steps the protocol uses four different types of messages m 1, m 2, m 3 and m 4. Each message contains a unique message key to indicate its own type. Either one of the four different cases discussed below would take place in case of a detected grid switch. Case 1 - Grid Switch Detection by d min sensor: When a d min sensor of a neighboring grid, say g, starts sensing Pseudocode 1 Pseudocode of the Defense Protocol 1: Initialization Phase 2: while When Adversary is first sensed by three sensors do 3: Triangulate Adversary to a Grid 4: end while 5: End Initialization Phase 6: Post Initialization Phase 7: for Each Step of Adversary do 8: while Adversary position is in Grid g do 9: if Adversary enters d min circle of Grid g then 10: Refer to Section III-B Case 1. 11: else if Adversary enters d min circle of Grid g then 12: Refer to Section III-B Case 2. 13: else if Adversary leaves d max circle of Grid g then 14: Refer to Section III-B Case 3. 15: else if Adversary enters d max circle of Corner Neighbor g of Grid g then 16: Refer to Section III-B Case 4. 17: end if 18: end while 19: end for the adversary, It indicates the adversary s movement into the d min circle, which is possible only in case of a grid switch to g. The d min sensor broadcasts message m 1 updating current position of adversary to be g and adversary s distance from it. As a grid switch is detected, all the sensors receiving m 1 update the set of neighbors of current grid, dmin and d max sensors. In this case, only a single message is exchanged to update sensors in vicinity of the adversary about its grid switch. Case 2 - Grid Switch Detection by d min sensor: Another case of identifying and broadcasting adversary s grid switch using only one message is possible when d min sensor of a neighboring grid g starts sensing the adversary, indicating adversary s grid switch to g. Similar to case 1, the d min sensor of g updates the location information and its distance from adversary by broadcasting message m 1. Case 3 - Grid Switch Detection by d max sensor: Step 1: Before Case 1 or Case 2 occurs for a particular grid switch of the adversary, the grid switch can be detected when the d max sensor of current grid stops sensing the adversary. Although it signifies adversary s movement outside the current grid, it cannot be determined by the d max sensor which neighboring grid it has moved to. So the d max sensor will broadcast message m 2 to initiate the Localization() procedure. Step 2: Upon receiving message m 2, every sensor S i sensing the adversary computes the two points of intersection of the sensing circles of the sender of the m 2 and itself. The adversary should be present in either of these two points. Based on the location of these points, the sensors intelligently try to localize the adversary. The next steps of the protocol can be divided into two cases based on the location of the intersection points.
5 a) If the two points are included in a single grid, say g, the adversary has clearly moved to grid g. Otherwise, if only one of the intersection points falls in a neighboring grid (say g ) of last known adversary grid, g is the new location of the adversary, as the adversary can move only to neighboring grids in a single step. After concluding about adversary s new location, S i waits for a time t, (t = distance of the adversary from S i ), to avoid any redundant message expenditure. If no other sensor has sent m 1 in this interval of time t, then S i broadcasts m 1 updating the grid location of adversary and its distance from S i. In this case, two messages are sent out among the sensors to determine and update the new grid location of the adversary. b) If both the points of intersection fall into different neighboring grids, it is possible that the adversary has moved to any of the two grids. So after wait time t, if no other sensor has sent m 1 or m 3 in that time, S i broadcasts message m 3. Every sensor S j receiving m 3 and sensing the adversary computes point of intersection of sensing circle of sender of m 2 and m 3 and itself. The grid containing this point is recognized by S j as the new location of the adversary. Sensor S j waits for time t (t = distance of the adversary from S i + a constant c) to avoid conflict. The constant c is chosen large enough to ensure that the value of t is most likely greater than the value of t, so that if any sensor can satisfy the criteria mentioned in a), it can send message before S j, and thus only two messages will be required to perform the localization. If no other sensor has sent message m 4 in that time t, S j broadcasts m 4 updating new position of the adversary. In this case, three messages are required to locate the adversary. Case 4 - Grid Switch Detection by d max sensor: Before any of the previous cases detects a grid switch, dmax sensor of a corner neighbor of the current grid might start sensing the adversary. It signifies that the adversary has moved to a new grid, but this information is insufficient to determine exactly which grid the adversary has moved to. The d max sensor broadcasts message m 2 and the localization procedure begins (discussed in the next paragraph). The successive steps in this case is exactly similar to the Step 2 in Case 3. Even in this case, either two or three messages are required to locate the adversary. The proposed solution localizes the adversary by intelligently using the its previous location. But as we trade location certainty against location privacy, in some of the cases the adversary cannot be deterministically or correctly located due to its movement into the uncertainty region. However, using simulations, we show in section IV that our protocol assures location certainty in most of the time while majority of the sensors in the network do not send any message or sends negligible number of messages throughout. IV. Performance Evaluations In this section, we evaluate the performance of our defense protocol via simulations. We consider a sensor network clustered into grids, where the sensors are uniformly and randomly deployed. The adversary randomly moves in the network and is equipped with unlimited memory to store and process messages exchanged by sensors. We assume that the radio range of the adversary is unlimited (i.e., the adversary can eavesdrop on any message sent by any sensor in the network). We have two key performance metrics: Adversary Location Certainty, which is the percentage of time that the adversary s position is correctly localized to a grid, and Sensor Location Leakage, which is quantified by the number of messages sent by each sensor within the radio range of the adversary. Evaluating Adversary Location Certainty: In Figure 2 (a), we plot the Adversary Location Certainty as a function of number of time units spent by the adversary in the network for a network density of 10 sensors per grid. As we can see close to 90% of the time the sensors are able to correctly localize the adversary in our protocol. The loss of about 10% in localization certainty comes from the tradeoff is minimizing message exchanges (which is evaluated subsequently). In Figure 2 (b), we plot Adversary Location Certainty as a function of number of sensors per grid when the time spent by the adversary is 12, 000 time units. As we can see, even for very low sensor densities of 3 sensors per grid, the Adversary Location Certainty is 75%. When the density increases, the success of localizing the adversary dramatically increases. Interestingly, the success rate begins to flatten at around 95% beyond when the number of sensors per grid is 15. This is because, the uncertainty regions in the network tends to stay constant even for further increases in number of sensors per grid beyond 15. Adversary Location Certainty Time Units spent by Adversary in Network Adversary Location Certainty Average No. of Sensors per Grid Fig. 2. Adversary Location Certainty vs. Time spent by Adversary (a) and Sensor Density (b) Evaluating Sensor Location Leakage: In Figure 3, we study the sensor location privacy as a function of Sensor Location Leakage when the density of the sensors is 10 per grid. Clearly, more the number of messages sent by
6 a sensor, more is the information leaked, and less is the location privacy of sensors. As we can see from Figure 3, a vast majority of the sensors in the network (more than 90%) send less than three messages. This coupled with the fact that Adversary Location Certainty is also quite high demonstrates that our protocol is effective in localizing adversaries while keeping the information leakage from sensors quite low. Due to space limitations, we do not study Sensor Location Leakage as a function of varying sensor densities. Nevertheless, the trend remains the same. % of sensor nodes No. of messages sent by individual sensor Time Units spent by Adversary in Network 2000 time units 4000 time units 6000 time units 8000 time units time units time units Fig. 3. Sensor Location Leakage with Varying Times Spent by Adversary in the Network V. Conclusions In this paper, we addressed an important problem, namely the defense of sensor networks against adversarial localizations. The problem spanned the three critical dimensions of target tracking, sensor localization and privacy in sensor networks, which to the best of our knowledge is unique. The principle of our defense is to allow sensors to intelligently predict their own importance as a measure of the two conflicting requirements of adversary localization and sensor location privacy. Only a few such important sensors will participate in any message exchanges. This ensures high degree of adversary localization, while also protecting location privacy of many sensors. We then design a localized light weight and purely distributed protocol based on this approach. Extensive simulations conducted demonstrate the performance of our protocol. Acknowledgment This work was supported in part by a grant from University of Missouri Research Board. All opinions, findings, and conclusions are those of the authors and do not necessarily reflect the views of the funding agency. References [1] X. Bai, S. Kumar, D. Xuan, Z. Yun, and T.H. Lai, Deploying wireless sensors to achieve both coverage and connectivity, in Proceedings of ACM International Symposium on Mobile Ad Hoc Networking and Computing(MobiHoc), Florence, May [2] F. Ye, H. Luo, J. Cheng, S. Lu, and L. Zhang, A two-tier data dissemination model for large-scalewireless sensor networks, in Proceedings of ACM International Conference on Mobile Computing and Networking (MOBICOM), Atlanta, September [3] T. He, C. Huang, B.M. Blum, J.A. Stankovic, and T. Abdelzaher, Range-free localization schemes for large scale sensor networks, in Proceedings of ACM International Conference on Mobile Computing and Networking (MobiCom), San Diego, August [4] T. Abdelzaher, B. Blum, Q. Cao, D. Evans, J. George, S. George, T. He, L. Luo, S. Son, R. Stoleru, J. Stankovic, and A. Wood, Envirotrack: An environmental programming model for tracking applications in distributed sensor networks, in Proceedings of International Conference on Distributed Computing Systems (ICDCS), Tokyo, March [5] L. Eschenauer and V. D. Gligor, A key-management scheme for distributed sensor networks, in Proceedings of the ACM Conference on Computer and Communication Security (CCS), November 2002, pp [6] Prashant Shenoy Purushottam Kulkarni, Deepak Ganesan and Qifeng Lu, Senseye: A multi-tier camera sensor network, in Proceedings of ACM Multimedia, Singapore, November [7] S. Bapat, V. Kulathumani, and A. Arora, Analyzing the yield of exscal, a large-scale wireless sensor network experiment, in Proceedings of the 13th IEEE International Conference on Network Protocols (ICNP), 2005, pp [8] H. Chan, A. Perrig, and D. Song, Random key predistribution schemes for sensor networks, in Proceedings of IEEE Symposium on Research in Security and Privacy, May [9] D. Liu and P. Ning, Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks, in Network and Distributed System Security Symposium (NDSS), San Diego, February [10] S. Chellappan, V. Paruchuri, D. McDonald, and A. Durresi, Localizing sensor networks in un-friendly environments, in IEEE Military Communications Conference (MILCOM), San Diego, November [11] Z. Yang, E. Ekici, and D. Xuan, A localization-based antisensor network system, in Proceedings of IEEE INFOCOM 2007 Symposia, Anchorage, May [12] X. Wang, S. Chellappan, W. Gu, W. Yu, and D. Xuan, Searchbased physical attacks in sensor networks, in Proceedings of IEEE ICCCN, October [13] Y. Xu, J. Heidemann, and D. Estrin, Geography-informed energy conservation for ad hoc routing, in Proceedings of ACM International Conference on Mobile Computing and Networking (MobiCom), Rome, July [14] W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, Energyefficient communication protocol for wireless microsensor networks, in Proceedings of Hawaii International Conference on System Sciences (HICSS), Maui, January [15] N. Bulusu, J. Heidemann, and D. Estrin, Adaptive beacon placement, in Proceedings of IEEE International Conference on Distributed Computing Systems (ICDCS), Phoenix, AZ, April [16] A. Howard, M. J. Mataric, and G. S. Sukhatme, Relaxation on a mesh: a formation for generalized localization, in Proceedings of IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), Maui, November [17] Andreas Savvides, Chih-Chieh Han, and Mani B. Srivastava, Dynamic fine-grained localization in ad-hoc networks of sensors,, in Proceedings of ACM MobiCom, 2001.
Babel: Using a Common Bridge Node to Deliver Multiple Keys in Wireless Sensor Networks
Babel: Using a Common Bridge Node to Deliver Multiple Keys in Wireless Sensor Networks Jing Deng Department of Computer Science University of New Orleans New Orleans, LA 7048, USA [email protected] Yunghsiang
Restricted and Mobile: Security in Mobile Wireless Sensor Networks Kısıtlı ve Hareketli: Mobil Telsiz Duyarga Ağlarında Güvenlik
Restricted and Mobile: Security in Mobile Wireless Sensor Networks Kısıtlı ve Hareketli: Mobil Telsiz Duyarga Ağlarında Güvenlik Albert Levi [email protected] Sabancı University Computer Science and
Secure Key Management Architecture Against Sensor-node Fabrication Attacks
1 Secure Key Management Architecture Against Sensor-node Fabrication Attacks Jeffrey Dwoskin Dahai Xu Jianwei Huang Mung Chiang Ruby Lee {jdwoskin, dahaixu, jianweih, chiangm, rblee}@princeton.edu Department
Neighborhood-Based Security Protocol for Wireless Sensor Networks
The 6th International Conference on Information Technology and pplications (ICIT 2009) Neighborhood-Based Security Protocol for Wireless Sensor Networks Di Zhang, Ung Heo, Yi Zhao, Kang Soo You* and Jaeho
Wireless Sensor Network: Improving the Network Energy Consumption
Wireless Sensor Network: Improving the Network Energy Consumption Ingrid Teixeira, José Ferreira de Rezende and Aloysio de Castro P. Pedroza Abstract-- In a remote sensor application it is desirable that
International Journal of Advancements in Research & Technology, Volume 2, Issue 7, July-2013 ISSN 2278-7763 473
473 Comparative Analysis of Hop-to-Hop and End-to-End Secure Communication Shital Y. Gaikwad M. Tech. (Second Year Student) (Computer Network and Information Security) SGGS Institute of Engineering and
Some Security Trends over Wireless Sensor Networks
Some Security Trends over Wireless Sensor Networks ZORAN BOJKOVIC, BOJAN BAKMAZ, MIODRAG BAKMAZ Faculty of Transport and Traffic Engineering University of Belgrade Vojvode Stepe 305 SERBIA Abstract: -
Range Free Localization Schemes for Wireless Sensor Networks
Range Free Localization Schemes for Wireless Sensor Networks Ashok Kumar 1, Narottam Chand 2, Vinod Kumar 1 and Vinay Kumar 1 1 Department of Electronics and Communication Engineering 2 Department of Computer
An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks
An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks Ayon Chakraborty 1, Swarup Kumar Mitra 2, and M.K. Naskar 3 1 Department of CSE, Jadavpur University, Kolkata, India 2 Department of
Using Received Signal Strength Variation for Surveillance In Residential Areas
Using Received Signal Strength Variation for Surveillance In Residential Areas Sajid Hussain, Richard Peters, and Daniel L. Silver Jodrey School of Computer Science, Acadia University, Wolfville, Canada.
Security in Ad Hoc Network
Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops
A Security Architecture for. Wireless Sensor Networks Environmental
Contemporary Engineering Sciences, Vol. 7, 2014, no. 15, 737-742 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4683 A Security Architecture for Wireless Sensor Networks Environmental
Protecting Privacy Secure Mechanism for Data Reporting In Wireless Sensor Networks
ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference
Wireless Sensor Networks Chapter 14: Security in WSNs
Wireless Sensor Networks Chapter 14: Security in WSNs António Grilo Courtesy: see reading list Goals of this chapter To give an understanding of the security vulnerabilities of Wireless Sensor Networks
Security for Ad Hoc Networks. Hang Zhao
Security for Ad Hoc Networks Hang Zhao 1 Ad Hoc Networks Ad hoc -- a Latin phrase which means "for this [purpose]". An autonomous system of mobile hosts connected by wireless links, often called Mobile
An Efficient Energy-Aware Coverage- Preserving Hierarchical Routing Protocol for WSN
An Efficient Energy-Aware Coverage- Preserving Hierarchical Routing Protocol for WSN S.Taruna 1, Sakshi Shringi 2 1,2 Banasthali Vidyapith, Jaipur, Rajasthan, India ABSTRACT Wireless sensor networks (WSN)
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering
Expander Graph based Key Distribution Mechanisms in Wireless Sensor Networks
Expander Graph based Key Distribution Mechanisms in Wireless Sensor Networks Seyit Ahmet Çamtepe Computer Science Department Rensselaer Polytechnic Institute Troy, New York 12180 Email: [email protected]
DENIAL OF SERVICE IN WIRELESS SENSOR NETWORKS: ISSUES AND CHALLENGES
In: Advances in Communications and Media Research ISBN 978-1-60876-576-8 Editor: Anthony V. Stavros, pp. 2010 Nova Science Publishers, Inc. Chapter 3 DENIAL OF SERVICE IN WIRELESS SENSOR NETWORKS: ISSUES
Providing End-to-end Secure Communications in Wireless Sensor Networks
1 Providing End-to-end Secure Communications in Wireless Sensor Networks Wenjun Gu, Neelanjana Dutta, Sriram Chellappan and Xiaole Bai Abstract In many Wireless Sensor Networks (WSNs), providing end to
Load-Balancing Enhancement by a Mobile Data Collector in Wireless Sensor Networks
Load-Balancing Enhancement by a Mobile Data Collector in Wireless Sensor Networks Ahmad Patooghy Department of Computer Engineering Iran University of Science & Technology Tehran, Iran [email protected]
ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks
ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks Surjya Ray, Ilker Demirkol and Wendi Heinzelman Department of Electrical and Computer Engineering University of Rochester, Rochester,
A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS
A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS Sumanta Saha, Md. Safiqul Islam, Md. Sakhawat Hossen School of Information and Communication Technology The Royal Institute of Technology (KTH) Stockholm,
3-12 Autonomous Access Control among Nodes in Sensor Networks with Security Policies
3-12 Autonomous Access Control among Nodes in Sensor Networks with Security Policies This paper describes a new framework of policy control sensor networks. Sensor networks are shared by various applications,
End-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich
End-to-End Security in Wireless Sensor (WSNs) Talk by Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich Content 1. Motivation 2. Security Issues and Principles 3. Internet-of-Things and Wireless
A Secure Key Management Scheme in Wireless Mesh Networks
A Secure Key Management Scheme in Wireless Mesh Networks Farah Kandah, Weiyi Zhang, Xiaojiang Du, Yashaswi Singh Department of Computer Science, North Dakota State University, Fargo, ND 585 Department
Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen
Mobile Security Wireless Mesh Network Security Sascha Alexander Jopen Overview Introduction Wireless Ad-hoc Networks Wireless Mesh Networks Security in Wireless Networks Attacks on Wireless Mesh Networks
Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks
21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks Jeongcheol Lee, Euisin
AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION K.Anusha 1, K.Sudha 2 1 M.Tech Student, Dept of CSE, Aurora's Technological
MCTA: Target Tracking Algorithm based on
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE INFOCOM 27 proceedings. MCTA: Target Tracking Algorithm based on
Routing and Transport in Wireless Sensor Networks
Routing and Transport in Wireless Sensor Networks Ibrahim Matta ([email protected]) Niky Riga ([email protected]) Georgios Smaragdakis ([email protected]) Wei Li ([email protected]) Vijay Erramilli ([email protected]) References
Securing MANET Using Diffie Hellman Digital Signature Scheme
Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 [email protected] 2
[email protected] [email protected]
S. Sumathy 1 and B.Upendra Kumar 2 1 School of Computing Sciences, VIT University, Vellore-632 014, Tamilnadu, India [email protected] 2 School of Computing Sciences, VIT University, Vellore-632 014,
Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network
Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network Chandrakant N Bangalore, India [email protected] Abstract Energy efficient load balancing in a Wireless Sensor
International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS) www.iasir.net
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Emerging Technologies in Computational
A Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol
A Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol Vinoda B Dibbad 1, C M Parameshwarappa 2 1 PG Student, Dept of CS&E, STJIT, Ranebennur, Karnataka, India 2 Professor,
A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks
A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks Dajin Wang Department of Computer Science Montclair State University, Upper Montclair, NJ 07043, USA [email protected]
Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks
Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks Ioannis Krontiris, Tassos Dimitriou, Thanassis Giannetsos, and Marios Mpasoukos Athens Information Technology, P.O.Box 68, 19.5 km Markopoulo
Hybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network
International Journal of Computer Applications (975 8887) Volume 4 No.6, July 21 Hybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network Harneet Kour Department of Computer
PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks
PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks Sinem Coleri and Pravin Varaiya Department of Electrical Engineering and Computer Science University of California,
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification LEKSHMI.M.R Department of Computer Science and Engineering, KCG College of Technology Chennai,
Preventing Resource Exhaustion Attacks in Ad Hoc Networks
Preventing Resource Exhaustion Attacks in Ad Hoc Networks Masao Tanabe and Masaki Aida NTT Information Sharing Platform Laboratories, NTT Corporation, 3-9-11, Midori-cho, Musashino-shi, Tokyo 180-8585
Improving Availability of Secure Wireless Sensor Networks
SETIT 2007 4 th International Conference: Sciences of Electronic, Technologies of Information and Telecommunications March 25-29, 2007 TUNISIA Improving Availability of Secure Wireless Sensor Networks
A Catechistic Method for Traffic Pattern Discovery in MANET
A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer
A Dynamically Configurable Topology Control for Hybrid Ad Hoc Networks with Internet Gateways
ynamically onfigurable Topology ontrol for Hybrid d Hoc Networks with Internet ateways eun-hee ho and Young-ae Ko raduate School of Information & ommunication, jou University, Republic of Korea {khzho,
The Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network
The Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network R.Anbarasi 1, S.Gunasekaran 2 P.G. Student, Department of Computer Engineering, V.S.B Engineering College, Karur,
A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks
1 A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks Yang Song, Bogdan Ciubotaru, Member, IEEE, and Gabriel-Miro Muntean, Member, IEEE Abstract Limited battery capacity
Fast and Scalable Key Establishment in. Sensor Networks
Fast and Scalable Key Establishment in 1 Sensor Networks Tassos Dimitriou, Ioannis Krontiris and Fotios Nikakis Athens Information Technology [tdim, ikro, fnik]@ait.gr Abstract We present a protocol for
Wireless Sensor Network: Challenges, Issues and Research
ISBN 978-93-84468-20-0 Proceedings of 2015 International Conference on Future Computational Technologies (ICFCT'2015) Singapore, March 29-30, 2015, pp. 224-228 Wireless Sensor Network: Challenges, Issues
ENHANCED GREEN FIREWALL FOR EFFICIENT DETECTION AND PREVENTION OF MOBILE INTRUDER USING GREYLISTING METHOD
ENHANCED GREEN FIREWALL FOR EFFICIENT DETECTION AND PREVENTION OF MOBILE INTRUDER USING GREYLISTING METHOD G.Pradeep Kumar 1, R.Chakkaravarthy 2, S.Arun kishorre 3, L.S.Sathiyamurthy 4 1- Assistant Professor,
Wireless Network Security 14-814 Spring 2014
Wireless Network Security 14-814 Spring 2014 Patrick Tague Class #8 Broadcast Security & Key Mgmt 1 Announcements 2 Broadcast Communication Wireless networks can leverage the broadcast advantage property
OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM
OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM S. Sofia 1, M.Varghese 2 1 Student, Department of CSE, IJCET 2 Professor, Department of CSE, IJCET Abstract This paper proposes fault node recovery
Adaptive Medium Access Control (MAC) for Heterogeneous Mobile Wireless Sensor Networks (WSNs).
2008 Adaptive Medium Access Control (MAC) for Heterogeneous Mobile Wireless Sensor Networks (WSNs). Giorgio Corbellini 1 Challenges of the Ph.D. Study of urgency in sensed data Study of mobility in WSNs
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,
SECURITY IN WIRELESS SENSOR NETWORKS: KEY MANAGEMENT MODULE IN SOOAWSN
SECURITY IN WIRELESS SENSOR NETWORKS: KEY MANAGEMENT MODULE IN SOOAWSN Mohammed A. Abuhelaleh and Khaled M. Elleithy School of Engineering University Of Bridgeport, Bridgeport, CT {mabuhela, elleithy}
MINIMIZING STORAGE COST IN CLOUD COMPUTING ENVIRONMENT
MINIMIZING STORAGE COST IN CLOUD COMPUTING ENVIRONMENT 1 SARIKA K B, 2 S SUBASREE 1 Department of Computer Science, Nehru College of Engineering and Research Centre, Thrissur, Kerala 2 Professor and Head,
A Survey on Lifetime Maximization of Wireless Sensor Network using Load Balancing
A Survey on Lifetime Maximization of Wireless Sensor Network using Load Balancing Radhika Sarad, Kiran Bhame, Vaibhav Wabale, Amol Katake B.E. Students, Dept. of Computer Engineering, KJCOEMR, Pune, Maharashtra,
Review of Prevention techniques for Denial of Service Attacks in Wireless Sensor Network
Review of Prevention techniques for Denial of Service s in Wireless Sensor Network Manojkumar L Mahajan MTech. student, Acropolis Technical Campus, Indore (MP), India Dushyant Verma Assistant Professor,
Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem
Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem Ernesto Jiménez Caballero Helsinki University of Technology [email protected] Abstract intrusion detection
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS Reza Azizi Engineering Department, Bojnourd Branch, Islamic Azad University, Bojnourd, Iran [email protected]
A SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED
A SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED J Karunamayi 1, Annapurna V K 2 1 Student, Computer Network and Engineering,The National Institute of Engineering, Mysuru,
Optimization Problems in Infrastructure Security
Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 1 Optimization Problems in Infrastructure Security Evangelos Kranakis Carleton University School of Computer Science Ottawa,
SECURITY KEY MANAGEMENT AND AUTHENTICATION SCHEME FOR WIRELESS SENSOR NETWORKS
SECURITY KEY MANAGEMENT AND AUTHENTICATION SCHEME FOR WIRELESS SENSOR NETWORKS S. Jayapraba 1 and A.F.Sheik Hakkani 2 1 Department of MCA, Jayam College of Engineering and Technology, Bharathiyar University,
About the Authors Preface Acknowledgements List of Acronyms
Contents About the Authors Preface Acknowledgements List of Acronyms xiii xv xvii xix Part One Wireless Ad Hoc, Sensor and Mesh Networking 1 1 Introduction 3 1.1 Information Security 4 1.1.1 Computer Security
Wireless sensor network
SECURITY IN WIRELESS SENSOR NETWORKS By ADRIAN PERRIG, JOHN STANKOVIC, and DAVID WAGNER They are susceptible to a variety of attacks, including node capture, physical tampering, and denial of service,
An Efficiency Keyword Search Scheme to improve user experience for Encrypted Data in Cloud
, pp.246-252 http://dx.doi.org/10.14257/astl.2014.49.45 An Efficiency Keyword Search Scheme to improve user experience for Encrypted Data in Cloud Jiangang Shu ab Xingming Sun ab Lu Zhou ab Jin Wang ab
LBN: Load-balancing Network for Data Gathering Wireless Sensor Networks
LBN: Load-balancing Network for Data Gathering Wireless Sensor Networks Wenlu Yang 1, 2, Chongqing Zhang 2, Minglu Li 2 1 Department of Electronic Engineering, Shanghai Maritime University, Shanghai, China
Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257
Wireless Sensor Network Security Seth A. Hellbusch CMPE 257 Wireless Sensor Networks (WSN) 2 The main characteristics of a WSN include: Power consumption constrains for nodes using batteries or energy
CHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE CHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM Mohammad Badruzzama Khan 1, Ayesha Romana 2, Akheel Mohammed
Modified Sensor Deployment Algorithm for Hole Detection and Healing using NS2
RESEARCH ARTICLE OPEN ACCESS Modified Sensor Deployment Algorithm for Hole Detection and Healing using NS2 Vaishnavi Sukumaran, T.P. Saravanabava M.E, College Of Engineering, Guindy, Chennai, India, 2014
Security and Privacy Issues in Wireless Ad Hoc, Mesh, and Sensor Networks
Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 4 (2014), pp. 381-388 Research India Publications http://www.ripublication.com/aeee.htm Security and Privacy Issues in Wireless
