Code Attestation Based Intrusion Detection System for Compression Attack in Wireless Sensor Networks

被引:0
作者
Surti, Neelam A. [1 ]
Jinwala, Devesh C. [2 ]
机构
[1] CK Pithawalla Coll Engn & Technol, Dept Comp Engn, Via Magdalla Port,Dumas Rd, Surat 395007, Gujarat, India
[2] SV Natl Inst Technol, Dept Comp Engn, Surat 395007, Gujarat, India
来源
JOURNAL OF INFORMATION ASSURANCE AND SECURITY | 2015年 / 10卷 / 05期
关键词
Wireless Sensor Networks; Intrusion Detection System; Code Attestation; Compression; Checksum; Attacks;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
These days, the Wireless Sensor Networks (WSNs) find potentially versatile applications in diverse areas ranging from environment monitoring, defense, industrial process monitoring and control, homeland securities and many more. Critical data flow is inherently present in these applications and despite all the inbuilt measures for ensuring network and information security, adversarial intrusions cannot be ruled out. Hence, such systems require sound intrusion detection and prevention mechanisms that work efficiently in resource constrained sensor nodes, too. One of the methods of doing so is to periodically check the prover sensor nodes for any alteration in its code/data as compared to the same when originally deployed by the verifier sensor node. This is known as code/data attestation; useful in verifying the program integrity of nodes in such networks. Our focus here is on software based remote code attestation. Software based code attestation techniques are vulnerable to various attacks. We focus on compression attack, and propose a scheme for mitigating the same, here. To withstand the compression attacks, the original program code is compressed and fresh random noise is inserted within the available free space. In existing attestation algorithms the fresh random noise is generated by the verifier and sent to the prover sensor node in numerous packets. Here we utilize the random challenge sent by the verifier to generate the fresh random noise at the prover node. Hence, we propose an algorithm that withstands the compression attack at lesser communication overhead compared to the existing attestation algorithms.
引用
收藏
页码:209 / 216
页数:8
相关论文
共 50 条
  • [31] Lightweight energy consumption-based intrusion detection system for wireless sensor networks
    Michael Riecker
    Sebastian Biedermann
    Rachid El Bansarkhani
    Matthias Hollick
    International Journal of Information Security, 2015, 14 : 155 - 167
  • [32] An Instance-Learning-Based Intrusion-Detection System for Wireless Sensor Networks
    Shuai Fu
    Xiaoyan Wang
    Jie Li
    ZTE Communications, 2015, 13 (02) : 7 - 11
  • [33] An efficient intrusion detection framework in cluster-based wireless sensor networks
    Sedjelmaci, Hichem
    Senouci, Sidi Mohammed
    Feham, Mohammed
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (10) : 1211 - 1224
  • [34] Lightweight energy consumption-based intrusion detection system for wireless sensor networks
    Riecker, Michael
    Biedermann, Sebastian
    El Bansarkhani, Rachid
    Hollick, Matthias
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2015, 14 (02) : 155 - 167
  • [35] An Intrusion Detection Algorithm for Wireless Sensor Networks
    Eissa, Alaa
    Zied, Samir
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2015, 15 (11): : 80 - 85
  • [36] Securing Wireless Sensor Networks Enabled Logistics Using a Hybrid Intrusion Detection System
    Mushtaq, Hammad
    Ali, Syed Nouman
    Rasheed, Haroon
    Ramish, Asher
    PROCEEDINGS OF THE 14TH INTERNATIONAL CONFERENCE ON INNOVATION AND MANAGEMENT, VOLS I & II, 2017, : 921 - 925
  • [37] Attestation in Wireless Sensor Networks: A Survey
    Steiner, Rodrigo Vieira
    Lupu, Emil
    ACM COMPUTING SURVEYS, 2016, 49 (03)
  • [38] Secure deep learning-based energy efficient routing with intrusion detection system for wireless sensor networks
    Sakthimohan M.
    Deny J.
    Elizabeth Rani G.
    Journal of Intelligent and Fuzzy Systems, 2024, 46 (04) : 8587 - 8603
  • [39] Optimal Activation of Intrusion Detection Agents for Wireless Sensor Networks
    Ponomarchuk, Yulia
    Seo, Dae-Wha
    UBICOMM 2010: THE FOURTH INTERNATIONAL CONFERENCE ON MOBILE UBIQUITOUS COMPUTING, SYSTEMS, SERVICES AND TECHNOLOGIES, 2010, : 17 - 20
  • [40] On the Reliability of Wireless Sensors with Software-based Attestation for Intrusion Detection
    Chen, Ing-Ray
    Wang, Ding-Chau
    2009 10TH INTERNATIONAL SYMPOSIUM ON PERVASIVE SYSTEMS, ALGORITHMS, AND NETWORKS (ISPAN 2009), 2009, : 184 - +