Code Attestation Based Intrusion Detection System for Compression Attack in Wireless Sensor Networks

被引:0
作者
Surti, Neelam A. [1 ]
Jinwala, Devesh C. [2 ]
机构
[1] CK Pithawalla Coll Engn & Technol, Dept Comp Engn, Via Magdalla Port,Dumas Rd, Surat 395007, Gujarat, India
[2] SV Natl Inst Technol, Dept Comp Engn, Surat 395007, Gujarat, India
来源
JOURNAL OF INFORMATION ASSURANCE AND SECURITY | 2015年 / 10卷 / 05期
关键词
Wireless Sensor Networks; Intrusion Detection System; Code Attestation; Compression; Checksum; Attacks;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
These days, the Wireless Sensor Networks (WSNs) find potentially versatile applications in diverse areas ranging from environment monitoring, defense, industrial process monitoring and control, homeland securities and many more. Critical data flow is inherently present in these applications and despite all the inbuilt measures for ensuring network and information security, adversarial intrusions cannot be ruled out. Hence, such systems require sound intrusion detection and prevention mechanisms that work efficiently in resource constrained sensor nodes, too. One of the methods of doing so is to periodically check the prover sensor nodes for any alteration in its code/data as compared to the same when originally deployed by the verifier sensor node. This is known as code/data attestation; useful in verifying the program integrity of nodes in such networks. Our focus here is on software based remote code attestation. Software based code attestation techniques are vulnerable to various attacks. We focus on compression attack, and propose a scheme for mitigating the same, here. To withstand the compression attacks, the original program code is compressed and fresh random noise is inserted within the available free space. In existing attestation algorithms the fresh random noise is generated by the verifier and sent to the prover sensor node in numerous packets. Here we utilize the random challenge sent by the verifier to generate the fresh random noise at the prover node. Hence, we propose an algorithm that withstands the compression attack at lesser communication overhead compared to the existing attestation algorithms.
引用
收藏
页码:209 / 216
页数:8
相关论文
共 50 条
  • [41] Policy and Network-based Intrusion Detection System for IPv6-enabled Wireless Sensor Networks
    Amaral, Joao P.
    Oliveira, Luis M.
    Rodrigues, Joel J. P. C.
    Han, Guangjie
    Shu, Lei
    2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2014, : 1796 - 1801
  • [42] A Protocol Layer Trust-Based Intrusion Detection Scheme for Wireless Sensor Networks
    Wang, Jian
    Jiang, Shuai
    Fapojuwo, Abraham O.
    SENSORS, 2017, 17 (06):
  • [43] Intrusion Detection and Prevention Based on State Context and Hierarchical Trust in Wireless Sensor Networks
    Maidhili, Siri R.
    Karthik, G. M.
    2018 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2018,
  • [44] AGENT-BASED INTRUSION DETECTION AND SELF-RECOVERY SYSTEM FOR WIRELESS SENSOR NETWORKS
    Sun, Ting
    Liu, Xingchuan
    2013 5TH IEEE INTERNATIONAL CONFERENCE ON BROADBAND NETWORK & MULTIMEDIA TECHNOLOGY (IC-BNMT), 2013, : 206 - 210
  • [45] Detection of Sinkhole Attack in Wireless Sensor Networks
    Salehi, Ahmad S.
    Razzaque, M. A.
    Naraei, Parisa
    Farrokhtala, Ali
    2013 IEEE INTERNATIONAL CONFERENCE ON SPACE SCIENCE AND COMMUNICATION (ICONSPACE), 2013, : 361 - 365
  • [46] A novel Rule Based Intrusion Detection Framework for Wireless Sensor Networks
    Eswari, T.
    Vanitha, V.
    2013 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2013, : 1019 - 1022
  • [47] An Intrusion Detection Model Based on Danger Theory for Wireless Sensor Networks
    Li, Linlin
    Sun, Liangxu
    Wang, Gang
    INTERNATIONAL JOURNAL OF ONLINE ENGINEERING, 2018, 14 (09) : 53 - 65
  • [48] Intrusion Detection using NBHoeffding Rule based Decision Tree for Wireless Sensor Networks
    Geetha, S.
    Dulhare, Uma N.
    Sindhu, Siva S. Sivatha
    2018 SECOND INTERNATIONAL CONFERENCE ON ADVANCES IN ELECTRONICS, COMPUTERS AND COMMUNICATIONS (ICAECC), 2018,
  • [49] TPM-Based Remote Attestation for Wireless Sensor Networks
    Donglai Fu
    Xinguang Peng
    TsinghuaScienceandTechnology, 2016, 21 (03) : 312 - 321
  • [50] Improved binary gray wolf optimizer and SVM for intrusion detection system in wireless sensor networks
    Safaldin, Mukaram
    Otair, Mohammed
    Abualigah, Laith
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (02) : 1559 - 1576