Maximizing destructiveness of node capture attack in wireless sensor networks

被引:13
|
作者
Lin, Chi [1 ]
Wu, Guowei [1 ]
Yu, Chang Wu [2 ]
Yao, Lin [1 ]
机构
[1] Dalian Univ Technol, Sch Software, Dalian, Peoples R China
[2] Chung Hua Univ, Dept Comp Sci & Informat Engn, Hsinchu, Taiwan
基金
中国国家自然科学基金;
关键词
Wireless sensor network; Node capture attack; Destructiveness; ALGORITHM; SECURITY;
D O I
10.1007/s11227-015-1435-7
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As a special kind of attack, node capture attack in wireless sensor networks destroys the confidentiality and integrity of network traffic by physically capturing sensor nodes and extracting the cryptographic keys for eavesdropping the communications. However, previous researches pay little attention to the attacking efficiency, which leads to big attacking times and long execution time. In this paper, we propose a graph-based method for modeling the node capture attack on random key pre-distribution scheme. A full graph is constructed to specialize the compromising relationships between nodes and paths, and then the way of evaluating the destructiveness is introduced. The full graph attack (FGA) is designed to ensure the maximum destructiveness of each captured node so as to reduce the attacking times and shorten the execution time, simultaneously. To promote the performance of FGA in attacking efficiency, two optimal attacking algorithms, namely opti-graph attack (OGA) and path covering attack (PCA), are developed. Simulation results show that FGA, OGA and PCA reduce 38, 10 and 51 % attacking times, and enhance 39, 11 and 40 % attacking efficiency than traditional node capture attack methods. Moreover, they save 39, 11 and 50 % energy in compromising the networks.
引用
收藏
页码:3181 / 3212
页数:32
相关论文
共 50 条
  • [1] Maximizing destructiveness of node capture attack in wireless sensor networks
    Chi Lin
    Guowei Wu
    Chang Wu Yu
    Lin Yao
    The Journal of Supercomputing, 2015, 71 : 3181 - 3212
  • [2] Detection of Node Capture Attack in Wireless Sensor Networks
    Agrawal, Sarita
    Das, Manik Lal
    Lopez, Javier
    IEEE SYSTEMS JOURNAL, 2019, 13 (01): : 238 - 247
  • [3] Modeling a node capture attack in a secure Wireless Sensor Networks
    Smache, Meriem
    El Mrabet, Nadia
    Gilquijano, Jesus-Javier.
    Tria, Assia
    Riou, Emmanuel
    Gregory, Chaput
    2016 IEEE 3RD WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2016, : 188 - 193
  • [4] MREA: a minimum resource expenditure node capture attack in wireless sensor networks
    Lin, Chi
    Qiu, Tie
    Obaidat, Mohammad S.
    Yu, Chang Wu
    Yao, Lin
    Wu, Guowei
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 5502 - 5517
  • [5] Node Capture Attack in Wireless Sensor Network: A Survey
    Bharathi, M. Vivekananda
    Tanguturi, Rama Chaithanya
    Jayakumar, C.
    Selvamani, K.
    2012 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2012, : 340 - 342
  • [6] A low-cost node capture attack algorithm for wireless sensor networks
    Lin, Chi
    Wu, Guowei
    Qiu, Tie
    Deng, Jing
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2016, 29 (07) : 1251 - 1268
  • [7] Program Integrity Verification for Detecting Node Capture Attack in Wireless Sensor Network
    Agrawal, Sarita
    Das, Manik Lal
    Mathuria, Anish
    Srivastava, Sanjay
    INFORMATION SYSTEMS SECURITY, (ICISS 2015), 2015, 9478 : 419 - 440
  • [8] IMPACT OF CLONE NODE ATTACK ON WIRELESS SENSOR NETWORKS
    Lalar, Sachin
    Bhushan, Shashi
    Surender
    ADVANCES AND APPLICATIONS IN MATHEMATICAL SCIENCES, 2019, 18 (08): : 731 - 740
  • [9] Improvement of Dependability against Node Capture Attacks for Wireless Sensor Networks
    Kohno, Eitaro
    Ohta, Tomoyuki
    Kakuda, Yoshiaki
    Aida, Masaki
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2011, E94D (01): : 19 - 26
  • [10] Game-Theoretic Analysis of Node Capture and Cloning Attack with Multiple Attackers in Wireless Sensor Networks
    Zhu, Quanyan
    Bushnell, Linda
    Basar, Tamer
    2012 IEEE 51ST ANNUAL CONFERENCE ON DECISION AND CONTROL (CDC), 2012, : 3404 - 3411