Maximizing destructiveness of node capture attack in wireless sensor networks

被引:13
|
作者
Lin, Chi [1 ]
Wu, Guowei [1 ]
Yu, Chang Wu [2 ]
Yao, Lin [1 ]
机构
[1] Dalian Univ Technol, Sch Software, Dalian, Peoples R China
[2] Chung Hua Univ, Dept Comp Sci & Informat Engn, Hsinchu, Taiwan
基金
中国国家自然科学基金;
关键词
Wireless sensor network; Node capture attack; Destructiveness; ALGORITHM; SECURITY;
D O I
10.1007/s11227-015-1435-7
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As a special kind of attack, node capture attack in wireless sensor networks destroys the confidentiality and integrity of network traffic by physically capturing sensor nodes and extracting the cryptographic keys for eavesdropping the communications. However, previous researches pay little attention to the attacking efficiency, which leads to big attacking times and long execution time. In this paper, we propose a graph-based method for modeling the node capture attack on random key pre-distribution scheme. A full graph is constructed to specialize the compromising relationships between nodes and paths, and then the way of evaluating the destructiveness is introduced. The full graph attack (FGA) is designed to ensure the maximum destructiveness of each captured node so as to reduce the attacking times and shorten the execution time, simultaneously. To promote the performance of FGA in attacking efficiency, two optimal attacking algorithms, namely opti-graph attack (OGA) and path covering attack (PCA), are developed. Simulation results show that FGA, OGA and PCA reduce 38, 10 and 51 % attacking times, and enhance 39, 11 and 40 % attacking efficiency than traditional node capture attack methods. Moreover, they save 39, 11 and 50 % energy in compromising the networks.
引用
收藏
页码:3181 / 3212
页数:32
相关论文
共 50 条
  • [31] Early and Lightweight Distributed Detection of Node Replication Attack in Sensor Networks
    Thanh Dai Tran
    Agbinya, Johnson I.
    2010 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC 2010), 2010,
  • [32] Securing wireless sensor network from node capture attack using an efficient optimization defense strategy model
    Gupta, Amara S. A. L. G. Gopala
    Gudapati, Syam Prasad
    Tumuluru, Praveen
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2023, 26 (05) : 1457 - 1472
  • [33] Comprehensive analysis on sensor node fault management schemes in wireless sensor networks
    Babu, Nagarajan
    Kumar, Sripathi Venkata Naga Santhosh
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2022, 35 (18)
  • [34] Maximizing Network Lifetime in Many-to-One Wireless Sensor Networks (WSNs)
    Asadollahi, Hassan
    Zandi, Saman
    Asharioun, Hadi
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 123 (04) : 2971 - 2983
  • [35] PREVENTING NODE REPLICATION ATTACK IN STATIC WIRELESS SENSOR NETWROKS
    Singh, Moirangthem Marjit
    Singh, Ankita
    Mandal, Jyotsana Kumar
    2014 3RD INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (ICRITO) (TRENDS AND FUTURE DIRECTIONS), 2014,
  • [36] Maximizing network lifetime using coverage sets scheduling in wireless sensor networks
    Luo, Chuanwen
    Hong, Yi
    Li, Deying
    Wang, Yongcai
    Chen, Wenping
    Hu, Qian
    AD HOC NETWORKS, 2020, 98
  • [37] Detection of Node Failure in Wireless Sensor Networks
    Rehena, Zeenat
    Mukherjee, Rajesh
    Roy, Sarbani
    Mukherjee, Nandini
    2014 APPLICATIONS AND INNOVATIONS IN MOBILE COMPUTING (AIMOC), 2014, : 133 - 138
  • [38] Robust Node Positioning in Wireless Sensor Networks
    Ye, Ayong
    Ma, Jianfeng
    Jiang, Xiaohong
    Horiguchi, Susumu
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2009, E92B (06) : 2023 - 2031
  • [39] Distributed Node Authentication in Wireless Sensor Networks
    Zhang, Qiyuan
    Zhou, Xuehai
    Yang, Feng
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 3361 - 3364
  • [40] Design of Wireless Sensor Networks Node in Coalmine
    Tian, Feng
    Xu, Xiaowu
    ICICTA: 2009 SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION, VOL IV, PROCEEDINGS, 2009, : 66 - 69