Maximizing destructiveness of node capture attack in wireless sensor networks

被引:13
|
作者
Lin, Chi [1 ]
Wu, Guowei [1 ]
Yu, Chang Wu [2 ]
Yao, Lin [1 ]
机构
[1] Dalian Univ Technol, Sch Software, Dalian, Peoples R China
[2] Chung Hua Univ, Dept Comp Sci & Informat Engn, Hsinchu, Taiwan
基金
中国国家自然科学基金;
关键词
Wireless sensor network; Node capture attack; Destructiveness; ALGORITHM; SECURITY;
D O I
10.1007/s11227-015-1435-7
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As a special kind of attack, node capture attack in wireless sensor networks destroys the confidentiality and integrity of network traffic by physically capturing sensor nodes and extracting the cryptographic keys for eavesdropping the communications. However, previous researches pay little attention to the attacking efficiency, which leads to big attacking times and long execution time. In this paper, we propose a graph-based method for modeling the node capture attack on random key pre-distribution scheme. A full graph is constructed to specialize the compromising relationships between nodes and paths, and then the way of evaluating the destructiveness is introduced. The full graph attack (FGA) is designed to ensure the maximum destructiveness of each captured node so as to reduce the attacking times and shorten the execution time, simultaneously. To promote the performance of FGA in attacking efficiency, two optimal attacking algorithms, namely opti-graph attack (OGA) and path covering attack (PCA), are developed. Simulation results show that FGA, OGA and PCA reduce 38, 10 and 51 % attacking times, and enhance 39, 11 and 40 % attacking efficiency than traditional node capture attack methods. Moreover, they save 39, 11 and 50 % energy in compromising the networks.
引用
收藏
页码:3181 / 3212
页数:32
相关论文
共 50 条
  • [41] Node Localization Techniques in Wireless Sensor Networks
    Zheng, Jun-gang
    Zhao, De-ping
    Chen, Zhong-tang
    INTERNATIONAL CONFERENCE ON CONTROL AND AUTOMATION (ICCA 2016), 2016, : 379 - 383
  • [42] Detecting node replication attacks in wireless sensor networks: A survey
    Zhu, Wen Tao
    Zhou, Jianying
    Deng, Robert H.
    Bao, Feng
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (03) : 1022 - 1034
  • [43] Node depth Representation-based Evolutionary Multitasking Optimization for Maximizing the Network Lifetime of Wireless Sensor Networks
    Dao, Tran Cong
    Tam, Nguyen Thi
    Binh, Huynh Thi Thanh
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2024, 128
  • [44] Approaches and Measures to Detect Wormhole Attack in Wireless Sensor Networks: A Survey
    Giri, Diksha
    Borah, Samarjeet
    Pradhan, Ratika
    ADVANCES IN COMMUNICATION, DEVICES AND NETWORKING, 2018, 462 : 855 - 864
  • [45] Securing Broadcast Authentication in Wireless Sensor Networks Against DoS Attack
    Alghamdi, Ahmed
    Arozullah, Mohammed
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2015, 15 (04): : 8 - 18
  • [46] Sinkhole attack detection and avoidance mechanism for RPL in wireless sensor networks
    Jamil A.
    Ali M.Q.
    Abd Alkhalec M.E.
    Annals of Emerging Technologies in Computing, 2021, 5 (Special issue 5) : 94 - 101
  • [47] Scrutinising well-known countermeasures against clone node attack in mobile wireless sensor networks
    Khan, Wazir Zada
    Saad, Mohamad Naufal bin Mohamad
    Aalsalem, Mohammed Y.
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2013, 4 (2-3) : 119 - 127
  • [48] Maximizing the Lifetime of Wireless Sensor Networks with the Base Station Location
    Nguyen Thanh Tung
    Dinh Ha Ly
    Huynh Thi Thanh Binh
    NATURE OF COMPUTATION AND COMMUNICATION, 2015, 144 : 108 - 116
  • [49] Detection of clone node attack in mobile wireless sensor network with optimised cost function
    Ansari, Mohammad Hassan
    Vakili, Vahid Tabataba
    INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2017, 24 (03) : 149 - 159
  • [50] Particle swarm optimization for maximizing lifetime of wireless sensor networks
    Azharuddin, Md
    Jana, Prasanta K.
    COMPUTERS & ELECTRICAL ENGINEERING, 2016, 51 : 26 - 42