Di-Sec: A Distributed Security Framework for Heterogeneous Wireless Sensor Networks

被引:0
作者
Valero, Marco [1 ,2 ]
Jung, Sang Shin [2 ]
Uluagac, A. Selcuk [2 ]
Li, Yingshu [1 ]
Beyah, Raheem [2 ]
机构
[1] Georgia State Univ, Dept Comp Sci, Atlanta, GA 30303 USA
[2] Georgia Inst Technol, Dept ECE, GT CAP Grp, Atlanta, GA 30332 USA
来源
2012 PROCEEDINGS IEEE INFOCOM | 2012年
关键词
Wireless Sensor Network Security; Distributed Security Framework; M-Core Control Language (MCL);
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Wireless Sensor Networks (WSNs) are deployed for monitoring in a range of critical domains (e. g., health care, military, critical infrastructure). Accordingly, these WSNs should be resilient to attacks. The current approach to defending against malicious threats is to develop and deploy a specific defense mechanism for a specific attack. However, the problem with this traditional approach to defending sensor networks is that the solution for the Jamming attack does not defend against other attacks (e. g., Sybil and Selective Forwarding). In reality, one cannot know a priori what type of attack an adversary will launch. This work addresses the challenges with the traditional approach to securing sensor networks and presents a comprehensive framework, Di-Sec, that can defend against all known and forthcoming attacks. At the heart of Di-Sec lies the monitoring core (M-Core), which is an extensible and lightweight layer that gathers statistics relevant for the defense mechanisms. The M-Core allows for the monitoring of both internal and external threats and supports the execution of multiple detection and defense mechanisms (DDMs) against different threats in parallel. Along with Di-Sec, a new user-friendly domain-specific language was developed, the M-Core Control Language (MCL). Using the MCL, a user can implement new defense mechanisms without the overhead of learning the details of the underlying software architecture (i.e., TinyOS, Di-Sec). Hence, the MCL expedites the development of sensor defense mechanisms by significantly simplifying the coding process for developers. The Di-Sec framework has been implemented and tested on real sensors to evaluate its feasibility and performance. Our evaluation of memory, communication, and sensing components shows that Di-Sec is feasible on today's resource-limited sensors and has a nominal overhead. Furthermore, we illustrate the basic functionality of Di-Sec by implementing and simultaneously executing DDMs for attacks at various layers of the communication stack (i.e., Jamming, Selective Forwarding, Sybil, and Internal attacks).
引用
收藏
页码:585 / 593
页数:9
相关论文
共 15 条
  • [1] [Anonymous], AD HOC NETWORKS, DOI DOI 10.1016/S1570-8705(03)00008-8
  • [2] Bort J, 2011, 10 TECHNOLOGIES WILL
  • [3] Fei Hu, 2005, Ad Hoc Networks, V3, P69, DOI 10.1016/j.adhoc.2003.09.009
  • [4] GT-CAP, DI SEC DISTR SEC FRA
  • [5] Huang Y, 2008, IEEE INT C NETW SENS, P1372
  • [6] Iqbal Mudasser, 2009, 7th ACM Conference on Embedded Networked Sensor Systems 2009 (SenSys 09), P401
  • [7] Keung Y., 2010, Proc. of the eleventh ACM international symposium on Mobile ad hoc networking and computing, P11, DOI DOI 10.1145/1860093.1860096
  • [8] Krishnamoorthy P., 2010, AISEC 10
  • [9] A Survey on Jamming Attacks and Countermeasures in WSNs
    Mpitziopoulos, Aristides
    Gavalas, Damianos
    Konstantopoulos, Charalampos
    Pantziou, Grammati
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2009, 11 (04): : 42 - 56
  • [10] Newsome J, 2004, IPSN '04: THIRD INTERNATIONAL SYMPOSIUM ON INFORMATION PROCESSING IN SENSOR NETWORKS, P259