Attacks on sensing in hostile wireless sensor-actuator environments

被引:0
作者
Czarlinska, Alexandra [1 ]
Luh, William [1 ]
Kundur, Deepa [1 ]
机构
[1] Texas A&M Univ, Dept ECE, College Stn, TX 77843 USA
来源
GLOBECOM 2007: 2007 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-11 | 2007年
关键词
Wireless Sensor-Actuator Networks (WSANs); competing networks; sensing attacks; security;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Wireless Sensor Networks (WSNs) deployed in hostile environments are susceptible to various attacks directed at their data. In this work we focus on an emerging and largely unexplored issue arising from the presence of actuator (or actor) nodes in the form of Wireless Sensor Actuator Networks (WSANs). Specifically, we consider the case where hostile WSAN nodes belonging to a foreign network directly perturb the readings of WSN nodes during sensing. The attack is modeled as affecting the decision that a WSN node reports about the presence or absence of a phenomenon to its cluster head. To assess the potential loss of sensing fidelity due to the opposing network, we employ a game theoretic analysis. We focus on determining the probability that the WSN cluster head becomes alerted to such an attack given some statistical information about the phenomenon. Our results show that an actuation attack may go unnoticed even if such an attack is not coordinated among the hostile WSAN nodes. Importantly, the number of WSN nodes in a cluster affects the probability of WSAN attack success. For clusters consisting of only a few nodes, the hostile WSAN may achieve a stealthy attack with a wider range of attack parameters. We also determine that natural phenomena with certain characteristics are more susceptible to the attack and require further sensing-verification mechanisms.
引用
收藏
页码:1001 / 1005
页数:5
相关论文
共 10 条
  • [1] AKYILDIZ I, 2004, AD HOC NETW, V2, P3351
  • [2] [Anonymous], **NON-TRADITIONAL**
  • [3] A framework for intelligent sensor network with video camera for structural health monitoring of bridges
    Basharat, A
    Catbas, N
    Shah, M
    [J]. Third IEEE International Conference on Pervasive Computing and Communications, Workshops, 2005, : 385 - 389
  • [4] CZARLINSKA A, 2006, 2 IEEE WORKSH DEP SE, P3
  • [5] CZARLINSKA A, 2007, J COMPUTER IN PRESS
  • [6] Nash equilibria of packet forwarding strategies in wireless ad hoc networks
    Félegyházi, M
    Hubaux, JP
    Buttyán, L
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2006, 5 (05) : 463 - 476
  • [7] Hu F, 2005, GLOB TELECOMM CONF, P1696
  • [8] Hu F, 2005, 2005 IEEE NETWORKING, SENSING AND CONTROL PROCEEDINGS, P850
  • [9] Lin YT, 2005, 2005 International Conference on Wireless Networks, Communications and Mobile Computing, Vols 1 and 2, P975
  • [10] Osborne M. J., 2003, An introduction to game theory