Adaptive Network Defense Management for Countering Smart Attack and Selective Capture in Wireless Sensor Networks

被引:8
|
作者
Al-Hamadi, Hamid [1 ]
Chen, Ing-Ray [2 ]
机构
[1] Kuwait Univ, Dept Comp Sci, Khaldiya 13060, Kuwait
[2] Virginia Tech, Dept Comp Sci, Blacksburg, VA 22043 USA
来源
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT | 2015年 / 12卷 / 03期
关键词
Wireless sensor networks; selective capture; smart attack; multipath routing; intrusion tolerance; intrusion detection; MTTF; INTRUSION DETECTION; ENERGY-EFFICIENT; LOCATION PRIVACY; TOLERANCE; ANONYMITY; COVERAGE; AREA;
D O I
10.1109/TNSM.2015.2441059
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We propose and analyze adaptive network defense management for countering smart attack and selective capture which aim to cripple the basic data delivery functionality of a base station based wireless sensor network. With selective capture, the adversaries strategically capture sensors and turn them into inside attackers. With smart attack, an inside attacker is capable of performing random, opportunistic, and insidious attacks to evade detection and maximize their chance of success. We develop a model-based analysis methodology with simulation validation to identify the best defense protocol settings under which the sensor network lifetime is maximized against selective capture and smart attack.
引用
收藏
页码:451 / 466
页数:16
相关论文
共 50 条
  • [1] Adaptive Network Management for Countering Selective Capture in Wireless Sensor Networks
    Al-Hamadi, Hamid
    Chen, Ing-Ray
    2013 9TH INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE MANAGEMENT (CNSM), 2013, : 203 - 210
  • [2] A Cross-Layer Defense Scheme for Countering Traffic Analysis Attacks in Wireless Sensor Networks
    Ward, Jon R.
    Younis, Mohamed
    2015 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2015), 2015, : 972 - 977
  • [3] Research on Selective Forwarding Attack Detection Scheme in Wireless Sensor Networks
    Wang, Ying
    Li, Guorui
    MATERIALS SCIENCE AND INFORMATION TECHNOLOGY, PTS 1-8, 2012, 433-440 : 5298 - +
  • [4] Node Capture Attack in Wireless Sensor Network: A Survey
    Bharathi, M. Vivekananda
    Tanguturi, Rama Chaithanya
    Jayakumar, C.
    Selvamani, K.
    2012 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2012, : 340 - 342
  • [5] Fuzzy-Based Adaptive Countering Method against False Data Injection Attacks in Wireless Sensor Networks
    Lee, Hae Young
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2015, E98D (04): : 964 - 967
  • [6] Attack Resilient Wireless Sensor Networks for Smart Electric Vehicles
    Rana M.M.
    Rana, Md Masud (mrana928@yahoo.com), 1600, Institute of Electrical and Electronics Engineers Inc. (01):
  • [7] Securing wireless sensor network from node capture attack using an efficient optimization defense strategy model
    Gupta, Amara S. A. L. G. Gopala
    Gudapati, Syam Prasad
    Tumuluru, Praveen
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2023, 26 (05) : 1457 - 1472
  • [8] Adaptive Trust Management Protocol based on Intrusion Detection for Wireless Sensor Networks
    Gheorghe, Laura
    Rughinis, Razvan
    Tataroiu, Razvan
    2013 ROEDUNET INTERNATIONAL CONFERENCE: NETWORKING IN EDUCATION AND RESEARCH, 12TH EDITION, 2013,
  • [9] Accurate detection of selective forwarding attack in wireless sensor networks
    Zhang, Qiong
    Zhang, Wenzheng
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2019, 15 (01)
  • [10] Hybrid Convolutional Neural Network for Robust Attack Detection in Wireless Sensor Networks
    Sharma, Kanta Prasad
    Hussain, Rifat
    Jaharadak, Adam Amril
    Trawnih, Ali Ahmad
    Verma, Deekhsha
    Dasi, Shivakrishna
    Pant, Shivani
    INTERNET TECHNOLOGY LETTERS, 2025,