Adaptive Network Defense Management for Countering Smart Attack and Selective Capture in Wireless Sensor Networks

被引:8
|
作者
Al-Hamadi, Hamid [1 ]
Chen, Ing-Ray [2 ]
机构
[1] Kuwait Univ, Dept Comp Sci, Khaldiya 13060, Kuwait
[2] Virginia Tech, Dept Comp Sci, Blacksburg, VA 22043 USA
来源
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT | 2015年 / 12卷 / 03期
关键词
Wireless sensor networks; selective capture; smart attack; multipath routing; intrusion tolerance; intrusion detection; MTTF; INTRUSION DETECTION; ENERGY-EFFICIENT; LOCATION PRIVACY; TOLERANCE; ANONYMITY; COVERAGE; AREA;
D O I
10.1109/TNSM.2015.2441059
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We propose and analyze adaptive network defense management for countering smart attack and selective capture which aim to cripple the basic data delivery functionality of a base station based wireless sensor network. With selective capture, the adversaries strategically capture sensors and turn them into inside attackers. With smart attack, an inside attacker is capable of performing random, opportunistic, and insidious attacks to evade detection and maximize their chance of success. We develop a model-based analysis methodology with simulation validation to identify the best defense protocol settings under which the sensor network lifetime is maximized against selective capture and smart attack.
引用
收藏
页码:451 / 466
页数:16
相关论文
共 50 条
  • [31] Sybil Attack Detection Based on RSSI for Wireless Sensor Network
    Wang, Jiangtao
    Yang, Geng
    Sun, Yuan
    Chen, Shengshou
    2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 2684 - 2687
  • [32] Detection of Sinkhole Attack in Wireless Sensor Networks
    Salehi, Ahmad S.
    Razzaque, M. A.
    Naraei, Parisa
    Farrokhtala, Ali
    2013 IEEE INTERNATIONAL CONFERENCE ON SPACE SCIENCE AND COMMUNICATION (ICONSPACE), 2013, : 361 - 365
  • [33] Density-adaptive network reprogramming protocol for wireless sensor networks
    Cho, Sungkyu
    Shin, Hyojeong
    Han, Seungjae
    Cha, Hojung
    Ha, Rhan
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2010, 10 (06) : 857 - 874
  • [34] Localization for Jamming Attack in Wireless Sensor Networks
    Zhang, Jing
    Xu, Li
    Shen, Qun
    Ji, Xiaorong
    INTELLIGENT DATA ANALYSIS AND APPLICATIONS, 2015, 370 : 361 - 369
  • [35] Detecting and forecasting cryptojacking attack trends in Internet of Things and wireless sensor networks devices
    Reddy, C. Kishor Kumar
    Kaza, Vijaya Sindhoori
    Mohana, R. Madana
    Alamer, Abdulrahman
    Alam, Shadab
    Shuaib, Mohammed
    Basudan, Sultan
    Sheneamer, Abdullah
    PEERJ COMPUTER SCIENCE, 2024, 10 : 1 - 35
  • [36] Combine Clustering With Game to Resist Selective Forwarding in Wireless Sensor Networks
    Li, Yuting
    Wu, Yuanming
    IEEE ACCESS, 2020, 8 (08): : 138382 - 138395
  • [37] Adaptive Network Coding Scheme for TCP over Wireless Sensor Networks
    Chan, Y. -C.
    Hu, Y. -Y.
    INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 2013, 8 (06) : 800 - 811
  • [38] Key Management Integrated with Intrusion Detection in Wireless Sensor Networks
    Zhang, Xing
    He, Jingsha
    Wei, Qian
    2009 INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2009), VOLUMES 1 AND 2, 2009, : 744 - +
  • [39] Attack Detection in Wireless Sensor Network: A Big Data Perspective
    Kulkarni, A. V.
    Mithra, V.
    Menon, Radhika
    CYBERNETICS AND SYSTEMS, 2024, 55 (08) : 2512 - 2539
  • [40] Key Management Scheme Based on Nodes Capture Probability for Wireless Sensor Networks
    Zhang, Ying
    Li, Peisong
    PROCEEDINGS OF THE 30TH CHINESE CONTROL AND DECISION CONFERENCE (2018 CCDC), 2018, : 5470 - 5475