Modeling Node Capture Attacks in Wireless Sensor Networks

被引:32
作者
Tague, Patrick [1 ]
Poovendran, Radha [1 ]
机构
[1] Univ Washington, Dept Elect Engn, NSL, Seattle, WA 98195 USA
来源
2008 46TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING, VOLS 1-3 | 2008年
关键词
D O I
10.1109/ALLERTON.2008.4797699
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We formalize a model for node capture attacks in which an adversary collects information about the network via eavesdropping on the wireless medium and captures nodes based on the learned information. We show that attacks in this adversary model correspond to NP-hard optimization problems and discuss the behavior of a reasonable heuristic algorithm. We show that the goals of node capture attacks can be decomposed into a collection of primitive events, the impact of which can be evaluated and recombined to yield an overall evaluation of the attack. We demonstrate the use of the attack decomposition model for derivation of attack metrics and discuss the potential use of this decomposition technique for the purposes of defense against node capture attacks.
引用
收藏
页码:1221 / 1224
页数:4
相关论文
共 6 条
[1]   A survey on sensor networks [J].
Akyildiz, IF ;
Su, WL ;
Sankarasubramaniam, Y ;
Cayirci, E .
IEEE COMMUNICATIONS MAGAZINE, 2002, 40 (08) :102-114
[2]  
Eschenauer L., 2002, Proceedings of the ACM Conference on Computer and Communications Security, P41, DOI [10.1145/586110.586117, DOI 10.1145/586110.586117]
[3]   Transactional confidentiality in sensor networks [J].
Pai, Sameer ;
Bermudez, Sergio ;
Wicker, Stephen ;
Meingast, Marci ;
Roosta, Tanya ;
Sastry, Shankar ;
Mulligan, Deirdre K. .
IEEE SECURITY & PRIVACY, 2008, 6 (04) :28-35
[4]   Distributed detection of node replication attacks in sensor networks [J].
Parno, B ;
Perrig, A ;
Gligor, V .
2005 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2005, :49-63
[5]   SPINS: Security protocols for sensor networks [J].
Perrig, A ;
Szewczyk, R ;
Tygar, JD ;
Wen, V ;
Culler, DE .
WIRELESS NETWORKS, 2002, 8 (05) :521-534
[6]   Modeling adaptive node capture attacks in multi-hop wireless networks [J].
Tague, Patrick ;
Poovendran, Radha .
AD HOC NETWORKS, 2007, 5 (06) :801-814