MREA: a minimum resource expenditure node capture attack in wireless sensor networks

被引:6
作者
Lin, Chi [1 ,2 ]
Qiu, Tie [1 ,2 ]
Obaidat, Mohammad S. [3 ]
Yu, Chang Wu [4 ]
Yao, Lin [1 ,2 ]
Wu, Guowei [1 ,2 ]
机构
[1] Dalian Univ Technol, Sch Software, Rd 8, Dalian 116620, Peoples R China
[2] Key Lab Ubiquitous Network & Serv Software Liaoni, Dalian, Peoples R China
[3] Fordham Univ, Dept Comp & Informat Sci, 441 East Fordham Rd,JMH 340, Bronx, NY 10458 USA
[4] Chung Hua Univ, Dept Comp Sci & Informat Engn, Hsinchu, Taiwan
基金
中国国家自然科学基金;
关键词
wireless sensor networks; node capture attack; resource expenditure; destructiveness;
D O I
10.1002/sec.1713
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Because of the stochastic key pre-distribution and complicated network topology, designing an energy-efficient node capture attack algorithm is of great challenge. Although many algorithms have been proposed for node capture attack, previous methods lack of concerning minimizing resource expenditure in modeling attacking behavior. In this paper, we propose a novel way of modeling the node capture attack. First, we transform the problem into a set covering problem with a shortest Hamiltonian cycle problem, which has been shown to be NP-hard. Consequently, we also develop a heuristic called minimum resource expenditure node capture attack (MREA) to maximize destructiveness while minimizing resource expenditure. Moreover, extensive simulations are conducted to show the performance of MREA. Simulation results show that MREA outperforms other algorithms in reducing the attack rounds and saving resource expenditure. Copyright (C) 2016 John Wiley & Sons, Ltd.
引用
收藏
页码:5502 / 5517
页数:16
相关论文
共 43 条
  • [1] Agah A., 2007, INT J NETWORK SECURI, V5, P145
  • [2] Akkaya K., 2005, Ad Hoc Networks, V3, P325, DOI 10.1016/j.adhoc.2003.09.010
  • [3] Wireless sensor networks: a survey
    Akyildiz, IF
    Su, W
    Sankarasubramaniam, Y
    Cayirci, E
    [J]. COMPUTER NETWORKS, 2002, 38 (04) : 393 - 422
  • [4] Routing techniques in wireless sensor networks: A survey
    Al-Karaki, JN
    Kamal, AE
    [J]. IEEE WIRELESS COMMUNICATIONS, 2004, 11 (06) : 6 - 28
  • [5] [Anonymous], 2005, P 6 ACM INT S MOB AD, DOI DOI 10.1145/1062689.1062697
  • [6] [Anonymous], 2004, the third international symposium on Information processing in sensor networks
  • [7] Node Capture Attacks in Wireless Sensor Networks: A System Theoretic Approach
    Bonaci, Tamara
    Bushnell, Linda
    Poovendran, Radha
    [J]. 49TH IEEE CONFERENCE ON DECISION AND CONTROL (CDC), 2010, : 6765 - 6772
  • [8] Chi Lin, 2015, Algorithms and Architectures for Parallel Processing. 15th International Conference, ICA3PP 2015. Proceedings: LNCS 9530, P297, DOI 10.1007/978-3-319-27137-8_23
  • [9] Chi Lin, 2015, Algorithms and Architectures for Parallel Processing. 15th International Conference, ICA3PP 2015. Proceedings: LNCS 9530, P403, DOI 10.1007/978-3-319-27137-8_30
  • [10] De P, 2006, P 2006 INT S WORLD W, P237