ASSESSING SECURITY RISK FOR WIRELESS SENSOR NETWORKS UNDER CYBER ATTACK

被引:0
|
作者
Yarbrough, Brian [1 ]
Wagner, Neal [1 ]
机构
[1] MIT, Lincoln Lab, 244 Sood St, Lexington, MA USA
来源
PROCEEDINGS OF THE ANNUAL SIMULATION SYMPOSIUM (ANSS 2018) | 2018年 / 50卷 / 02期
关键词
Wireless sensor networks; Cyber security; Agent-based modeling; Denial of Service cyber attack; Risk assessment; COVERAGE; SERVICE;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
A common deployment strategy for wireless sensor networks is to position sensors according to a probabilistic distribution. Some sensor distributions offer advantages in redundancy, which helps ensure network survivability even with the loss of multiple sensor nodes to cyber attack. Properly selecting an initial sensor deployment distribution mitigates the threat of a denial of service (DoS) attack. While it is clear that some distributions are superior to others, it is not clear how to select the best sensor distribution as a defensive measure. Current strategies rely on mathematical analysis and are restricted to a subset of possible distributions. This paper examines the problem from an experimental perspective. We propose a novel method for evaluating how a given sensor deployment pattern may withstand a DoS attack based on agent-based simulation. We have implemented a first prototype of our model and illustrate its feasibility as part of a future decision support system.
引用
收藏
页数:12
相关论文
共 50 条
  • [1] Smart Meter Performance Under Wired and Wireless Cyber Security Attack
    Kumar, Harsh
    Nnaji, Patrick
    Kumar, Sanjeev
    2024 IEEE 5TH ANNUAL WORLD AI IOT CONGRESS, AIIOT 2024, 2024, : 0061 - 0067
  • [2] Efficient security mechanism to counter the malicious attack in wireless sensor networks
    Sunil Gupta
    Harsh K. Verma
    A. L. Sangal
    CSI Transactions on ICT, 2014, 2 (1) : 35 - 41
  • [3] An Attack Tree based Risk Assessment for Location Privacy in Wireless Sensor Networks
    Jiang, Rong
    Luo, Jun
    Wang, Xiaoping
    2012 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2012,
  • [4] Security approaches for data aggregation in Wireless Sensor Networks against Sybil Attack
    Singh, Surinder
    Saini, Hardeep Singh
    PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 190 - 193
  • [5] Information security assessment of wireless sensor networks based on Bayesian attack graphs
    Chen, You Ying
    Xu, Bing
    Long, Jun
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2021, 41 (03) : 4511 - 4517
  • [6] An Authentication Scheme to Healthcare Security under Wireless Sensor Networks
    Hsiao, Tsung-Chih
    Liao, Yu-Ting
    Huang, Jen-Yan
    Chen, Tzer-Shyong
    Horng, Gwo-Boa
    JOURNAL OF MEDICAL SYSTEMS, 2012, 36 (06) : 3649 - 3664
  • [7] An Authentication Scheme to Healthcare Security under Wireless Sensor Networks
    Tsung-Chih Hsiao
    Yu-Ting Liao
    Jen-Yan Huang
    Tzer-Shyong Chen
    Gwo-Boa Horng
    Journal of Medical Systems, 2012, 36 : 3649 - 3664
  • [8] DWT-based anomaly detection method for cyber security of wireless sensor networks
    Saganowski, Lukasz
    Andrysiak, Tomasz
    Kozik, Rafal
    Choras, Michal
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (15) : 2911 - 2922
  • [9] Firewalling Wireless Sensor Networks: Security by Wireless
    Martinovic, Ivan
    Gollan, Nicos
    Schmitt, Jens B.
    2008 IEEE 33RD CONFERENCE ON LOCAL COMPUTER NETWORKS, VOLS 1 AND 2, 2008, : 753 - 760
  • [10] A Security Framework for Wireless Sensor Networks: Theory and Practice
    Guyeux, Christophe
    Makhoul, Abdallah
    Bahi, Jacques M.
    2014 IEEE 23RD INTERNATIONAL WETICE CONFERENCE (WETICE), 2014, : 269 - 274