ASSESSING SECURITY RISK FOR WIRELESS SENSOR NETWORKS UNDER CYBER ATTACK

被引:0
作者
Yarbrough, Brian [1 ]
Wagner, Neal [1 ]
机构
[1] MIT, Lincoln Lab, 244 Sood St, Lexington, MA USA
来源
PROCEEDINGS OF THE ANNUAL SIMULATION SYMPOSIUM (ANSS 2018) | 2018年 / 50卷 / 02期
关键词
Wireless sensor networks; Cyber security; Agent-based modeling; Denial of Service cyber attack; Risk assessment; COVERAGE; SERVICE;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
A common deployment strategy for wireless sensor networks is to position sensors according to a probabilistic distribution. Some sensor distributions offer advantages in redundancy, which helps ensure network survivability even with the loss of multiple sensor nodes to cyber attack. Properly selecting an initial sensor deployment distribution mitigates the threat of a denial of service (DoS) attack. While it is clear that some distributions are superior to others, it is not clear how to select the best sensor distribution as a defensive measure. Current strategies rely on mathematical analysis and are restricted to a subset of possible distributions. This paper examines the problem from an experimental perspective. We propose a novel method for evaluating how a given sensor deployment pattern may withstand a DoS attack based on agent-based simulation. We have implemented a first prototype of our model and illustrate its feasibility as part of a future decision support system.
引用
收藏
页数:12
相关论文
共 50 条
  • [21] Security Mechanisms for Wireless Sensor Networks
    Ren, Xiuli
    Yul, Haibin
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (3B): : 155 - 161
  • [22] Security methods for wireless sensor networks
    Ren, Xiuli
    IEEE ICMA 2006: Proceeding of the 2006 IEEE International Conference on Mechatronics and Automation, Vols 1-3, Proceedings, 2006, : 1925 - 1930
  • [23] Detection of Sinkhole Attack in Wireless Sensor Networks
    Salehi, Ahmad S.
    Razzaque, M. A.
    Naraei, Parisa
    Farrokhtala, Ali
    2013 IEEE INTERNATIONAL CONFERENCE ON SPACE SCIENCE AND COMMUNICATION (ICONSPACE), 2013, : 361 - 365
  • [24] Localization for Jamming Attack in Wireless Sensor Networks
    Zhang, Jing
    Xu, Li
    Shen, Qun
    Ji, Xiaorong
    INTELLIGENT DATA ANALYSIS AND APPLICATIONS, 2015, 370 : 361 - 369
  • [25] Assessing Risk Estimations for Cyber-Security Using Expert Judgment
    Krisper, Michael
    Dobaj, Juergen
    Macher, Georg
    SYSTEMS, SOFTWARE AND SERVICES PROCESS IMPROVEMENT (EUROSPI 2020), 2020, 1251 : 120 - 134
  • [26] Energy Optimised Security against Wormhole Attack in IoT-Based Wireless Sensor Networks
    Shahid, Hafsa
    Ashraf, Humaira
    Javed, Hafsa
    Humayun, Mamoona
    Jhanjhi, Nz
    AlZain, Mohammed A.
    CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 68 (02): : 1966 - 1980
  • [27] Reliability of Sensor Nodes in Wireless Sensor Networks of Cyber Physical Systems
    Kabashkin, Igor
    Kundler, Joerg
    ICTE 2016, 2017, 104 : 380 - 384
  • [28] A Real-Time Intelligent Jamming Attack of Wireless Sensor Networks
    Sun, Chaochao
    Wang, Jinsong
    Lu, Peizhong
    JOURNAL OF INTERNET TECHNOLOGY, 2016, 17 (01): : 137 - 145
  • [29] Security Enhancement in Wireless Sensor Networks using Machine Learning
    Raj, Aswathy B.
    Ramesh, Maneesha V.
    Kulkarni, Raghavendra V.
    Hemalatha, T.
    2012 IEEE 14TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS & 2012 IEEE 9TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (HPCC-ICESS), 2012, : 1264 - 1269
  • [30] Exploring coverage and security challenges in wireless sensor networks: A survey
    Moslehi, Mari M.
    COMPUTER NETWORKS, 2025, 260