A Hybrid Approach for Path Vulnerability Matrix on Random Key Predistribution for Wireless Sensor Networks

被引:11
作者
Ahlawat, Priyanka [1 ]
Dave, Mayank [1 ]
机构
[1] Natl Inst Technol, Dept Comp Engn, Kurukshetra, Haryana, India
关键词
Vulnerability model; Node capture attack; Secure routing; Random key predistribution scheme; ATTACKS; SCHEMES;
D O I
10.1007/s11277-016-3779-6
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In this paper, we address the problem of physical node capture attack from an adversarial view. In this type of attack, an adversary intelligently captures the node(s) and extracts the cryptographic information to destroy the privacy, safety and reliability of the network. We propose a novel hybrid approach for constructing the path vulnerability matrix that maximizes the attacking efficiency and lowers the resource expenditure of the adversary. The main strength of the proposed matrix lies in incorporating various criteria such as the type of application running on the nodes, capturing cost, key dominance ranking, articulation point and intersecting shortest path nodes in estimating the vulnerability. The location of the data sink is considered as a major factor in estimating the vulnerability of the nodes in the network. The proposed matrix is compared with existing attacking strategies in terms of the number of attacking rounds, energy cost and fraction of compromised traffic. Although in this paper, we have considered adversarial point of view but the proposed matrix can be extended for the defender application also. The path vulnerability matrix provides vulnerability estimation that can be used to analyze system security weakness and helps to defend against them effectively and efficiently. The performance of proposed approach has been validated with respect to average path compromise ratio, average routing path length and average route successful ratio. We have also introduced an attack resistant random key predistribution scheme based on the proposed approach and the results confirm its effectiveness in decreasing node capture impact.
引用
收藏
页码:3327 / 3353
页数:27
相关论文
共 31 条
[1]   Wireless sensor networks: a survey [J].
Akyildiz, IF ;
Su, W ;
Sankarasubramaniam, Y ;
Cayirci, E .
COMPUTER NETWORKS, 2002, 38 (04) :393-422
[2]   Vulnerability-constrained multiple minimum cost paths for multi-source wireless sensor networks [J].
An, Wei ;
Ci, Song ;
Luo, Haiyan ;
Han, Yanni ;
Lin, Tao ;
Tang, Ding ;
Qi, Ying .
SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (09) :862-873
[3]   A Novel Hybrid Key Management Scheme for Establishing Secure Communication in Wireless Sensor Networks [J].
Anita, E. A. Mary ;
Geetha, R. ;
Kannan, E. .
WIRELESS PERSONAL COMMUNICATIONS, 2015, 82 (03) :1419-1433
[4]  
[Anonymous], 2002, P 9 ACM C COMPUT COM, DOI DOI 10.1145/586110.586117
[5]   A new class of Hash-Chain based key pre-distribution schemes for WSN [J].
Bechkit, Walid ;
Challal, Yacine ;
Bouabdallah, Abdelmadjid .
COMPUTER COMMUNICATIONS, 2013, 36 (03) :243-255
[6]   Node Capture Attacks in Wireless Sensor Networks: A System Theoretic Approach [J].
Bonaci, Tamara ;
Bushnell, Linda ;
Poovendran, Radha .
49TH IEEE CONFERENCE ON DECISION AND CONTROL (CDC), 2010, :6765-6772
[7]   Random key predistribution schemes for sensor networks [J].
Chan, HW ;
Perrig, A ;
Song, D .
2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, :197-213
[8]  
Chan K., 2011, P SOC PHOTO-OPT INS, V6578, P1
[9]  
Chen X., 2007, EURASIP J WIREL COMM, V2008, P1
[10]  
CORMEN TH, 2001, INTRO ALGORITHMS