Sunho Lim, Cong Pu, Jinseok Chae, Manki Min, Yi Liu
{"title":"隐藏和检测:能量收集驱动网络中的转发错误行为、攻击和对策","authors":"Sunho Lim, Cong Pu, Jinseok Chae, Manki Min, Yi Liu","doi":"10.1049/pbce124e_ch12","DOIUrl":null,"url":null,"abstract":"Multi-scale, heterogeneous, and battery-powered Internet-of-Things (IoT) sensors and devices (later in short, nodes) have been widely deployed in diverse applications and networks. Due to the limited amount of battery energy, energy harvestingmotivated networks (EHNets) powered by immediate environmental resources are increasingly popular and rapidly emerging as the next generation of ubiquitous communication infrastructure. However, EHNets are admittedly vulnerable to a denial-of-service (DoS) attack because of the shared medium, centralized coordination, and limited computing and communicating capabilities. Because of inherent resource constraints, EHNets seldom deploying conventional heavy-weight cryptographic techniques and secure algorithms and protocols. In light of these, we first investigate energy harvesting-based networking operations and applications. Second, we analyze the different types of forwarding misbehavior and attack caused by malicious nodes and their corresponding detection strategies. We introduce a set of adversarial scenarios and visualize its communication activities to capture vulnerable scenarios and potential malicious nodes. Here, single and multiple malicious nodes colluding together are considered. Lastly, we comprehensively compare the detection strategies of forwarding misbehavior by considering six perspectives and provide future research directions with interdisciplinary points of view. TWISTOR: TTU Wireless Mobile Networking Laboratory, Department of Computer Science, Texas Tech University, Lubbock, USA Department of Computer Sciences and Electrical Engineering, College of Engineering and Computer Sciences, Marshall University, Huntington, USA Department of Computer Science and Engineering, Incheon National University, Incheon, South Korea Computer Science Program, Louisiana Tech University, Ruston, USA Department of Computer and Information Science, University of Massachusetts, Dartmouth, USA","PeriodicalId":394526,"journal":{"name":"Energy Harvesting in Wireless Sensor Networks and Internet of Things","volume":"21 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Hide-and-detect: forwarding misbehaviors, attacks, and countermeasures in energy harvesting-motivated networks\",\"authors\":\"Sunho Lim, Cong Pu, Jinseok Chae, Manki Min, Yi Liu\",\"doi\":\"10.1049/pbce124e_ch12\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Multi-scale, heterogeneous, and battery-powered Internet-of-Things (IoT) sensors and devices (later in short, nodes) have been widely deployed in diverse applications and networks. Due to the limited amount of battery energy, energy harvestingmotivated networks (EHNets) powered by immediate environmental resources are increasingly popular and rapidly emerging as the next generation of ubiquitous communication infrastructure. However, EHNets are admittedly vulnerable to a denial-of-service (DoS) attack because of the shared medium, centralized coordination, and limited computing and communicating capabilities. Because of inherent resource constraints, EHNets seldom deploying conventional heavy-weight cryptographic techniques and secure algorithms and protocols. In light of these, we first investigate energy harvesting-based networking operations and applications. Second, we analyze the different types of forwarding misbehavior and attack caused by malicious nodes and their corresponding detection strategies. We introduce a set of adversarial scenarios and visualize its communication activities to capture vulnerable scenarios and potential malicious nodes. Here, single and multiple malicious nodes colluding together are considered. Lastly, we comprehensively compare the detection strategies of forwarding misbehavior by considering six perspectives and provide future research directions with interdisciplinary points of view. TWISTOR: TTU Wireless Mobile Networking Laboratory, Department of Computer Science, Texas Tech University, Lubbock, USA Department of Computer Sciences and Electrical Engineering, College of Engineering and Computer Sciences, Marshall University, Huntington, USA Department of Computer Science and Engineering, Incheon National University, Incheon, South Korea Computer Science Program, Louisiana Tech University, Ruston, USA Department of Computer and Information Science, University of Massachusetts, Dartmouth, USA\",\"PeriodicalId\":394526,\"journal\":{\"name\":\"Energy Harvesting in Wireless Sensor Networks and Internet of Things\",\"volume\":\"21 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Energy Harvesting in Wireless Sensor Networks and Internet of Things\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1049/pbce124e_ch12\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Energy Harvesting in Wireless Sensor Networks and Internet of Things","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1049/pbce124e_ch12","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Hide-and-detect: forwarding misbehaviors, attacks, and countermeasures in energy harvesting-motivated networks
Multi-scale, heterogeneous, and battery-powered Internet-of-Things (IoT) sensors and devices (later in short, nodes) have been widely deployed in diverse applications and networks. Due to the limited amount of battery energy, energy harvestingmotivated networks (EHNets) powered by immediate environmental resources are increasingly popular and rapidly emerging as the next generation of ubiquitous communication infrastructure. However, EHNets are admittedly vulnerable to a denial-of-service (DoS) attack because of the shared medium, centralized coordination, and limited computing and communicating capabilities. Because of inherent resource constraints, EHNets seldom deploying conventional heavy-weight cryptographic techniques and secure algorithms and protocols. In light of these, we first investigate energy harvesting-based networking operations and applications. Second, we analyze the different types of forwarding misbehavior and attack caused by malicious nodes and their corresponding detection strategies. We introduce a set of adversarial scenarios and visualize its communication activities to capture vulnerable scenarios and potential malicious nodes. Here, single and multiple malicious nodes colluding together are considered. Lastly, we comprehensively compare the detection strategies of forwarding misbehavior by considering six perspectives and provide future research directions with interdisciplinary points of view. TWISTOR: TTU Wireless Mobile Networking Laboratory, Department of Computer Science, Texas Tech University, Lubbock, USA Department of Computer Sciences and Electrical Engineering, College of Engineering and Computer Sciences, Marshall University, Huntington, USA Department of Computer Science and Engineering, Incheon National University, Incheon, South Korea Computer Science Program, Louisiana Tech University, Ruston, USA Department of Computer and Information Science, University of Massachusetts, Dartmouth, USA