隐藏和检测:能量收集驱动网络中的转发错误行为、攻击和对策

Sunho Lim, Cong Pu, Jinseok Chae, Manki Min, Yi Liu
{"title":"隐藏和检测:能量收集驱动网络中的转发错误行为、攻击和对策","authors":"Sunho Lim, Cong Pu, Jinseok Chae, Manki Min, Yi Liu","doi":"10.1049/pbce124e_ch12","DOIUrl":null,"url":null,"abstract":"Multi-scale, heterogeneous, and battery-powered Internet-of-Things (IoT) sensors and devices (later in short, nodes) have been widely deployed in diverse applications and networks. Due to the limited amount of battery energy, energy harvestingmotivated networks (EHNets) powered by immediate environmental resources are increasingly popular and rapidly emerging as the next generation of ubiquitous communication infrastructure. However, EHNets are admittedly vulnerable to a denial-of-service (DoS) attack because of the shared medium, centralized coordination, and limited computing and communicating capabilities. Because of inherent resource constraints, EHNets seldom deploying conventional heavy-weight cryptographic techniques and secure algorithms and protocols. In light of these, we first investigate energy harvesting-based networking operations and applications. Second, we analyze the different types of forwarding misbehavior and attack caused by malicious nodes and their corresponding detection strategies. We introduce a set of adversarial scenarios and visualize its communication activities to capture vulnerable scenarios and potential malicious nodes. Here, single and multiple malicious nodes colluding together are considered. Lastly, we comprehensively compare the detection strategies of forwarding misbehavior by considering six perspectives and provide future research directions with interdisciplinary points of view. TWISTOR: TTU Wireless Mobile Networking Laboratory, Department of Computer Science, Texas Tech University, Lubbock, USA Department of Computer Sciences and Electrical Engineering, College of Engineering and Computer Sciences, Marshall University, Huntington, USA Department of Computer Science and Engineering, Incheon National University, Incheon, South Korea Computer Science Program, Louisiana Tech University, Ruston, USA Department of Computer and Information Science, University of Massachusetts, Dartmouth, USA","PeriodicalId":394526,"journal":{"name":"Energy Harvesting in Wireless Sensor Networks and Internet of Things","volume":"21 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Hide-and-detect: forwarding misbehaviors, attacks, and countermeasures in energy harvesting-motivated networks\",\"authors\":\"Sunho Lim, Cong Pu, Jinseok Chae, Manki Min, Yi Liu\",\"doi\":\"10.1049/pbce124e_ch12\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Multi-scale, heterogeneous, and battery-powered Internet-of-Things (IoT) sensors and devices (later in short, nodes) have been widely deployed in diverse applications and networks. Due to the limited amount of battery energy, energy harvestingmotivated networks (EHNets) powered by immediate environmental resources are increasingly popular and rapidly emerging as the next generation of ubiquitous communication infrastructure. However, EHNets are admittedly vulnerable to a denial-of-service (DoS) attack because of the shared medium, centralized coordination, and limited computing and communicating capabilities. Because of inherent resource constraints, EHNets seldom deploying conventional heavy-weight cryptographic techniques and secure algorithms and protocols. In light of these, we first investigate energy harvesting-based networking operations and applications. Second, we analyze the different types of forwarding misbehavior and attack caused by malicious nodes and their corresponding detection strategies. We introduce a set of adversarial scenarios and visualize its communication activities to capture vulnerable scenarios and potential malicious nodes. Here, single and multiple malicious nodes colluding together are considered. Lastly, we comprehensively compare the detection strategies of forwarding misbehavior by considering six perspectives and provide future research directions with interdisciplinary points of view. TWISTOR: TTU Wireless Mobile Networking Laboratory, Department of Computer Science, Texas Tech University, Lubbock, USA Department of Computer Sciences and Electrical Engineering, College of Engineering and Computer Sciences, Marshall University, Huntington, USA Department of Computer Science and Engineering, Incheon National University, Incheon, South Korea Computer Science Program, Louisiana Tech University, Ruston, USA Department of Computer and Information Science, University of Massachusetts, Dartmouth, USA\",\"PeriodicalId\":394526,\"journal\":{\"name\":\"Energy Harvesting in Wireless Sensor Networks and Internet of Things\",\"volume\":\"21 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Energy Harvesting in Wireless Sensor Networks and Internet of Things\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1049/pbce124e_ch12\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Energy Harvesting in Wireless Sensor Networks and Internet of Things","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1049/pbce124e_ch12","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

多尺度、异构、电池供电的物联网(IoT)传感器和设备(以下简称节点)已经广泛部署在各种应用和网络中。由于电池能量有限,由即时环境资源驱动的能量收集驱动网络(EHNets)越来越受欢迎,并迅速成为下一代无处不在的通信基础设施。然而,由于共享媒介、集中协调以及有限的计算和通信能力,EHNets很容易受到拒绝服务(DoS)攻击。由于固有的资源限制,EHNets很少部署传统的重量级加密技术和安全算法和协议。鉴于此,我们首先研究了基于能量收集的网络操作和应用。其次,分析了由恶意节点引起的不同类型的转发不当行为和攻击,以及相应的检测策略。我们引入了一组对抗场景,并可视化其通信活动,以捕获易受攻击的场景和潜在的恶意节点。这里考虑了单个和多个恶意节点串通在一起。最后,我们从六个角度综合比较了转发不当行为的检测策略,并从跨学科的角度提出了未来的研究方向。难题:TTU无线移动网络实验室,德克萨斯理工大学计算机科学系,卢伯克,美国计算机科学与电气工程系,马歇尔大学工程与计算机科学学院,亨廷顿,美国计算机科学与工程系,仁川国立大学,仁川,韩国计算机科学项目,路易斯安那理工大学,拉斯顿,美国马萨诸塞大学计算机与信息科学系,美国达特茅斯大学
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Hide-and-detect: forwarding misbehaviors, attacks, and countermeasures in energy harvesting-motivated networks
Multi-scale, heterogeneous, and battery-powered Internet-of-Things (IoT) sensors and devices (later in short, nodes) have been widely deployed in diverse applications and networks. Due to the limited amount of battery energy, energy harvestingmotivated networks (EHNets) powered by immediate environmental resources are increasingly popular and rapidly emerging as the next generation of ubiquitous communication infrastructure. However, EHNets are admittedly vulnerable to a denial-of-service (DoS) attack because of the shared medium, centralized coordination, and limited computing and communicating capabilities. Because of inherent resource constraints, EHNets seldom deploying conventional heavy-weight cryptographic techniques and secure algorithms and protocols. In light of these, we first investigate energy harvesting-based networking operations and applications. Second, we analyze the different types of forwarding misbehavior and attack caused by malicious nodes and their corresponding detection strategies. We introduce a set of adversarial scenarios and visualize its communication activities to capture vulnerable scenarios and potential malicious nodes. Here, single and multiple malicious nodes colluding together are considered. Lastly, we comprehensively compare the detection strategies of forwarding misbehavior by considering six perspectives and provide future research directions with interdisciplinary points of view. TWISTOR: TTU Wireless Mobile Networking Laboratory, Department of Computer Science, Texas Tech University, Lubbock, USA Department of Computer Sciences and Electrical Engineering, College of Engineering and Computer Sciences, Marshall University, Huntington, USA Department of Computer Science and Engineering, Incheon National University, Incheon, South Korea Computer Science Program, Louisiana Tech University, Ruston, USA Department of Computer and Information Science, University of Massachusetts, Dartmouth, USA
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信