基于危险理论的移动无线传感器网络节点复制攻击检测

H. R. Shaukat, F. Hashim, A. Sali
{"title":"基于危险理论的移动无线传感器网络节点复制攻击检测","authors":"H. R. Shaukat, F. Hashim, A. Sali","doi":"10.1109/ISCAIE.2014.7010202","DOIUrl":null,"url":null,"abstract":"Mobile wireless sensor networks (MWSNs) are commonly deployed in a harsh climate, notably unattended without any tamper-resistant tools; thereby an attacker can easily capture the sensor nodes in a very limited time. Once captured, the attacker can duplicate the sensor and subsequently deploys numerous clone nodes into the network in minimum time duration. This new breed of attack is called node replication attack, and while several solutions have been proposed to address such a security threat, they are mainly centralized and somewhat limited to static WSN. In this paper, we propose a hybrid (centralized and distributed) node replication attack detection method for MWSN, which operates based on Danger Theory in human immune system. As depicted in Danger Theory, the proposed method consists of two main security approaches, namely attack detection and security control. These approaches perform a multi-level detection, which is not only responsible to identify but also to verify the existence of clone nodes in the network. Performance evaluation demonstrates the efficiency (in terms of true and false positives) of the proposed detection method in detecting clone nodes in MWSN environment.","PeriodicalId":385258,"journal":{"name":"2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":"{\"title\":\"Danger theory based node replication attacks detection in mobile wireless sensor network\",\"authors\":\"H. R. Shaukat, F. Hashim, A. Sali\",\"doi\":\"10.1109/ISCAIE.2014.7010202\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Mobile wireless sensor networks (MWSNs) are commonly deployed in a harsh climate, notably unattended without any tamper-resistant tools; thereby an attacker can easily capture the sensor nodes in a very limited time. Once captured, the attacker can duplicate the sensor and subsequently deploys numerous clone nodes into the network in minimum time duration. This new breed of attack is called node replication attack, and while several solutions have been proposed to address such a security threat, they are mainly centralized and somewhat limited to static WSN. In this paper, we propose a hybrid (centralized and distributed) node replication attack detection method for MWSN, which operates based on Danger Theory in human immune system. As depicted in Danger Theory, the proposed method consists of two main security approaches, namely attack detection and security control. These approaches perform a multi-level detection, which is not only responsible to identify but also to verify the existence of clone nodes in the network. Performance evaluation demonstrates the efficiency (in terms of true and false positives) of the proposed detection method in detecting clone nodes in MWSN environment.\",\"PeriodicalId\":385258,\"journal\":{\"name\":\"2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-04-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"11\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISCAIE.2014.7010202\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISCAIE.2014.7010202","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 11

摘要

移动无线传感器网络(mwsn)通常部署在恶劣的气候条件下,特别是无人值守,没有任何防篡改工具;因此,攻击者可以在非常有限的时间内轻松捕获传感器节点。一旦被捕获,攻击者就可以复制传感器,然后在最短的时间内将大量克隆节点部署到网络中。这种新型攻击被称为节点复制攻击,虽然已经提出了几种解决方案来解决这种安全威胁,但它们主要集中在静态WSN上。本文提出了一种基于人体免疫系统危险理论的多wsn混合(集中式和分布式)节点复制攻击检测方法。正如Danger Theory中所描述的那样,所提出的方法主要包括两种安全方法,即攻击检测和安全控制。这些方法执行多级检测,不仅负责识别而且验证网络中是否存在克隆节点。性能评估证明了该检测方法在MWSN环境中检测克隆节点的效率(以真阳性和假阳性为衡量标准)。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Danger theory based node replication attacks detection in mobile wireless sensor network
Mobile wireless sensor networks (MWSNs) are commonly deployed in a harsh climate, notably unattended without any tamper-resistant tools; thereby an attacker can easily capture the sensor nodes in a very limited time. Once captured, the attacker can duplicate the sensor and subsequently deploys numerous clone nodes into the network in minimum time duration. This new breed of attack is called node replication attack, and while several solutions have been proposed to address such a security threat, they are mainly centralized and somewhat limited to static WSN. In this paper, we propose a hybrid (centralized and distributed) node replication attack detection method for MWSN, which operates based on Danger Theory in human immune system. As depicted in Danger Theory, the proposed method consists of two main security approaches, namely attack detection and security control. These approaches perform a multi-level detection, which is not only responsible to identify but also to verify the existence of clone nodes in the network. Performance evaluation demonstrates the efficiency (in terms of true and false positives) of the proposed detection method in detecting clone nodes in MWSN environment.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信