An Evaluation Model of Intrusion-Tolerant Topology Availability for Wireless Sensor Networks

Article Preview

Abstract:

Due to the node failures incurred by intrusion threat, a wireless sensor networks will initiate topology re-generation, which is based on correct availability evaluation of current intrusion-tolerant topology. The paper proposes an availability evaluation model based on semi-Markov process (SMP) to estimate topology availability of the intrusion-tolerant topology concerning the effects from intrusion behaviors. In view of some limitations of node computation ability and storage ability, this model reduces the complexities resulting from modeling the different intrusion threats and is set up on the uniform intruding results to simplify the model design. Using the DTMC model embedded in SMP topology availability is computed and finally we analyze the sensitivity to parameters in the model.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

29-34

Citation:

Online since:

December 2010

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] M. Bahramgiri, M. Hajiaghayi, V. S. Mirrokni. Fault-Tolerant and 3-Dimensional Distributed Topology Control Algorithms in Wireless Multi-hop Networks[J]. Wireless Networks 2006, 12: 179–188.

DOI: 10.1007/s11276-005-5265-z

Google Scholar

[2] M. Jorgic, N. Goel, K. Kalaichevan, A. Nayak, I. Stojmenovic. Localized detection of k-connectivity in wireless ad hoc, actuator and sensor networks[C], invited paper, 16th IEEE International Conference on Computer Communications and Networks ICCCN, Hawaii, Aug. 2007: 33-38.

DOI: 10.1109/icccn.2007.4317793

Google Scholar

[3] L. M. Wang, J. F. Ma, C. Wang. Degree of fault-tolerance and intrusion-tolerance for topologies of wireless sensor networks[J]. Acta Electronica Sinica, 2006, 34(8): 1446-1451.

Google Scholar

[4] R. Ma, L. Xing, H. E. Michel. Fault-Intrusion Tolerant Techniques in Wireless Sensor Networks, Proceedings of the 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC'06) [C], Indianapolis, IEEE Computer Society, 2006: 85-94.

DOI: 10.1109/dasc.2006.30

Google Scholar

[5] L. M. Wang, J. F. Ma. Self-Regeneration Based Method for Topology Control with Intrusion Tolerance in Wireless Sensor Networks. Journal of Computer Research and Development, 2009, 46(10): 1678-1685.

Google Scholar

[6] B. B. Madana, K. G. Popstojanova, K. Vaidyanathan, K. S. Trivedi. A method for modeling and quantifying the security attributes of intrusion tolerant systems [J], Performance Evaluation, 2004, 56(1~4): 167-186.

DOI: 10.1016/j.peva.2003.07.008

Google Scholar

[7] K. S. Trivedi. Probability and Statistics with Reliability, Queuing, and Computer Science Applications, 2nd Edition. Wiley, New York, (2001).

Google Scholar