First Stage Detection of Node Capture Attacks in WSN Based on Cloud Model

Article Preview

Abstract:

As a typical application of Internet of Things (IoT), the issue of protecting security of WSN will be an important problem effecting the expansion of IoT. Since the nodes of WSN are always arranged in an open environment, they are easy to be captured by adversaries. Traditional detections of capture always judge the attack by comparing the absence time of nodes with a certain threshold. In actual applications of WSN, the uncertainty of radio environment and transmission ability of nodes incurs problem of determination of threshold. According to the quality-quantity uncertainty conversion ability of Cloud Model, it is practical to calculate the absence time of nodes in a certain area, to establish the cloud of wireless environment. The threshold will be determined by cloud of wireless environment. Then, Cloud-based First Stage Detection (CFSD) is proposed to detect the node capture attacks in WSN. Simulation results verify that this approach can improve the accuracy of detection and decrease the false alarm probability.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 834-836)

Pages:

905-912

Citation:

Online since:

October 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, et al. Wireless Sensor Networks: a Survey. Computer Networks . 2002, 38(4): p.393–422.

DOI: 10.1016/s1389-1286(01)00302-4

Google Scholar

[2] Sun Limin, Li Jianzhong, Chen Yu, et al.Wireless sensor networks[M].beijing: tsinghua university press,2005(in Chinese).

Google Scholar

[3] PEI Qingqi, SHEN Yulong, MA Jianfeng.Survey of wireless sensor network security techniques [J].Journal on Communications,2007,28(08):113-122(in Chinese).

Google Scholar

[4] Perrig A, Stankovic J, Wagner D. Security in wireless sensor networks[J]. Communications of the ACM, 2004, 47(6): 53-57.

DOI: 10.1145/990680.990707

Google Scholar

[5] Su Z, Lin C, Feng FJ, et al.Key management schemes and protocols for wireless sensor networks [J].Journal of Software,2007,18(5), 1218-1231(in Chinese).

Google Scholar

[6] Tague P, Poovendran R. Modeling adaptive node capture attacks in multi-hop wireless networks[J]. Ad Hoc Networks, 2007, 5(6): 801-814.

DOI: 10.1016/j.adhoc.2007.01.002

Google Scholar

[7] Ding, W., B. Laha, et al. First stage detection of compromised nodes in sensor networks[A]. In: Sensors Applications Symposium (SAS)[C]. Ireland: IEEE, 2010: 20-24.

DOI: 10.1109/sas.2010.5439387

Google Scholar

[8] Ding, W., Y. Yu, et al. Distributed first stage detection for node capture[A]. In: IEEE Globecom 2010 Workshop on Web and Pervasive Security[C]. Miami, USA: IEEE, 2010: 1566-1570.

DOI: 10.1109/glocomw.2010.5700202

Google Scholar

[9] Conti, M., R. Di Pietro, et al. Mobility and cooperation to thwart node capture attacks in MANETS[J]. EURASIP Journal on Wireless Communications and Networking, 2009: 1-13.

DOI: 10.1155/2009/945943

Google Scholar

[10] Zhou Jie, Guo Yuanbo, Hu Lingyan. Detection and control of the node capture attack in WSN for node capture [J]. Journal of Xian University. 2012, 39(1), 185-190(in Chinese).

Google Scholar

[11] Li Deyi, Du Yi. Artificial intelligence with uncertainty. Beijing: National Defence Industry Press. 2005(in Chinese).

Google Scholar

[12] Lv Huijun, Wang Ye, Li Deyi, et al. The Application of Backward Cloud in Qualitative Evaluation. Chinese Journal of Computers. 2003, 26(8): 1009-1015(in Chinese).

Google Scholar

[13] Song Yuanjun, Li Deyi, Yang Xiaozong, et al. Reliability Evaluation of Electronic Products Based on Cloud Models. Acta Electronica Sinica. 2000, 28(12): 74-77(in Chinese).

Google Scholar

[14] Information on http: /db. lcs. mit. edu/labdata/labdata. html.

Google Scholar

[15] Heinzelman W R, Chandrakasan A, Balakrishnan H. Energy-efficient communication protocol for wireless microsensor networks[C]/System Sciences, 2000. Proceedings of the 33rd Annual Hawaii International Conference on. IEEE, 2000: 10 pp. vol. 2.

DOI: 10.1109/hicss.2000.926982

Google Scholar