Defense Against Node Compromise in Sensor Network Security

Recent advances in electronic and computer technologies lead to wide-spread deployment of wireless sensor networks (WSNs). WSNs have wide range applications, including military sensing and tracking, environment monitoring, smart environments, etc. Many WSNs have mission-critical tasks, such as milit...

Full description

Bibliographic Details
Main Author: Chen, Xiangqian
Format: Others
Published: FIU Digital Commons 2007
Subjects:
Online Access:http://digitalcommons.fiu.edu/etd/7
http://digitalcommons.fiu.edu/cgi/viewcontent.cgi?article=1081&context=etd
id ndltd-fiu.edu-oai-digitalcommons.fiu.edu-etd-1081
record_format oai_dc
spelling ndltd-fiu.edu-oai-digitalcommons.fiu.edu-etd-10812018-07-19T03:31:31Z Defense Against Node Compromise in Sensor Network Security Chen, Xiangqian Recent advances in electronic and computer technologies lead to wide-spread deployment of wireless sensor networks (WSNs). WSNs have wide range applications, including military sensing and tracking, environment monitoring, smart environments, etc. Many WSNs have mission-critical tasks, such as military applications. Thus, the security issues in WSNs are kept in the foreground among research areas. Compared with other wireless networks, such as ad hoc, and cellular networks, security in WSNs is more complicated due to the constrained capabilities of sensor nodes and the properties of the deployment, such as large scale, hostile environment, etc. Security issues mainly come from attacks. In general, the attacks in WSNs can be classified as external attacks and internal attacks. In an external attack, the attacking node is not an authorized participant of the sensor network. Cryptography and other security methods can prevent some of external attacks. However, node compromise, the major and unique problem that leads to internal attacks, will eliminate all the efforts to prevent attacks. Knowing the probability of node compromise will help systems to detect and defend against it. Although there are some approaches that can be used to detect and defend against node compromise, few of them have the ability to estimate the probability of node compromise. Hence, we develop basic uniform, basic gradient, intelligent uniform and intelligent gradient models for node compromise distribution in order to adapt to different application environments by using probability theory. These models allow systems to estimate the probability of node compromise. Applying these models in system security designs can improve system security and decrease the overheads nearly in every security area. Moreover, based on these models, we design a novel secure routing algorithm to defend against the routing security issue that comes from the nodes that have already been compromised but have not been detected by the node compromise detecting mechanism. The routing paths in our algorithm detour those nodes which have already been detected as compromised nodes or have larger probabilities of being compromised. Simulation results show that our algorithm is effective to protect routing paths from node compromise whether detected or not. 2007-11-15T08:00:00Z text application/pdf http://digitalcommons.fiu.edu/etd/7 http://digitalcommons.fiu.edu/cgi/viewcontent.cgi?article=1081&context=etd FIU Electronic Theses and Dissertations FIU Digital Commons sensor networks security node compromise secure routing key management attack
collection NDLTD
format Others
sources NDLTD
topic sensor networks
security
node compromise
secure routing
key management
attack
spellingShingle sensor networks
security
node compromise
secure routing
key management
attack
Chen, Xiangqian
Defense Against Node Compromise in Sensor Network Security
description Recent advances in electronic and computer technologies lead to wide-spread deployment of wireless sensor networks (WSNs). WSNs have wide range applications, including military sensing and tracking, environment monitoring, smart environments, etc. Many WSNs have mission-critical tasks, such as military applications. Thus, the security issues in WSNs are kept in the foreground among research areas. Compared with other wireless networks, such as ad hoc, and cellular networks, security in WSNs is more complicated due to the constrained capabilities of sensor nodes and the properties of the deployment, such as large scale, hostile environment, etc. Security issues mainly come from attacks. In general, the attacks in WSNs can be classified as external attacks and internal attacks. In an external attack, the attacking node is not an authorized participant of the sensor network. Cryptography and other security methods can prevent some of external attacks. However, node compromise, the major and unique problem that leads to internal attacks, will eliminate all the efforts to prevent attacks. Knowing the probability of node compromise will help systems to detect and defend against it. Although there are some approaches that can be used to detect and defend against node compromise, few of them have the ability to estimate the probability of node compromise. Hence, we develop basic uniform, basic gradient, intelligent uniform and intelligent gradient models for node compromise distribution in order to adapt to different application environments by using probability theory. These models allow systems to estimate the probability of node compromise. Applying these models in system security designs can improve system security and decrease the overheads nearly in every security area. Moreover, based on these models, we design a novel secure routing algorithm to defend against the routing security issue that comes from the nodes that have already been compromised but have not been detected by the node compromise detecting mechanism. The routing paths in our algorithm detour those nodes which have already been detected as compromised nodes or have larger probabilities of being compromised. Simulation results show that our algorithm is effective to protect routing paths from node compromise whether detected or not.
author Chen, Xiangqian
author_facet Chen, Xiangqian
author_sort Chen, Xiangqian
title Defense Against Node Compromise in Sensor Network Security
title_short Defense Against Node Compromise in Sensor Network Security
title_full Defense Against Node Compromise in Sensor Network Security
title_fullStr Defense Against Node Compromise in Sensor Network Security
title_full_unstemmed Defense Against Node Compromise in Sensor Network Security
title_sort defense against node compromise in sensor network security
publisher FIU Digital Commons
publishDate 2007
url http://digitalcommons.fiu.edu/etd/7
http://digitalcommons.fiu.edu/cgi/viewcontent.cgi?article=1081&context=etd
work_keys_str_mv AT chenxiangqian defenseagainstnodecompromiseinsensornetworksecurity
_version_ 1718712576516292608