Code Attestation Based Intrusion Detection System for Compression Attack in Wireless Sensor Networks

被引:0
|
作者
Surti, Neelam A. [1 ]
Jinwala, Devesh C. [2 ]
机构
[1] CK Pithawalla Coll Engn & Technol, Dept Comp Engn, Via Magdalla Port,Dumas Rd, Surat 395007, Gujarat, India
[2] SV Natl Inst Technol, Dept Comp Engn, Surat 395007, Gujarat, India
来源
关键词
Wireless Sensor Networks; Intrusion Detection System; Code Attestation; Compression; Checksum; Attacks;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
These days, the Wireless Sensor Networks (WSNs) find potentially versatile applications in diverse areas ranging from environment monitoring, defense, industrial process monitoring and control, homeland securities and many more. Critical data flow is inherently present in these applications and despite all the inbuilt measures for ensuring network and information security, adversarial intrusions cannot be ruled out. Hence, such systems require sound intrusion detection and prevention mechanisms that work efficiently in resource constrained sensor nodes, too. One of the methods of doing so is to periodically check the prover sensor nodes for any alteration in its code/data as compared to the same when originally deployed by the verifier sensor node. This is known as code/data attestation; useful in verifying the program integrity of nodes in such networks. Our focus here is on software based remote code attestation. Software based code attestation techniques are vulnerable to various attacks. We focus on compression attack, and propose a scheme for mitigating the same, here. To withstand the compression attacks, the original program code is compressed and fresh random noise is inserted within the available free space. In existing attestation algorithms the fresh random noise is generated by the verifier and sent to the prover sensor node in numerous packets. Here we utilize the random challenge sent by the verifier to generate the fresh random noise at the prover node. Hence, we propose an algorithm that withstands the compression attack at lesser communication overhead compared to the existing attestation algorithms.
引用
收藏
页码:209 / 216
页数:8
相关论文
共 50 条
  • [1] A lightweight intrusion detection system based on RSSI for sybil attack detection in wireless sensor networks
    Sadeghizadeh, Mahdi
    INTERNATIONAL JOURNAL OF NONLINEAR ANALYSIS AND APPLICATIONS, 2022, 13 (01): : 305 - 320
  • [2] Ranger Intrusion Detection System for Wireless Sensor Networks with Sybil Attack Based on Ontology
    Chen, Rung-Ching
    Haung, Yung-Fa
    Hsieh, Chia-Fen
    NEW ASPECTS OF APPLIED INFORMATICS, BIOMEDICAL ELECTRONICS AND INFORMATICS AND COMMUNICATION, 2010, : 176 - +
  • [3] A Novel Code Attestation Scheme Against Sybil Attack in Wireless Sensor Networks
    Makhdoom, Imran
    Afzal, Mehreen
    Rashid, Imran
    2014 NATIONAL SOFTWARE ENGINEERING CONFERENCE (NSEC - 2014), 2014, : 1 - 6
  • [4] Reliability of wireless sensors with code attestation for intrusion detection
    Chen, Ing-Ray
    Wang, Yating
    Wang, Ding-Chau
    INFORMATION PROCESSING LETTERS, 2010, 110 (17) : 778 - 786
  • [5] Attack Detection Capabilities of Intrusion Detection Systems for Wireless Sensor Networks
    Darra, Eleni
    Katsikas, Sokratis K.
    2013 FOURTH INTERNATIONAL CONFERENCE ON INFORMATION, INTELLIGENCE, SYSTEMS AND APPLICATIONS (IISA 2013), 2013, : 91 - 97
  • [6] An intrusion detection system for cluster based wireless sensor networks
    Deng, Xue
    Wu, Renyong
    Wang, Wenru
    Bu, Renfei
    Information Technology Journal, 2013, 12 (09) : 1764 - 1771
  • [7] An Intrusion Detection System for Cluster Based Wireless Sensor Networks
    Deng, Xue
    2013 16TH INTERNATIONAL SYMPOSIUM ON WIRELESS PERSONAL MULTIMEDIA COMMUNICATIONS (WPMC), 2013,
  • [8] An intrusion detection system for wireless sensor networks
    Onat, I
    Miri, A
    WIMOB 2005: IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS, VOL 3, PROCEEDINGS, 2005, : 253 - 259
  • [9] An Intrusion Detection System for Wireless Sensor Networks
    Ioannou, Christiana
    Vassiliou, Vasos
    Sergiou, Charalampos
    PROCEEDINGS OF THE 24TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (ICT 2017), 2017,
  • [10] Intrusion detection system against SinkHole attack in wireless sensor networks with mobile sink
    Guerroumi, Mohamed
    Derhab, Abdelouahid
    Saleem, Kashif
    2015 12TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY - NEW GENERATIONS, 2015, : 307 - 313