Code Attestation Based Intrusion Detection System for Compression Attack in Wireless Sensor Networks

被引:0
|
作者
Surti, Neelam A. [1 ]
Jinwala, Devesh C. [2 ]
机构
[1] CK Pithawalla Coll Engn & Technol, Dept Comp Engn, Via Magdalla Port,Dumas Rd, Surat 395007, Gujarat, India
[2] SV Natl Inst Technol, Dept Comp Engn, Surat 395007, Gujarat, India
来源
关键词
Wireless Sensor Networks; Intrusion Detection System; Code Attestation; Compression; Checksum; Attacks;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
These days, the Wireless Sensor Networks (WSNs) find potentially versatile applications in diverse areas ranging from environment monitoring, defense, industrial process monitoring and control, homeland securities and many more. Critical data flow is inherently present in these applications and despite all the inbuilt measures for ensuring network and information security, adversarial intrusions cannot be ruled out. Hence, such systems require sound intrusion detection and prevention mechanisms that work efficiently in resource constrained sensor nodes, too. One of the methods of doing so is to periodically check the prover sensor nodes for any alteration in its code/data as compared to the same when originally deployed by the verifier sensor node. This is known as code/data attestation; useful in verifying the program integrity of nodes in such networks. Our focus here is on software based remote code attestation. Software based code attestation techniques are vulnerable to various attacks. We focus on compression attack, and propose a scheme for mitigating the same, here. To withstand the compression attacks, the original program code is compressed and fresh random noise is inserted within the available free space. In existing attestation algorithms the fresh random noise is generated by the verifier and sent to the prover sensor node in numerous packets. Here we utilize the random challenge sent by the verifier to generate the fresh random noise at the prover node. Hence, we propose an algorithm that withstands the compression attack at lesser communication overhead compared to the existing attestation algorithms.
引用
收藏
页码:209 / 216
页数:8
相关论文
共 50 条
  • [31] An optimized collaborative intrusion detection system for wireless sensor networks
    Shaimaa Ahmed Elsaid
    Nouf Saleh Albatati
    Soft Computing, 2020, 24 : 12553 - 12567
  • [32] Multiphase intrusion detection and revocation system for wireless sensor networks
    Computer Science Department, Federal University of Minas Gerais, Av. Antônio Carlos, 6627, Belo Horizonte - MG, Brazil
    不详
    不详
    Int. J. Commun. Networks Distrib. Syst., 2009, 1 (99-111):
  • [33] An optimized collaborative intrusion detection system for wireless sensor networks
    Elsaid, Shaimaa Ahmed
    Albatati, Nouf Saleh
    SOFT COMPUTING, 2020, 24 (16) : 12553 - 12567
  • [34] A Partially Distributed Intrusion Detection System for Wireless Sensor Networks
    Cho, Eung Jun
    Hong, Choong Seon
    Lee, Sungwon
    Jeon, Seokhee
    SENSORS, 2013, 13 (12): : 15863 - 15879
  • [35] Survival Continuity on Intrusion Detection System of Wireless Sensor Networks
    Zhou, Zixin
    Liu, Lei
    Han, Guijie
    2015 10TH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2015, : 775 - 779
  • [36] Multiphase intrusion detection and revocation system for wireless sensor networks
    de Oliveira, Sergio
    Nogueira, Jose Marcos
    Wong, Hao-Chi
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2009, 2 (01) : 99 - 111
  • [37] Cross -Layer Intrusion Detection System for Wireless Sensor Networks
    Sathya, D.
    Krishneswari, K.
    JOURNAL OF SCIENTIFIC & INDUSTRIAL RESEARCH, 2016, 75 (04): : 213 - 220
  • [38] Intrusion Detection System in Wireless Sensor Networks: A Comprehensive Review
    Duhan, Sonu
    Khandnor, Padmavati
    2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 2707 - 2712
  • [39] An RFID based System for the detection of Sybil attack in Military Wireless Sensor networks
    Triki, Bayrem
    Rekhis, Slim
    Boudriga, Noureddine
    2014 WORLD CONGRESS ON COMPUTER APPLICATIONS AND INFORMATION SYSTEMS (WCCAIS), 2014,
  • [40] Agent-Based QoS Routing for Intrusion Detection of Sinkhole Attack in Clustered Wireless Sensor Networks
    Kalnoor, Gauri
    Agarkhed, Jayashree
    Patil, Siddarama R.
    PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INFORMATICS, ICCII 2016, 2017, 507 : 571 - 583