Maximizing destructiveness of node capture attack in wireless sensor networks

被引:13
|
作者
Lin, Chi [1 ]
Wu, Guowei [1 ]
Yu, Chang Wu [2 ]
Yao, Lin [1 ]
机构
[1] Dalian Univ Technol, Sch Software, Dalian, Peoples R China
[2] Chung Hua Univ, Dept Comp Sci & Informat Engn, Hsinchu, Taiwan
来源
JOURNAL OF SUPERCOMPUTING | 2015年 / 71卷 / 08期
基金
中国国家自然科学基金;
关键词
Wireless sensor network; Node capture attack; Destructiveness; ALGORITHM; SECURITY;
D O I
10.1007/s11227-015-1435-7
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As a special kind of attack, node capture attack in wireless sensor networks destroys the confidentiality and integrity of network traffic by physically capturing sensor nodes and extracting the cryptographic keys for eavesdropping the communications. However, previous researches pay little attention to the attacking efficiency, which leads to big attacking times and long execution time. In this paper, we propose a graph-based method for modeling the node capture attack on random key pre-distribution scheme. A full graph is constructed to specialize the compromising relationships between nodes and paths, and then the way of evaluating the destructiveness is introduced. The full graph attack (FGA) is designed to ensure the maximum destructiveness of each captured node so as to reduce the attacking times and shorten the execution time, simultaneously. To promote the performance of FGA in attacking efficiency, two optimal attacking algorithms, namely opti-graph attack (OGA) and path covering attack (PCA), are developed. Simulation results show that FGA, OGA and PCA reduce 38, 10 and 51 % attacking times, and enhance 39, 11 and 40 % attacking efficiency than traditional node capture attack methods. Moreover, they save 39, 11 and 50 % energy in compromising the networks.
引用
收藏
页码:3181 / 3212
页数:32
相关论文
共 50 条
  • [31] Lightweight and effective detection scheme for node clone attack in wireless sensor networks
    Wen, H.
    Luo, J.
    Zhou, L.
    IET WIRELESS SENSOR SYSTEMS, 2011, 1 (03) : 137 - 143
  • [32] Implementation of Fruit Fly Optimization Algorithm (FFOA) to escalate the attacking efficiency of node capture attack in Wireless Sensor Networks (WSN)
    Bhatt, Ruby
    Maheshwary, Priti
    Shukla, Piyush
    Shukla, Prashant
    Shrivastava, Manish
    Changlani, Soni
    COMPUTER COMMUNICATIONS, 2020, 149 : 134 - 145
  • [33] Understanding Node Capture Attacks in User Authentication Schemes for Wireless Sensor Networks
    Wang, Chenyu
    Wang, Ding
    Tu, Yi
    Xu, Guoai
    Wang, Huaxiong
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (01) : 507 - 523
  • [34] On Resilience and Connectivity of Secure Wireless Sensor Networks Under Node Capture Attacks
    Zhao, Jun
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (03) : 557 - 571
  • [35] Maximizing system lifetime in wireless sensor networks
    Alfieri, A.
    Bianco, A.
    Brandimarte, P.
    Chiasserini, C. F.
    EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2007, 181 (01) : 390 - 402
  • [36] Maximizing the lifetime of heterogeneous wireless sensor networks
    Liu, Xiaoxi
    Li, Ruiying
    Liao, Haitao
    2015 61ST ANNUAL RELIABILITY AND MAINTAINABILITY SYMPOSIUM (RAMS 2015), 2015,
  • [37] On maximizing the throughput of convergecast in wireless sensor networks
    Lai, Nai-Luen
    King, Chung-Ta
    Lin, Chun-Han
    ADVANCES IN GRID AND PERVASIVE COMPUTING, PROCEEDINGS, 2008, 5036 : 396 - 408
  • [38] Maximizing Lifetime Vector in Wireless Sensor Networks
    Zhang, Liang
    Chen, Shigang
    Jian, Ying
    Fang, Yuguang
    Mo, Zhen
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2013, 21 (04) : 1187 - 1200
  • [39] Maximizing the system lifetime of wireless sensor networks
    Zhang Hui
    Zhang Jilong
    ISTM/2007: 7TH INTERNATIONAL SYMPOSIUM ON TEST AND MEASUREMENT, VOLS 1-7, CONFERENCE PROCEEDINGS, 2007, : 3610 - 3612
  • [40] Maximizing system lifetime in wireless sensor networks
    Dong, QF
    2005 FOURTH INTERNATIONAL SYMPOSIUM ON INFORMATION PROCESSING IN SENSOR NETWORKS, 2005, : 13 - 19