Maximizing destructiveness of node capture attack in wireless sensor networks

被引:13
|
作者
Lin, Chi [1 ]
Wu, Guowei [1 ]
Yu, Chang Wu [2 ]
Yao, Lin [1 ]
机构
[1] Dalian Univ Technol, Sch Software, Dalian, Peoples R China
[2] Chung Hua Univ, Dept Comp Sci & Informat Engn, Hsinchu, Taiwan
来源
JOURNAL OF SUPERCOMPUTING | 2015年 / 71卷 / 08期
基金
中国国家自然科学基金;
关键词
Wireless sensor network; Node capture attack; Destructiveness; ALGORITHM; SECURITY;
D O I
10.1007/s11227-015-1435-7
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As a special kind of attack, node capture attack in wireless sensor networks destroys the confidentiality and integrity of network traffic by physically capturing sensor nodes and extracting the cryptographic keys for eavesdropping the communications. However, previous researches pay little attention to the attacking efficiency, which leads to big attacking times and long execution time. In this paper, we propose a graph-based method for modeling the node capture attack on random key pre-distribution scheme. A full graph is constructed to specialize the compromising relationships between nodes and paths, and then the way of evaluating the destructiveness is introduced. The full graph attack (FGA) is designed to ensure the maximum destructiveness of each captured node so as to reduce the attacking times and shorten the execution time, simultaneously. To promote the performance of FGA in attacking efficiency, two optimal attacking algorithms, namely opti-graph attack (OGA) and path covering attack (PCA), are developed. Simulation results show that FGA, OGA and PCA reduce 38, 10 and 51 % attacking times, and enhance 39, 11 and 40 % attacking efficiency than traditional node capture attack methods. Moreover, they save 39, 11 and 50 % energy in compromising the networks.
引用
收藏
页码:3181 / 3212
页数:32
相关论文
共 50 条
  • [41] An image sensor node for wireless sensor networks
    Cao, ZY
    Ji, ZZ
    Hu, MZ
    ITCC 2005: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 2, 2005, : 740 - 745
  • [42] An Elite Hybrid Metaheuristic Optimization Algorithm for Maximizing Wireless Sensor Networks Lifetime With a Sink Node
    Wang, Hui
    Li, Kangshun
    Pedrycz, Witold
    IEEE SENSORS JOURNAL, 2020, 20 (10) : 5634 - 5649
  • [43] CAT: Building Couples to Early Detect Node Compromise Attack in Wireless Sensor Networks
    Lin, Xiaodong
    GLOBECOM 2009 - 2009 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-8, 2009, : 2755 - 2760
  • [44] Whac-A-Mole: Smart node positioning in clone attack in wireless sensor networks
    Ben Jaballah, Wafa
    Conti, Mauro
    File, Gilberto
    Mosbah, Mohamed
    Zemmari, Akka
    COMPUTER COMMUNICATIONS, 2018, 119 : 66 - 82
  • [45] Hybrid Cryptography Algorithm for Securing Wireless Sensor Networks from Node Clone Attack
    Mohindru, Vandana
    Singh, Yashwant
    Bhatt, Ravindara
    RECENT ADVANCES IN ELECTRICAL & ELECTRONIC ENGINEERING, 2020, 13 (02) : 251 - 259
  • [46] Security Of Mobile Wireless Sensor Networks Against Node Replication Attack In Healthcare Applications
    Sindhuja, L. S.
    Beatrice, B. Anuja
    INTERNATIONAL JOURNAL OF LIFE SCIENCE AND PHARMA RESEARCH, 2022, 12 : 102 - 109
  • [47] Maximizing Lifetime of Wireless Sensor Networks with Mobile Sensor Nodes
    Katsuma, Ryo
    Murata, Yoshihiro
    Shibata, Naoki
    Yasumoto, Keiichi
    Ito, Minoru
    2008 NINTH INTERNATIONAL CONFERENCE ON MOBILE DATA MANAGEMENT WORKSHOPS, 2008, : 127 - +
  • [48] Maximizing lifetime in wireless sensor networks with multiple sensor families
    Carrabs, Francesco
    Cerulli, Raffaele
    D'Ambrosio, Ciriaco
    Gentili, Monica
    Raiconi, Andrea
    COMPUTERS & OPERATIONS RESEARCH, 2015, 60 : 121 - 137
  • [49] Secure Decentralized Data Transfer against Node Capture Attacks for Wireless Sensor Networks
    Kohno, Eitaro
    Ohta, Tomoyuki
    Kakuda, Yoshiaki
    ISADS 2009: 2009 INTERNATIONAL SYMPOSIUM ON AUTONOMOUS DECENTRALIZED SYSTEMS, PROCEEDINGS, 2009, : 35 - 40
  • [50] Improving Resilience against Node Capture Attacks in Wireless Sensor Networks using ICmetrics
    Tahir, Ruhma
    McDonald-Maier, Klaus
    2012 THIRD INTERNATIONAL CONFERENCE ON EMERGING SECURITY TECHNOLOGIES (EST), 2012, : 127 - 130