ASSESSING SECURITY RISK FOR WIRELESS SENSOR NETWORKS UNDER CYBER ATTACK

被引:0
|
作者
Yarbrough, Brian [1 ]
Wagner, Neal [1 ]
机构
[1] MIT, Lincoln Lab, 244 Sood St, Lexington, MA USA
关键词
Wireless sensor networks; Cyber security; Agent-based modeling; Denial of Service cyber attack; Risk assessment; COVERAGE; SERVICE;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
A common deployment strategy for wireless sensor networks is to position sensors according to a probabilistic distribution. Some sensor distributions offer advantages in redundancy, which helps ensure network survivability even with the loss of multiple sensor nodes to cyber attack. Properly selecting an initial sensor deployment distribution mitigates the threat of a denial of service (DoS) attack. While it is clear that some distributions are superior to others, it is not clear how to select the best sensor distribution as a defensive measure. Current strategies rely on mathematical analysis and are restricted to a subset of possible distributions. This paper examines the problem from an experimental perspective. We propose a novel method for evaluating how a given sensor deployment pattern may withstand a DoS attack based on agent-based simulation. We have implemented a first prototype of our model and illustrate its feasibility as part of a future decision support system.
引用
收藏
页数:12
相关论文
共 50 条
  • [21] A Machine-Learning-Based Cyber Attack Detection Model for Wireless Sensor Networks in Microgrids
    Kavousi-Fard, Abdollah
    Su, Wencong
    Jin, Tao
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (01) : 650 - 658
  • [22] Firewalling Wireless Sensor Networks: Security by Wireless
    Martinovic, Ivan
    Gollan, Nicos
    Schmitt, Jens B.
    2008 IEEE 33RD CONFERENCE ON LOCAL COMPUTER NETWORKS, VOLS 1 AND 2, 2008, : 753 - 760
  • [23] Wireless Sensor Network in Agriculture: Model of Cyber Security
    Prodanovic, Radomir
    Rancic, Dejan
    Vulic, Ivan
    Zoric, Nenad
    Bogicevic, Dusan
    Ostojic, Gordana
    Sarang, Sohail
    Stankovski, Stevan
    SENSORS, 2020, 20 (23) : 1 - 22
  • [24] Wireless Networks Security: Proof of ChopChop Attack
    Guennoun, Mouhcine
    Lbekkouri, Aboubakr
    Benamrane, Amine
    Ben-Tahir, Mohamed
    El-Khatib, Khalil
    2008 IEEE INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS, VOLS 1 AND 2, 2008, : 807 - +
  • [25] Proxy Signature for Sensor Networks against Cyber Attack
    Zheng, Jinbin
    Zhang, Huang
    Wei, Baodian
    Du, Yusong
    Tseng, Hsien-Wei
    SENSORS AND MATERIALS, 2021, 33 (05) : 1565 - 1575
  • [26] Security Of Mobile Wireless Sensor Networks Against Node Replication Attack In Healthcare Applications
    Sindhuja, L. S.
    Beatrice, B. Anuja
    INTERNATIONAL JOURNAL OF LIFE SCIENCE AND PHARMA RESEARCH, 2022, 12 : 102 - 109
  • [27] Using a lightweight security mechanism to detect and localize jamming attack in wireless sensor networks
    Alikh, Nashab
    Rajabzadeh, Amir
    OPTIK, 2022, 271
  • [28] Sink location privacy protection under direction attack in wireless sensor networks
    Jian Wang
    Fengyu Wang
    Zhenzhong Cao
    Fengbo Lin
    Jiayan Wu
    Wireless Networks, 2017, 23 : 579 - 591
  • [29] A Novel Strategy under Charger Capture Attack in Wireless Rechargeable Sensor Networks
    Yu, Nan
    Wang, Xiaoyu
    Dai, Haipeng
    Chen, Guihai
    16TH ANNUAL INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING IN SENSOR SYSTEMS (DCOSS 2020), 2020, : 356 - 361
  • [30] Security Challenges and Risk Evaluation Framework for Industrial Wireless Sensor Networks
    Liang, Lulu
    Liu, Yanzhao
    Yao, Yuangang
    Yang, Tianshi
    Hu, Yuening
    Ling, Chen
    2017 4TH INTERNATIONAL CONFERENCE ON CONTROL, DECISION AND INFORMATION TECHNOLOGIES (CODIT), 2017, : 904 - 907