Towards characterizing the effectiveness of random mobility against actuation attacks

نویسندگان

  • Alexandra Czarlinska
  • Deepa Kundur
چکیده

Actuation functionality in a sensor network enables an unprecedented interaction with the physical environment. When used by a malicious distributed network however, actuation may become a potent new attack. In this work we explore a new general class of actuation attacks which aim to disable the sensing fidelity and dependability of a wireless sensor network. We propose a countermeasure to this Denial of Service on Sensing (DoSS) based on a controlled level of random mobility. We show how the level of mobility may be traded-off to suit security needs and energy constraints, and to exploit a priori knowledge of the environment. We demonstrate how this random mobility approach performs under various strengths, densities and distributions of the two networks and show that it reduces the number of affected nodes exponentially over time. Furthermore we discuss how this simple mobility approach renders the network more fault-tolerant and resilient in an inherent way without a need for the nodes to communicate and aggregate their sensed data. 2007 Elsevier B.V. All rights reserved.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Random Key Pre-Distribution Techniques against Sybil Attacks

Sybil attacks pose a serious threat for Wireless Sensor Networks (WSN) security. They can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. In a Sybil attack, the attacker masquerades as multiple sensor identities that are actually controlled by one or a few existing attacker nodes. Sybil identities are fabricated out of stolen keys, obt...

متن کامل

Improving Tor security against timing and traffic analysis attacks with fair randomization

The Tor network is probably one of the most popular online anonymity systems in the world. It has been built based on the volunteer relays from all around the world. It has a strong scientific basis which is structured very well to work in low latency mode that makes it suitable for tasks such as web browsing. Despite the advantages, the low latency also makes Tor insecure against timing and tr...

متن کامل

Stony Brook University

The official electronic file of this thesis or dissertation is maintained by the University Libraries on behalf of The Graduate School at Stony Brook University. d d b b b y y y A A A u u u t t t h h h o o o r r r. .. Aneeta Bhattacharyya We, the thesis committee for the above candidate for the Master of Science degree, hereby recommend acceptance of this thesis. 2010 Wireless sensor networks a...

متن کامل

Mobility changes anonymity: new passive threats in mobile ad hoc networks

Privacy in mobile ad hoc networks has new semantics in addition to the conventional notions for infrastructure networks. Mobility enabled by wireless communication has significantly changed privacy issues and anonymity research in many ways. In particular, mobility requires ad hoc routing schemes to transmit messages frequently in an open wireless medium. The routing traffic facilitates adversa...

متن کامل

“Defense” injuries in attacks on humans by domestic dog (Canis lupus familiaris) and jaguar (Panthera onca)

This communication describes two attacks by domestic and wild carnivores in Caceres County, localized in the Pantanal area, an extensive flooded plain in Mato Grosso State, Midwest region of Brazil. The first attack took place in an urban area and was caused by a Rottweiler dog (Canis lupus familiaris) created by the family of the victim. Another attack occurred in a rural area, caused by a jag...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Computer Communications

دوره 30  شماره 

صفحات  -

تاریخ انتشار 2007