Enhancing the attacking efficiency of the node capture attack in WSN: a matrix approach

In the node capture attack, the adversary intelligently captures nodes and extracts the cryptographic keys from their memories to destroy the security, reliability and confidentiality of the wireless sensor networks. However, it suffers from low attacking efficiency and high resource expenditure. In this paper, we approach this attack from an adversarial view and develop a matrix-based method to model the process of the node capture attack. We establish a matrix to indicate the compromising relationship between the nodes and the paths. We propose a Matrix-based node capture attack Algorithm (MA in short), which can maximize the destructiveness while consuming the minimum resource expenditure. We conduct several experiments to show the performance of MA. Experimental results manifest that MA can reduce the attacking round, shorten the execution time, enhance the attacking efficiency and conserve the energy cost.

[1]  Peter Druschel,et al.  Peer-to-peer systems , 2010, Commun. ACM.

[2]  Radha Poovendran,et al.  Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis , 2009, IEEE Transactions on Dependable and Secure Computing.

[3]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[4]  Sajal K. Das,et al.  Deployment-aware modeling of node compromise spread in wireless sensor networks using epidemic theory , 2009, TOSN.

[5]  Richard Han,et al.  Node Compromise in Sensor Networks: The Need for Secure Systems ; CU-CS-990-05 , 2005 .

[6]  Radha Poovendran,et al.  Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[7]  Faramarz Fekri,et al.  Node compromise attacks and network connectivity , 2007, SPIE Defense + Commercial Sensing.

[8]  Scott F. Midkiff,et al.  Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses , 2008, IEEE Pervasive Computing.

[9]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[10]  Radha Poovendran,et al.  Probabilistic Analysis of Covering and Compromise in Node Capture Attacks , 2010 .

[11]  John A. Stankovic,et al.  Security in wireless sensor networks , 2004, SASN '04.

[12]  Andrew P. Moore,et al.  Attack Modeling for Information Security and Survivability , 2001 .

[13]  C. Chellappan,et al.  The Replication Attack in Wireless Sensor Networks: Analysis and Defenses , 2011 .

[14]  Mani Srivastava,et al.  Energy efficient routing in wireless sensor networks , 2001, 2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277).

[15]  Dong Seong Kim,et al.  Toward Assessing Vulnerability and Risk of Sensor Networks under Node Compromise , 2007, 2007 International Conference on Computational Intelligence and Security (CIS 2007).

[16]  Jaeki Song,et al.  Unified Modeling Language based Analysis of Security Attacks in Wireless Sensor Networks: A Survey , 2011, KSII Trans. Internet Inf. Syst..

[17]  R. Poovendran,et al.  Modeling node capture attacks in wireless sensor networks , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.

[18]  Patrick Tague,et al.  Identifying, modeling, and mitigating attacks in wireless ad-hoc and sensor networks , 2009 .

[19]  Sajal K. Das,et al.  Modeling node compromise spread in wireless sensor networks using epidemic theory , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).

[20]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[21]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[22]  Albert Levi,et al.  Increasing Resiliency in Multi-phase Wireless Sensor Networks: Generationwise Key Predistribution Approach , 2011, Comput. J..

[23]  Tassos Dimitriou,et al.  Launching a Sinkhole Attack in Wireless Sensor Networks; The Intruder Side , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.

[24]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[25]  Kang Yen,et al.  Node Compromise Modeling and its Applications in Sensor Networks , 2007, 2007 12th IEEE Symposium on Computers and Communications.

[26]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[27]  Radha Poovendran,et al.  Node capture attacks in wireless sensor networks: A system theoretic approach , 2010, 49th IEEE Conference on Decision and Control (CDC).

[28]  A. Perrig,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[29]  Sunho Lim,et al.  Analysis of attack models via Unified Modeling Language in Wireless Sensor Networks: A survey study , 2010, 2010 IEEE International Conference on Wireless Communications, Networking and Information Security.

[30]  Radha Poovendran,et al.  Vulnerability of Network Traffic under Node Capture Attacks Using Circuit Theoretic Analysis , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[31]  Radha Poovendran,et al.  Modeling adaptive node capture attacks in multi-hop wireless networks , 2007, Ad Hoc Networks.

[32]  Huirong Fu,et al.  Replication attack on random key pre-distribution schemes for wireless sensor networks , 2005 .

[33]  Raja Suresh Defense Transformation and Net-Centric Systems 2008 , 2007 .

[34]  Sajal K. Das,et al.  Fast Detection of Replica Node Attacks in Mobile Sensor Networks Using Sequential Analysis , 2009, IEEE INFOCOM 2009.

[35]  Li-Der Chou,et al.  A survey of black hole attacks in wireless mobile ad hoc networks , 2011, Human-centric Computing and Information Sciences.

[36]  Elaine Shi,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[37]  Alekha Kumar Mishra,et al.  Adversary Information Gathering Model for Node Capture Attack in Wireless Sensor Networks , 2011, 2011 International Conference on Devices and Communications (ICDeCom).

[38]  Wenyuan Xu,et al.  Jamming sensor networks: attack and defense strategies , 2006, IEEE Network.