Compromising Ad-Hoc Networks by Attacking Weakly Connected Dominating Set

As a special kind of attack, the node compromise attack destroy security, reliability and confidentiality of ad-hoc networks. However, previous research paid little attention on developing general attacking models, which are fundamentals for designing network security mechanisms. In this paper, we approach node compromise attack formalizing problem from an adversarial view and present a general attacking model based on invading virtual backbones of network, which is constructed based on Weakly Connected Dominating Set (WCDS). To investigate the features of our scheme, simulations are conducted to illustrate the influences of infection ratio to network performance. Analysis and simulations results showed that bigger infection ratio can reduce set of compromised nodes, enhance attacking efficiency, save resource expenditure and shorten attacking time.

[1]  Huirong Fu,et al.  Replication attack on random key pre-distribution schemes for wireless sensor networks , 2005 .

[2]  Scott F. Midkiff,et al.  Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses , 2008, IEEE Pervasive Computing.

[3]  Jiguo Yu,et al.  Connected dominating sets in wireless ad hoc and sensor networks - A comprehensive survey , 2013, Comput. Commun..

[4]  Radha Poovendran,et al.  Probabilistic Analysis of Covering and Compromise in Node Capture Attacks , 2010 .

[5]  C. Chellappan,et al.  The Replication Attack in Wireless Sensor Networks: Analysis and Defenses , 2011 .

[6]  Chao Jiang A novel sybil attack detection scheme in wireless sensor networks , 2010, The 2nd International Conference on Information Science and Engineering.

[7]  D. Manivannan,et al.  Unicast routing protocols for vehicular ad hoc networks: A critical comparison and classification , 2009, Pervasive Mob. Comput..

[8]  Yu-Kwong Kwok,et al.  On Attack-Resilient Wireless Sensor Networks with Novel Recovery Strategies , 2009, 2009 IEEE Wireless Communications and Networking Conference.

[9]  Geetha Jayakumar,et al.  Performance Comparison of Two On-demand Routing Protocols for Ad-hoc Networks based on Random Way Point Mobility Model , 2008 .

[10]  Tracy Camp,et al.  Comparison of broadcasting techniques for mobile ad hoc networks , 2002, MobiHoc '02.

[11]  Mohammad S. Obaidat,et al.  A high efficient node capture attack algorithm in wireless sensor network based on route minimum key set , 2013, Secur. Commun. Networks.

[12]  Wenyuan Xu,et al.  The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.

[13]  Feng Xia,et al.  Enhancing Efficiency of Node Compromise Attacks in Vehicular Ad-hoc Networks Using Connected Dominating Set , 2013, Mobile Networks and Applications.

[14]  Jie Wu,et al.  An extended localized algorithm for connected dominating set formation in ad hoc wireless networks , 2004, IEEE Transactions on Parallel and Distributed Systems.

[15]  Sajal K. Das,et al.  Modeling node compromise spread in wireless sensor networks using epidemic theory , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).

[16]  Peng-Jun Wan,et al.  Distributed Construction of Connected Dominating Set in Wireless Ad Hoc Networks , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.

[17]  Wenyuan Xu,et al.  Jamming sensor networks: attack and defense strategies , 2006, IEEE Network.

[18]  Arthur L. Liestman,et al.  Approximating minimum size weakly-connected dominating sets for clustering mobile ad hoc networks , 2002, MobiHoc '02.

[19]  A. Perrig,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[20]  Faramarz Fekri,et al.  Node compromise attacks and network connectivity , 2007, SPIE Defense + Commercial Sensing.

[21]  Tassos Dimitriou,et al.  Launching a Sinkhole Attack in Wireless Sensor Networks; The Intruder Side , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.

[22]  Sajal K. Das,et al.  Deployment-aware modeling of node compromise spread in wireless sensor networks using epidemic theory , 2009, TOSN.

[23]  Radha Poovendran,et al.  Vulnerability of Network Traffic under Node Capture Attacks Using Circuit Theoretic Analysis , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[24]  Radha Poovendran,et al.  Modeling adaptive node capture attacks in multi-hop wireless networks , 2007, Ad Hoc Networks.

[25]  Chong-kwon Kim,et al.  Multicast tree construction and flooding in wireless ad hoc networks , 2000, MSWIM '00.

[26]  Chi Lin,et al.  Enhancing the attacking efficiency of the node capture attack in WSN: a matrix approach , 2013, The Journal of Supercomputing.

[27]  Radha Poovendran,et al.  Node capture attacks in wireless sensor networks: A system theoretic approach , 2010, 49th IEEE Conference on Decision and Control (CDC).