Adversary Information Gathering Model for Node Capture Attack in Wireless Sensor Networks

Node capture attack is considered to be one of the most serious attack in WSN. An adversary physically captures a node so that she can steal all the confidential information stored in it and can launch further attacks by deploying clones of a captured node. To achieve this she needs to gather useful information regarding the network before capturing a node. Hence, a node capture by an adversary depends on how quickly she is able to gather the information regarding the network and about the target node. In this paper we have proposed a model for the process of gathering information by an adversary. We have also found the expected amount of information an adversary have at an arbitrary time t. Using the above information we proposed the expected time of a node capture based on the strength of an adversary and the dynamicity of the network.

[1]  Hiren Kumar Deva Sarma,et al.  Security Threats in Wireless Sensor Networks , 2006, Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology.

[2]  Yong Wang,et al.  A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.

[3]  Adrian Perrig,et al.  Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[4]  Radha Poovendran,et al.  Vulnerability of Network Traffic under Node Capture Attacks Using Circuit Theoretic Analysis , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[5]  D. T. Lee,et al.  Attack Probability Based Deterministic Key Predistribution Mechanism for Non-Uniform Sensor Deployment , 2007, 27th International Conference on Distributed Computing Systems Workshops (ICDCSW'07).

[6]  Radha Poovendran,et al.  Modeling adaptive node capture attacks in multi-hop wireless networks , 2007, Ad Hoc Networks.

[7]  Radha Poovendran,et al.  Mitigation of Control Channel Jamming under Node Capture Attacks , 2009, IEEE Transactions on Mobile Computing.

[8]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[9]  Sushma,et al.  Security Threats in Wireless Sensor Networks , 2011 .

[10]  Tomoyuki Ohta,et al.  Secure decentralized data transfer against node capture attacks for wireless sensor networks , 2009, 2009 International Symposium on Autonomous Decentralized Systems.

[11]  Yacine Challal,et al.  Node capture attack impact on key management schemes for heterogeneous wireless sensor networks , 2009, 2009 Global Information Infrastructure Symposium.

[12]  David A. Wagner,et al.  Security in wireless sensor networks , 2004, SASN '04.

[13]  J. Medhi,et al.  Stochastic Processes , 1982 .

[14]  R. Poovendran,et al.  Modeling node capture attacks in wireless sensor networks , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.

[15]  Zinaida Benenson,et al.  Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks , 2006, SPC.

[16]  Song Guo,et al.  A robust pair-wise rekeying protocol in hierarchical wireless sensor networks , 2009, Co-Next Student Workshop '09.

[17]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[18]  Sumanth Yenduri,et al.  First stage detection of compromised nodes in sensor networks , 2010, 2010 IEEE Sensors Applications Symposium (SAS).

[19]  Roberto Di Pietro,et al.  Emergent properties: detection of the node-capture attack in mobile wireless sensor networks , 2008, WiSec '08.

[20]  Sheldon M. Ross Introduction to Probability Models. , 1995 .

[21]  Samuel Karlin,et al.  A First Course on Stochastic Processes , 1968 .

[22]  Sajal K. Das,et al.  Fast Detection of Replica Node Attacks in Mobile Sensor Networks Using Sequential Analysis , 2009, IEEE INFOCOM 2009.