Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks

Jing Deng, Richard Han, Shivakant Mishra

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

152 Citations (Scopus)

Abstract

Wireless sensor networks face acute security concerns in applications such as battlefield monitoring. A central point of failure in a sensor network is the base station, which acts as a collection point of sensor data. In this paper, we investigate two attacks that can lead to isolation or failure of the base station. In one set of attacks, the base station is isolated by blocking communication between sensor nodes and the base station, e.g. by DOS attacks. In the second attack, the location of the base station is deduced by analyzing data traffic towards the base station, which can lead to jamming and/or discovery and destruction of the base station. To defend against these attacks, two secure strategies are proposed. First, secure multi-path routing to multiple destination base stations is designed to provide intrusion tolerance against isolation of a base station. Second, anti-traffic analysis strategies are proposed to help disguise the location of the base station from eavesdroppers. A performance evaluation is provided for a simulated sensor network, as well as measurements of cryptographic overhead on real sensor nodes.
Original languageEnglish
Title of host publication2004 International Conference on Dependable Systems and Networks (DSN)
Place of PublicationLos Alamitos, California
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Pages637-646
Number of pages10
ISBN (Print)0769520529
DOIs
Publication statusPublished - 2004
Externally publishedYes
Event2004 International Conference on Dependable Systems and Networks (DSN) - Florence, Italy
Duration: 28 Jun 20041 Jul 2004

Conference

Conference2004 International Conference on Dependable Systems and Networks (DSN)
CountryItaly
CityFlorence
Period28/06/041/07/04

Fingerprint Dive into the research topics of 'Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks'. Together they form a unique fingerprint.

Cite this