• DocumentCode
    2021389
  • Title

    Di-Sec: A distributed security framework for heterogeneous Wireless Sensor Networks

  • Author

    Valero, Marco ; Jung, Sang Shin ; Uluagac, A. Selcuk ; Li, Yingshu ; Beyah, Raheem

  • Author_Institution
    Dept. of Comput. Sci., Georgia State Univ., Atlanta, GA, USA
  • fYear
    2012
  • fDate
    25-30 March 2012
  • Firstpage
    585
  • Lastpage
    593
  • Abstract
    Wireless Sensor Networks (WSNs) are deployed for monitoring in a range of critical domains (e.g., health care, military, critical infrastructure). Accordingly, these WSNs should be resilient to attacks. The current approach to defending against malicious threats is to develop and deploy a specific defense mechanism for a specific attack. However, the problem with this traditional approach to defending sensor networks is that the solution for the Jamming attack does not defend against other attacks (e.g., Sybil and Selective Forwarding). In reality, one cannot know a priori what type of attack an adversary will launch. This work addresses the challenges with the traditional approach to securing sensor networks and presents a comprehensive framework, Di-Sec, that can defend against all known and forthcoming attacks. At the heart of Di-Sec lies the monitoring core (M-Core), which is an extensible and lightweight layer that gathers statistics relevant for the defense mechanisms. The M-Core allows for the monitoring of both internal and external threats and supports the execution of multiple detection and defense mechanisms (DDMs) against different threats in parallel. Along with Di-Sec, a new user-friendly domain-specific language was developed, the M-Core Control Language (MCL). Using the MCL, a user can implement new defense mechanisms without the overhead of learning the details of the underlying software architecture (i.e., TinyOS, Di-Sec). Hence, the MCL expedites the development of sensor defense mechanisms by significantly simplifying the coding process for developers. The Di-Sec framework has been implemented and tested on real sensors to evaluate its feasibility and performance. Our evaluation of memory, communication, and sensing components shows that Di-Sec is feasible on today´s resource-limited sensors and has a nominal overhead. Furthermore, we illustrate the basic functionality of Di-Sec by implementing and simultaneously executing DDMs for attacks at v- rious layers of the communication stack (i.e., Jamming, Selective Forwarding, Sybil, and Internal attacks).
  • Keywords
    encoding; jamming; telecommunication security; wireless sensor networks; Di-Sec; M-Core control language; Sybil; TinyOS; coding process; communication; critical infrastructure; distributed security framework; health care; internal attacks; jamming attack; memory; military; monitoring core; multiple detection; selective forwarding; sensing components; sensor defense mechanisms; software architecture; wireless sensor networks; Computational modeling; Computer architecture; Jamming; Monitoring; Security; Sensors; Wireless sensor networks; Distributed Security Framework; M-Core Control Language (MCL); Wireless Sensor Network Security;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    INFOCOM, 2012 Proceedings IEEE
  • Conference_Location
    Orlando, FL
  • ISSN
    0743-166X
  • Print_ISBN
    978-1-4673-0773-4
  • Type

    conf

  • DOI
    10.1109/INFCOM.2012.6195801
  • Filename
    6195801