DocumentCode :
2021389
Title :
Di-Sec: A distributed security framework for heterogeneous Wireless Sensor Networks
Author :
Valero, Marco ; Jung, Sang Shin ; Uluagac, A. Selcuk ; Li, Yingshu ; Beyah, Raheem
Author_Institution :
Dept. of Comput. Sci., Georgia State Univ., Atlanta, GA, USA
fYear :
2012
fDate :
25-30 March 2012
Firstpage :
585
Lastpage :
593
Abstract :
Wireless Sensor Networks (WSNs) are deployed for monitoring in a range of critical domains (e.g., health care, military, critical infrastructure). Accordingly, these WSNs should be resilient to attacks. The current approach to defending against malicious threats is to develop and deploy a specific defense mechanism for a specific attack. However, the problem with this traditional approach to defending sensor networks is that the solution for the Jamming attack does not defend against other attacks (e.g., Sybil and Selective Forwarding). In reality, one cannot know a priori what type of attack an adversary will launch. This work addresses the challenges with the traditional approach to securing sensor networks and presents a comprehensive framework, Di-Sec, that can defend against all known and forthcoming attacks. At the heart of Di-Sec lies the monitoring core (M-Core), which is an extensible and lightweight layer that gathers statistics relevant for the defense mechanisms. The M-Core allows for the monitoring of both internal and external threats and supports the execution of multiple detection and defense mechanisms (DDMs) against different threats in parallel. Along with Di-Sec, a new user-friendly domain-specific language was developed, the M-Core Control Language (MCL). Using the MCL, a user can implement new defense mechanisms without the overhead of learning the details of the underlying software architecture (i.e., TinyOS, Di-Sec). Hence, the MCL expedites the development of sensor defense mechanisms by significantly simplifying the coding process for developers. The Di-Sec framework has been implemented and tested on real sensors to evaluate its feasibility and performance. Our evaluation of memory, communication, and sensing components shows that Di-Sec is feasible on today´s resource-limited sensors and has a nominal overhead. Furthermore, we illustrate the basic functionality of Di-Sec by implementing and simultaneously executing DDMs for attacks at v- rious layers of the communication stack (i.e., Jamming, Selective Forwarding, Sybil, and Internal attacks).
Keywords :
encoding; jamming; telecommunication security; wireless sensor networks; Di-Sec; M-Core control language; Sybil; TinyOS; coding process; communication; critical infrastructure; distributed security framework; health care; internal attacks; jamming attack; memory; military; monitoring core; multiple detection; selective forwarding; sensing components; sensor defense mechanisms; software architecture; wireless sensor networks; Computational modeling; Computer architecture; Jamming; Monitoring; Security; Sensors; Wireless sensor networks; Distributed Security Framework; M-Core Control Language (MCL); Wireless Sensor Network Security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
INFOCOM, 2012 Proceedings IEEE
Conference_Location :
Orlando, FL
ISSN :
0743-166X
Print_ISBN :
978-1-4673-0773-4
Type :
conf
DOI :
10.1109/INFCOM.2012.6195801
Filename :
6195801
Link To Document :
بازگشت