• DocumentCode
    2412959
  • Title

    Defending Sensor Worm Attack Using Software Diversity Approach

  • Author

    Liu, Yang ; Zhang, Weiyi ; Bai, Shi ; Wang, Chonggang

  • Author_Institution
    Dept. of Comput. Sci., North Dakota State Univ., Fargo, ND, USA
  • fYear
    2011
  • fDate
    5-9 June 2011
  • Firstpage
    1
  • Lastpage
    5
  • Abstract
    Recently, the sensor worm attack has been identified to be one of the serious threats to the wireless sensor networks. However, sensor nodes do not have complicated hardware architectures or operating systems to protect program safety. Sensor worms can exploit the vulnerabilities of sensor nodes, such as the vulnerability of the buffer-overflow. In this paper, we utilize a software diversity approach to defend the sensor worm attacks. A Worm Attack DEfence (WADE) problem, which is to minimize the total number of defective edges with limited software versions, is defined in this paper. To solve the WADE problem, we present a role-base graph coloring scheme. Simulation results illustrate the efficiency and efficacy of our approach.
  • Keywords
    graph colouring; operating systems (computers); software architecture; telecommunication computing; telecommunication security; wireless sensor networks; WADE problem; buffer-overflow; defective edges; defending sensor worm attack; hardware architectures; operating systems; program safety; role-base graph coloring scheme; sensor nodes; software diversity approach; software versions; vulnerability; wireless sensor networks; worm attack defence problem; Bridges; Clustering algorithms; Color; Grippers; Peer to peer computing; Software; Wireless sensor networks;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Communications (ICC), 2011 IEEE International Conference on
  • Conference_Location
    Kyoto
  • ISSN
    1550-3607
  • Print_ISBN
    978-1-61284-232-5
  • Electronic_ISBN
    1550-3607
  • Type

    conf

  • DOI
    10.1109/icc.2011.5962857
  • Filename
    5962857