Title :
Defending Sensor Worm Attack Using Software Diversity Approach
Author :
Liu, Yang ; Zhang, Weiyi ; Bai, Shi ; Wang, Chonggang
Author_Institution :
Dept. of Comput. Sci., North Dakota State Univ., Fargo, ND, USA
Abstract :
Recently, the sensor worm attack has been identified to be one of the serious threats to the wireless sensor networks. However, sensor nodes do not have complicated hardware architectures or operating systems to protect program safety. Sensor worms can exploit the vulnerabilities of sensor nodes, such as the vulnerability of the buffer-overflow. In this paper, we utilize a software diversity approach to defend the sensor worm attacks. A Worm Attack DEfence (WADE) problem, which is to minimize the total number of defective edges with limited software versions, is defined in this paper. To solve the WADE problem, we present a role-base graph coloring scheme. Simulation results illustrate the efficiency and efficacy of our approach.
Keywords :
graph colouring; operating systems (computers); software architecture; telecommunication computing; telecommunication security; wireless sensor networks; WADE problem; buffer-overflow; defective edges; defending sensor worm attack; hardware architectures; operating systems; program safety; role-base graph coloring scheme; sensor nodes; software diversity approach; software versions; vulnerability; wireless sensor networks; worm attack defence problem; Bridges; Clustering algorithms; Color; Grippers; Peer to peer computing; Software; Wireless sensor networks;
Conference_Titel :
Communications (ICC), 2011 IEEE International Conference on
Conference_Location :
Kyoto
Print_ISBN :
978-1-61284-232-5
Electronic_ISBN :
1550-3607
DOI :
10.1109/icc.2011.5962857