DocumentCode
2412959
Title
Defending Sensor Worm Attack Using Software Diversity Approach
Author
Liu, Yang ; Zhang, Weiyi ; Bai, Shi ; Wang, Chonggang
Author_Institution
Dept. of Comput. Sci., North Dakota State Univ., Fargo, ND, USA
fYear
2011
fDate
5-9 June 2011
Firstpage
1
Lastpage
5
Abstract
Recently, the sensor worm attack has been identified to be one of the serious threats to the wireless sensor networks. However, sensor nodes do not have complicated hardware architectures or operating systems to protect program safety. Sensor worms can exploit the vulnerabilities of sensor nodes, such as the vulnerability of the buffer-overflow. In this paper, we utilize a software diversity approach to defend the sensor worm attacks. A Worm Attack DEfence (WADE) problem, which is to minimize the total number of defective edges with limited software versions, is defined in this paper. To solve the WADE problem, we present a role-base graph coloring scheme. Simulation results illustrate the efficiency and efficacy of our approach.
Keywords
graph colouring; operating systems (computers); software architecture; telecommunication computing; telecommunication security; wireless sensor networks; WADE problem; buffer-overflow; defective edges; defending sensor worm attack; hardware architectures; operating systems; program safety; role-base graph coloring scheme; sensor nodes; software diversity approach; software versions; vulnerability; wireless sensor networks; worm attack defence problem; Bridges; Clustering algorithms; Color; Grippers; Peer to peer computing; Software; Wireless sensor networks;
fLanguage
English
Publisher
ieee
Conference_Titel
Communications (ICC), 2011 IEEE International Conference on
Conference_Location
Kyoto
ISSN
1550-3607
Print_ISBN
978-1-61284-232-5
Electronic_ISBN
1550-3607
Type
conf
DOI
10.1109/icc.2011.5962857
Filename
5962857
Link To Document