DocumentCode :
2412959
Title :
Defending Sensor Worm Attack Using Software Diversity Approach
Author :
Liu, Yang ; Zhang, Weiyi ; Bai, Shi ; Wang, Chonggang
Author_Institution :
Dept. of Comput. Sci., North Dakota State Univ., Fargo, ND, USA
fYear :
2011
fDate :
5-9 June 2011
Firstpage :
1
Lastpage :
5
Abstract :
Recently, the sensor worm attack has been identified to be one of the serious threats to the wireless sensor networks. However, sensor nodes do not have complicated hardware architectures or operating systems to protect program safety. Sensor worms can exploit the vulnerabilities of sensor nodes, such as the vulnerability of the buffer-overflow. In this paper, we utilize a software diversity approach to defend the sensor worm attacks. A Worm Attack DEfence (WADE) problem, which is to minimize the total number of defective edges with limited software versions, is defined in this paper. To solve the WADE problem, we present a role-base graph coloring scheme. Simulation results illustrate the efficiency and efficacy of our approach.
Keywords :
graph colouring; operating systems (computers); software architecture; telecommunication computing; telecommunication security; wireless sensor networks; WADE problem; buffer-overflow; defective edges; defending sensor worm attack; hardware architectures; operating systems; program safety; role-base graph coloring scheme; sensor nodes; software diversity approach; software versions; vulnerability; wireless sensor networks; worm attack defence problem; Bridges; Clustering algorithms; Color; Grippers; Peer to peer computing; Software; Wireless sensor networks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Communications (ICC), 2011 IEEE International Conference on
Conference_Location :
Kyoto
ISSN :
1550-3607
Print_ISBN :
978-1-61284-232-5
Electronic_ISBN :
1550-3607
Type :
conf
DOI :
10.1109/icc.2011.5962857
Filename :
5962857
Link To Document :
بازگشت