DocumentCode :
2588005
Title :
Protecting Sensor Networks using Risk Analysis
Author :
Thomas, Johnson P. ; Mulpuru, Venkata M. ; Shen, Zheng Ming ; Mohan, L. Chandra ; Zhu, Ling
Author_Institution :
Dept. of Comput. Sci., Oklahoma State Univ., Oklahoma City, OK
fYear :
2008
fDate :
6-8 Aug. 2008
Firstpage :
582
Lastpage :
587
Abstract :
Nodes in a sensor network possess minimal computational, storage and communications resources as well as limited energy supplies. Consequently implementing security mechanisms such as encryption is expensive in such networks. Typically a node will employ security mechanisms at all times. If a node can invoke defense mechanisms only when it is under threat from a malicious attacker, resources can be conserved. In this work we use a mixed strategy game to model attackers and defenders in a sensor network. The game is based on the risk level among other parameters. Since risk is difficult to quantify, we use a fuzzy logic model for risk assessment. The proposed game model suggests that there are times when defending is not worth the cost.
Keywords :
fuzzy logic; game theory; risk analysis; telecommunication security; wireless sensor networks; communications resources; fuzzy logic; malicious attacker; risk analysis; risk assessment; security mechanisms; sensor networks; storage resources; Computer networks; Computer science; Costs; Cryptography; Energy storage; Fuzzy logic; Game theory; Protection; Risk analysis; Risk management;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Wireless Communications and Mobile Computing Conference, 2008. IWCMC '08. International
Conference_Location :
Crete Island
Print_ISBN :
978-1-4244-2201-2
Electronic_ISBN :
978-1-4244-2202-9
Type :
conf
DOI :
10.1109/IWCMC.2008.101
Filename :
4600000
Link To Document :
بازگشت