DocumentCode :
2947486
Title :
Modeling node capture attacks in wireless sensor networks
Author :
Tague, Patrick ; Poovendran, Radha
Author_Institution :
Electr. Eng. Dept., Univ. of Washington, Seattle, WA
fYear :
2008
fDate :
23-26 Sept. 2008
Firstpage :
1221
Lastpage :
1224
Abstract :
We formalize a model for node capture attacks in which an adversary collects information about the network via eavesdropping on the wireless medium and captures nodes based on the learned information. We show that attacks in this adversary model correspond to NP-hard optimization problems and discuss the behavior of a reasonable heuristic algorithm. We show that the goals of node capture attacks can be decomposed into a collection of primitive events, the impact of which can be evaluated and recombined to yield an overall evaluation of the attack. We demonstrate the use of the attack decomposition model for derivation of attack metrics and discuss the potential use of this decomposition technique for the purposes of defense against node capture attacks.
Keywords :
computational complexity; optimisation; telecommunication security; wireless sensor networks; NP-hard optimization problems; adversary model; attack decomposition model; heuristic algorithm; node capture attack modeling; wireless medium; wireless sensor networks; Access protocols; Collaborative work; Cryptography; Data mining; Hardware; Heuristic algorithms; Information security; Sensor phenomena and characterization; US Government; Wireless sensor networks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Communication, Control, and Computing, 2008 46th Annual Allerton Conference on
Conference_Location :
Urbana-Champaign, IL
Print_ISBN :
978-1-4244-2925-7
Electronic_ISBN :
978-1-4244-2926-4
Type :
conf
DOI :
10.1109/ALLERTON.2008.4797699
Filename :
4797699
Link To Document :
بازگشت