Skip to main content

2013 | OriginalPaper | Buchkapitel

50. Design of Security Schemes for Wireless Sensor Networks Based on Attack Behavior: Proactive Approach

verfasst von : Anusha Anigol, Roshan Ahmed, R. C. Biradar

Erschienen in: Proceedings of International Conference on VLSI, Communication, Advanced Devices, Signals & Systems and Networking (VCASAN-2013)

Verlag: Springer India

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Wireless sensor networks (WSNs) are one of the emerging network fields, with a tremendous prospect to research and contributing itself in a vast arena of applications. In any sort of network, the utmost priority is given to its security feature, since any means of communication demands the need of securing and safe guarding the sensitive data from the adversary. Even WSNs are also susceptible to any offenders attacks. In this paper, an attempt is made to design an perpetual proactive security scheme at the sink node using sniffing mechanism of intrusion detection system by studying the behavioral aspect of the sensor nodes due to attack and to monitor the system with an rescue mechanism.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Shetty S, Song, M, Ancel RAE, Bone K (2007) Wireless sensor payload design for sounding rocket. In: 22nd international conference on computers and their applications, March 2007 Shetty S, Song, M, Ancel RAE, Bone K (2007) Wireless sensor payload design for sounding rocket. In: 22nd international conference on computers and their applications, March 2007
2.
Zurück zum Zitat Culler D, Estrin D, Srivastava M (2004) Overview of sensor networks. IEEE Computer Society, Washington DC Culler D, Estrin D, Srivastava M (2004) Overview of sensor networks. IEEE Computer Society, Washington DC
3.
Zurück zum Zitat Akylidiz I, Su, W, Sankarasubramaniam Y, Cayrici E (2002) A survey on sensor networks. IEEE Commun Mag 40(8):102–114 Akylidiz I, Su, W, Sankarasubramaniam Y, Cayrici E (2002) A survey on sensor networks. IEEE Commun Mag 40(8):102–114
4.
Zurück zum Zitat Singh R, Singh DK, Kumar L (2010) A review on security issues in wireless sensor network. J Inf Syst Commun 1(1):01–07 Singh R, Singh DK, Kumar L (2010) A review on security issues in wireless sensor network. J Inf Syst Commun 1(1):01–07
5.
Zurück zum Zitat Ramen R, Lopez J, Gritzalis S (2008) Situation awareness mechanisms for wireless sensor networks. IEEE Commun Mag 46(4):102–107CrossRef Ramen R, Lopez J, Gritzalis S (2008) Situation awareness mechanisms for wireless sensor networks. IEEE Commun Mag 46(4):102–107CrossRef
6.
Zurück zum Zitat Khanna R, Lin H (2008) Control theoretic approach to intrusion detection using distributed hidden Markov model. IEEE Wirel Commun 15(4):24–33CrossRef Khanna R, Lin H (2008) Control theoretic approach to intrusion detection using distributed hidden Markov model. IEEE Wirel Commun 15(4):24–33CrossRef
7.
Zurück zum Zitat Kachirski O, Guha RK (2003) Effective intrusion detection using multiple sensors in wireless ad hoc networks. In: Proceeding of the 36th annual Hawaii international conference on system sciences, Hawaii, USA, Jan 2003, pp 57–64 Kachirski O, Guha RK (2003) Effective intrusion detection using multiple sensors in wireless ad hoc networks. In: Proceeding of the 36th annual Hawaii international conference on system sciences, Hawaii, USA, Jan 2003, pp 57–64
8.
Zurück zum Zitat Chan SP, Poovendran R, Sun MT (2005) A key Management Scheme in: Distributed Sensor Networks Using Attack Probabilities. Proc IEEE GLOBECOM 2:1007–1011 Chan SP, Poovendran R, Sun MT (2005) A key Management Scheme in: Distributed Sensor Networks Using Attack Probabilities. Proc IEEE GLOBECOM 2:1007–1011
9.
Zurück zum Zitat Rajasegarar S, Leckie C, Palansiwami M (2008) Anomaly detection in wireless sensor networks. IEEE Wirel Commun 15(4):34–40CrossRef Rajasegarar S, Leckie C, Palansiwami M (2008) Anomaly detection in wireless sensor networks. IEEE Wirel Commun 15(4):34–40CrossRef
10.
Zurück zum Zitat Kakasageri MS, Manvi SS, Sorgavi GD (2006) Agent-based information access in wireless sensor networks. WSEAS Trans Commun 3(7):1369–1374 Kakasageri MS, Manvi SS, Sorgavi GD (2006) Agent-based information access in wireless sensor networks. WSEAS Trans Commun 3(7):1369–1374
11.
Zurück zum Zitat Cardei M, Wu J (2006) Energy-efficient coverage problems in wireless Ad-Hoc sensor networks. Comput Commun 29(4):413–420CrossRef Cardei M, Wu J (2006) Energy-efficient coverage problems in wireless Ad-Hoc sensor networks. Comput Commun 29(4):413–420CrossRef
13.
Zurück zum Zitat Wang X, Gu W, Schosek K, Chellappan S, Xuan D (2005) Lifetime optimization of sensor networks under physical attacks. In: Proceedings of IEEE international conference on communications (ICC), May 2005, pp 32953301 Wang X, Gu W, Schosek K, Chellappan S, Xuan D (2005) Lifetime optimization of sensor networks under physical attacks. In: Proceedings of IEEE international conference on communications (ICC), May 2005, pp 32953301
14.
Zurück zum Zitat Abrach H, Bhatti S, et.al (2003) MANTIS: System support for multimodal networks of in-situ sensors. In: 2nd ACM international workshop on wireless sensor networks and applications, pp 50–59 Abrach H, Bhatti S, et.al (2003) MANTIS: System support for multimodal networks of in-situ sensors. In: 2nd ACM international workshop on wireless sensor networks and applications, pp 50–59
15.
Zurück zum Zitat Blaze M, Feigenbaum J, Ioannidis J, Keromytis AD (1999) The key note trust management system version 2. Internet RFC 2704, Sept 1999 Blaze M, Feigenbaum J, Ioannidis J, Keromytis AD (1999) The key note trust management system version 2. Internet RFC 2704, Sept 1999
16.
Zurück zum Zitat Christodorescu M, Jha S, Seshia S, Song D, Bryant R (2005) Semantics aware malware detection. In Proceedings of IEEE symposium on security and privacy, Oakland, May 2005 Christodorescu M, Jha S, Seshia S, Song D, Bryant R (2005) Semantics aware malware detection. In Proceedings of IEEE symposium on security and privacy, Oakland, May 2005
17.
Zurück zum Zitat Christodorescu M, Jha S (2003) Static analysis of executables to detect malicious patterns. In: Proceedings of the 12th USENIX security symposium (Security 03), USENIX Association, Aug 2003, pp 169–186 Christodorescu M, Jha S (2003) Static analysis of executables to detect malicious patterns. In: Proceedings of the 12th USENIX security symposium (Security 03), USENIX Association, Aug 2003, pp 169–186
18.
Zurück zum Zitat Kruegel C, Robertson W, Vigna G (2004) Detecting kernel level root kits though binary analysis. In: Proceedings of the 20th annual computer security applications conference (ACSAC 04), Tucson, AZ, Dec 2004 Kruegel C, Robertson W, Vigna G (2004) Detecting kernel level root kits though binary analysis. In: Proceedings of the 20th annual computer security applications conference (ACSAC 04), Tucson, AZ, Dec 2004
19.
Zurück zum Zitat Resnick P, Zeckhauser R (2000) Trust among strangers in internet transactions: empirical analysis of eBays reputation system. In: Proceedings of NBER workshop on empirical studies of electronic commerce, 2000 Resnick P, Zeckhauser R (2000) Trust among strangers in internet transactions: empirical analysis of eBays reputation system. In: Proceedings of NBER workshop on empirical studies of electronic commerce, 2000
20.
Zurück zum Zitat Chen H, Wagner D (2002) MOPS: an infrastructure for examining security properties of software. In: Proceedings of the 9th ACM conference on computer and communications security, Nov 2002, pp 235–244 Chen H, Wagner D (2002) MOPS: an infrastructure for examining security properties of software. In: Proceedings of the 9th ACM conference on computer and communications security, Nov 2002, pp 235–244
21.
Zurück zum Zitat Michiardi JP, Molva R (2002) Core: a collaborative reputation mechanism to enforce node cooperation in mobile Ad Hoc networks. In: IFIP communication and multimedia security conference Michiardi JP, Molva R (2002) Core: a collaborative reputation mechanism to enforce node cooperation in mobile Ad Hoc networks. In: IFIP communication and multimedia security conference
22.
Zurück zum Zitat Marti S, Giuli TJ, Lai K, Baker M (2000) Mitigating routing misbehavior in mobile ad hoc networks. In: 6th ACM international conference on mobile computing and networking, Aug 2000, pp 255–265 Marti S, Giuli TJ, Lai K, Baker M (2000) Mitigating routing misbehavior in mobile ad hoc networks. In: 6th ACM international conference on mobile computing and networking, Aug 2000, pp 255–265
Metadaten
Titel
Design of Security Schemes for Wireless Sensor Networks Based on Attack Behavior: Proactive Approach
verfasst von
Anusha Anigol
Roshan Ahmed
R. C. Biradar
Copyright-Jahr
2013
Verlag
Springer India
DOI
https://doi.org/10.1007/978-81-322-1524-0_50