Skip to main content
Top

2021 | OriginalPaper | Chapter

Performance Analysis and Classification of Node Capture Attack Models in WSN

Authors : Rohit Bathla, Priyanka Ahlawat

Published in: Advanced Informatics for Computing Research

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Wireless sensor networks (WSN) is a network grid of several self organizing, free, low prices, low control, and functional sensor nodes. The application of these networks in military systems, battlefields, environmental monitoring, smart buildings, and health care exposing the sensor nodes to a variety of physical security attacks. The node capturing attack is the most significant attack. In this attack, the adversary physically catches nodes and extracts the confidential data from the memory of nodes. Thus, analysis of adversary behavior becomes very important in designing different defensive mechanisms for WSNs. The paper presents an exhaustive survey on several node capture attack models in the sensor network. The simulation results compare their performance such in energy cost, attacking rounds, and traffic compromise.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: 2003 Symposium on Security and Privacy, 2003, pp. 197–213. IEEE, May 2003 Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: 2003 Symposium on Security and Privacy, 2003, pp. 197–213. IEEE, May 2003
2.
go back to reference Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 41–47, November 2002 Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 41–47, November 2002
3.
go back to reference Du, W., Deng, J., Han, Y.S., Chen, S., Varshney, P.K.: A key management scheme for wireless sensor networks using deployment knowledge. In: IEEE INFOCOM 2004, vol. 1. IEEE, March 2004 Du, W., Deng, J., Han, Y.S., Chen, S., Varshney, P.K.: A key management scheme for wireless sensor networks using deployment knowledge. In: IEEE INFOCOM 2004, vol. 1. IEEE, March 2004
5.
go back to reference Ford, B.: An overview of hot-deck procedures. In: Incomplete Data in Sample Surveys, vol. 2 (1983) Ford, B.: An overview of hot-deck procedures. In: Incomplete Data in Sample Surveys, vol. 2 (1983)
7.
go back to reference Lin, C., Qiu, T., Obaidat, M.S., Yu, C.W., Yao, L., Wu, G.: MREA: a minimum resource expenditure node capture attack in wireless sensor networks. Secur. Commun. Netw. 9(18), 5502–5517 (2016)CrossRef Lin, C., Qiu, T., Obaidat, M.S., Yu, C.W., Yao, L., Wu, G.: MREA: a minimum resource expenditure node capture attack in wireless sensor networks. Secur. Commun. Netw. 9(18), 5502–5517 (2016)CrossRef
8.
go back to reference Shukla, P.K., Goyal, S., Wadhvani, R., Rizvi, M.A., Sharma, P., Tantubay, N.: Finding robust assailant using optimization functions (FiRAO-PG) in wireless sensor network. In: Mathematical Problems in Engineering, 2015 (2015) Shukla, P.K., Goyal, S., Wadhvani, R., Rizvi, M.A., Sharma, P., Tantubay, N.: Finding robust assailant using optimization functions (FiRAO-PG) in wireless sensor network. In: Mathematical Problems in Engineering, 2015 (2015)
9.
go back to reference Bhatt, R., Maheshwary, P., Shukla, P., Shukla, P., Shrivastava, M., Changlani, S.: Implementation of Fruit Fly Optimization Algorithm (FFOA) to escalate the attacking efficiency of node capture attack in Wireless Sensor Networks (WSN). Comput. Commun. 149, 134–145 (2020)CrossRef Bhatt, R., Maheshwary, P., Shukla, P., Shukla, P., Shrivastava, M., Changlani, S.: Implementation of Fruit Fly Optimization Algorithm (FFOA) to escalate the attacking efficiency of node capture attack in Wireless Sensor Networks (WSN). Comput. Commun. 149, 134–145 (2020)CrossRef
10.
go back to reference Tague, P., Slater, D., Rogers, J., Poovendran, R.: Vulnerability of network traffic under node capture attacks using circuit theoretic analysis. In: IEEE INFOCOM 2008-The 27th Conference on Computer Communications, pp. 161–165. IEEE, April 2008 Tague, P., Slater, D., Rogers, J., Poovendran, R.: Vulnerability of network traffic under node capture attacks using circuit theoretic analysis. In: IEEE INFOCOM 2008-The 27th Conference on Computer Communications, pp. 161–165. IEEE, April 2008
11.
go back to reference Ahlawat, P., Dave, M.: An attack model based highly secure key management scheme for wireless sensor networks. Procedia Comput. Sci. 125, 201–207 (2018)CrossRef Ahlawat, P., Dave, M.: An attack model based highly secure key management scheme for wireless sensor networks. Procedia Comput. Sci. 125, 201–207 (2018)CrossRef
12.
go back to reference Ahlawat, P., Dave, M.: An attack resistant key predistribution scheme for wireless sensor networks. J. King Saud Univ. Comput. Inf. Sci. 33, 268–280 (2021) Ahlawat, P., Dave, M.: An attack resistant key predistribution scheme for wireless sensor networks. J. King Saud Univ. Comput. Inf. Sci. 33, 268–280 (2021)
13.
go back to reference Bonaci, T., Bushnell, L., Poovendran, R.: Node capture attacks in wireless sensor networks: a system theoretic approach. In: 49th IEEE Conference on Decision and Control (CDC), pp. 6765–6772. IEEE, December 2010 Bonaci, T., Bushnell, L., Poovendran, R.: Node capture attacks in wireless sensor networks: a system theoretic approach. In: 49th IEEE Conference on Decision and Control (CDC), pp. 6765–6772. IEEE, December 2010
14.
go back to reference Zhu, Q., Bushnell, L., Başar, T.: Game-theoretic analysis of node capture and cloning attack with multiple attackers in wireless sensor networks. In: 2012 IEEE 51st IEEE Conference on Decision and Control (CDC), pp. 3404–3411. IEEE, December 2012 Zhu, Q., Bushnell, L., Başar, T.: Game-theoretic analysis of node capture and cloning attack with multiple attackers in wireless sensor networks. In: 2012 IEEE 51st IEEE Conference on Decision and Control (CDC), pp. 3404–3411. IEEE, December 2012
15.
go back to reference De, P., Liu, Y., Das, S.K.: Modeling node compromise spread in wireless sensor networks using epidemic theory. In: 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2006), 7 p. IEEE, June 2006 De, P., Liu, Y., Das, S.K.: Modeling node compromise spread in wireless sensor networks using epidemic theory. In: 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2006), 7 p. IEEE, June 2006
16.
go back to reference Ehdaie, M., Alexiou, N., Ahmadian, M., Aref, M.R., Papadimitratos, P.: Mitigating node capture attack in random key distribution schemes through key deletion. J. Commun. Eng. 6(2), 99–109 (2017) Ehdaie, M., Alexiou, N., Ahmadian, M., Aref, M.R., Papadimitratos, P.: Mitigating node capture attack in random key distribution schemes through key deletion. J. Commun. Eng. 6(2), 99–109 (2017)
17.
go back to reference Qin, T., Chen, H.: An enhanced scheme against node capture attack using hash-chain for wireless sensor networks. J. Inf. Technol. 11, 102–109 (2012)CrossRef Qin, T., Chen, H.: An enhanced scheme against node capture attack using hash-chain for wireless sensor networks. J. Inf. Technol. 11, 102–109 (2012)CrossRef
18.
go back to reference Wang, Z., Zhou, C., Liu, Y.: Efficient hybrid detection of node replication attacks in mobile sensor networks. Mobile Inf. Syst. 2017 (2017) Wang, Z., Zhou, C., Liu, Y.: Efficient hybrid detection of node replication attacks in mobile sensor networks. Mobile Inf. Syst. 2017 (2017)
Metadata
Title
Performance Analysis and Classification of Node Capture Attack Models in WSN
Authors
Rohit Bathla
Priyanka Ahlawat
Copyright Year
2021
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-16-3653-0_6

Premium Partner