Skip to main content
Erschienen in: The Journal of Supercomputing 10/2018

03.04.2018

SCOUT: a sink camouflage and concealed data delivery paradigm for circumvention of sink-targeted cyber threats in wireless sensor networks

verfasst von: Saqib Ubaid, M. Farrukh Shafeeq, Majid Hussain, Ali Hammad Akbar, Abdelrahman Abuarqoub, M. Sultan Zia, Beenish Abbas

Erschienen in: The Journal of Supercomputing | Ausgabe 10/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In modern epoch of cyber warfare and their countermeasures, wireless sensor networks (WSNs) are highly susceptible to cyber attacks due to their primary reliance over sink. WSNs perform routing and communication to deliver data from sources to sink. In this many-to-one communication paradigm, while some failure might be affordable at the many sources side, the single sink cannot be allowed any downtime, let alone be a failure. In a WSN security attack scenario, an attacker makes efforts to bring a sink down by identifying and capturing it. The current state of the art in sink protection schemes prevents such failures by preserving its privacy through letting it operate in promiscuous and all-the-time listening mode. However, such operation is still vulnerable to privacy divulgence because the attacker detects its all-the-time listening operation and identifies it. Furthermore, listening is an energy-expensive operation in WSNs that makes the sink battery die very quickly. In this paper, we propose a new sink privacy preservation scheme that defines the role of cooperating nodes. These cooperating nodes create a camouflage around the sink such that the location of the sink is never revealed. Such operational dispositioning reduces the susceptibility of WSNs generally and sink, particularly against the sink-targeted cyber attacks. Since the sink adopts sleep schedule, our scheme is energy efficient as well.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Karlof C, Sastry N, Wagner D (2004) Tinysec: a link layer security architecture for wireless sensor networks. In: International Conference on Embedded Networked Sensor Systems, pp 162–175 Karlof C, Sastry N, Wagner D (2004) Tinysec: a link layer security architecture for wireless sensor networks. In: International Conference on Embedded Networked Sensor Systems, pp 162–175
2.
Zurück zum Zitat Drissi J, Gu Q (2006) Localized broadcast authentication in large sensor networks. In: ICNS Drissi J, Gu Q (2006) Localized broadcast authentication in large sensor networks. In: ICNS
3.
Zurück zum Zitat Eschenauer L, Gligor VD (2002) A key-management scheme for distributed sensor networks. In: ACM CCS, pp 41–47 Eschenauer L, Gligor VD (2002) A key-management scheme for distributed sensor networks. In: ACM CCS, pp 41–47
4.
Zurück zum Zitat Zhu S, Xu S, Setia S, Jajodia S (2003) Establishing pairwise keys for secure communication in ad hoc networks: a probabilistic approach. In: IEEE ICNP, pp 326–335 Zhu S, Xu S, Setia S, Jajodia S (2003) Establishing pairwise keys for secure communication in ad hoc networks: a probabilistic approach. In: IEEE ICNP, pp 326–335
5.
Zurück zum Zitat Xi Y, Schwiebert L, Shi W (2006) Preserving source location privacy in monitoring-based wireless sensor networks. In: Proceedings of Parallel and Distributed Processing Symposium Xi Y, Schwiebert L, Shi W (2006) Preserving source location privacy in monitoring-based wireless sensor networks. In: Proceedings of Parallel and Distributed Processing Symposium
6.
Zurück zum Zitat Mehta K, Liu D, Wright M (2007) Location privacy in sensor networks against a global eavesdropper. In: Proceedings of IEEE International Conference on Network Protocols Mehta K, Liu D, Wright M (2007) Location privacy in sensor networks against a global eavesdropper. In: Proceedings of IEEE International Conference on Network Protocols
7.
Zurück zum Zitat Kamat P, Zhang Y, Trappe W, Ozturk C (2005) Enhancing source location privacy in sensor network routing. In: Proceedings of IEEE ICDCS, pp 599–608 Kamat P, Zhang Y, Trappe W, Ozturk C (2005) Enhancing source location privacy in sensor network routing. In: Proceedings of IEEE ICDCS, pp 599–608
8.
Zurück zum Zitat Raza M et al (2017) A critical analysis of research potential, challenges and future directives in industrial wireless sensor networks. IEEE Commun Surv Tutor 20(1):39–95CrossRef Raza M et al (2017) A critical analysis of research potential, challenges and future directives in industrial wireless sensor networks. IEEE Commun Surv Tutor 20(1):39–95CrossRef
9.
Zurück zum Zitat Gu Q, Chen X (2008) Privacy-preserving mobility control protocols in wireless sensor networks. In: The International Symposium on Parallel Architectures, Algorithms, and Networks, IEEE, pp 159–164 Gu Q, Chen X (2008) Privacy-preserving mobility control protocols in wireless sensor networks. In: The International Symposium on Parallel Architectures, Algorithms, and Networks, IEEE, pp 159–164
10.
Zurück zum Zitat Jiang Z, Wu J, Kline R (2007) Mobility control for achieving optimal configuration in mobile networks. Technical Report, Department of Computer Science, West Chester University Jiang Z, Wu J, Kline R (2007) Mobility control for achieving optimal configuration in mobile networks. Technical Report, Department of Computer Science, West Chester University
11.
Zurück zum Zitat S. Muhammad, Z. Furqan, R. Guha, “Wireless sensor network security: a secure sink node architecture” IEEE International Conference on Performance, Computing, and Communications Conference, IPCCC 2005 S. Muhammad, Z. Furqan, R. Guha, “Wireless sensor network security: a secure sink node architecture” IEEE International Conference on Performance, Computing, and Communications Conference, IPCCC 2005
12.
Zurück zum Zitat Chen X, Jiang Z, Wu J (2007) Quick convergence mobility control schemes in wireless sensor networks. Technical Report, Texas State University Chen X, Jiang Z, Wu J (2007) Quick convergence mobility control schemes in wireless sensor networks. Technical Report, Texas State University
13.
Zurück zum Zitat Golden Berg C, Lin J, Morse A, Rosen B, Yang Y (2004) Towards mobility as a networks control primitive. In: Proceeding of 5th ACM International Symposium on Mobile Ad Hoc Networking and Computing (Mobihoc’ 04), pp 163–174 Golden Berg C, Lin J, Morse A, Rosen B, Yang Y (2004) Towards mobility as a networks control primitive. In: Proceeding of 5th ACM International Symposium on Mobile Ad Hoc Networking and Computing (Mobihoc’ 04), pp 163–174
14.
Zurück zum Zitat Deng J, Han R, Mishra S (2005) Countermeasures against traffic analysis attacks in wireless sensor networks. In: Proceedings of IEEE/Create NetInternational Conference on Security and Privacy for Emerging Areas in Communication Networks (SecureComm) Deng J, Han R, Mishra S (2005) Countermeasures against traffic analysis attacks in wireless sensor networks. In: Proceedings of IEEE/Create NetInternational Conference on Security and Privacy for Emerging Areas in Communication Networks (SecureComm)
15.
Zurück zum Zitat Ngai E (2009) On providing sink anonymity for sensor networks. In: International Conference on Wireless Communications and Mobile Computing 2009 Ngai E (2009) On providing sink anonymity for sensor networks. In: International Conference on Wireless Communications and Mobile Computing 2009
16.
Zurück zum Zitat Prathima EG et al (2017) DAMS: data aggregation using mobile sink in wireless sensor networks. In: Proceedings of the 5th International Conference on Communications and Broadband Networking. ACM Prathima EG et al (2017) DAMS: data aggregation using mobile sink in wireless sensor networks. In: Proceedings of the 5th International Conference on Communications and Broadband Networking. ACM
17.
Zurück zum Zitat Jabbar S et al (2014) VISTA: achieving cumulative vision through energy efficient Silhouette recognition of mobile targets through collaboration of visual sensor nodes. EURASIP J Image Video Process 1:32CrossRef Jabbar S et al (2014) VISTA: achieving cumulative vision through energy efficient Silhouette recognition of mobile targets through collaboration of visual sensor nodes. EURASIP J Image Video Process 1:32CrossRef
19.
Zurück zum Zitat Hussain M et al (2016) A gateway deployment heuristic for enhancing the availability of sensor grids. Int J Distrib Sens Netw 12(8):7595038CrossRef Hussain M et al (2016) A gateway deployment heuristic for enhancing the availability of sensor grids. Int J Distrib Sens Netw 12(8):7595038CrossRef
20.
Zurück zum Zitat Zhu J, Zou Y, Zheng B (2017) Physical-layer security and reliability challenges for industrial wireless sensor networks. In: Proceedings of IEEE, pp 5313–5320 Zhu J, Zou Y, Zheng B (2017) Physical-layer security and reliability challenges for industrial wireless sensor networks. In: Proceedings of IEEE, pp 5313–5320
21.
Zurück zum Zitat Bartariya S, Rastogi A (2016) Security in wireless sensor networks: attacks and solutions. Int J Adv Res Comput Comm Eng 5(3) Bartariya S, Rastogi A (2016) Security in wireless sensor networks: attacks and solutions. Int J Adv Res Comput Comm Eng 5(3)
22.
Zurück zum Zitat Muhammad T, Ferzund J, Jabbar S, Shahzadi R (2017) Towards designing efficient lightweight ciphers for internet of things. KSII Trans Internet Inf Syst 11(8):4006–4024 Muhammad T, Ferzund J, Jabbar S, Shahzadi R (2017) Towards designing efficient lightweight ciphers for internet of things. KSII Trans Internet Inf Syst 11(8):4006–4024
23.
Zurück zum Zitat Malik KR, Ahmad T et al (2016) Big-data: transformation from heterogeneous data to semantically-enriched simplified data. Multimed Tools Appl 75:12727CrossRef Malik KR, Ahmad T et al (2016) Big-data: transformation from heterogeneous data to semantically-enriched simplified data. Multimed Tools Appl 75:12727CrossRef
24.
Zurück zum Zitat Jabbar S, Naseer K, Gohar M, Rho S, Chang H (2016) Trust model at service layer of cloud computing for educational institutes. J Supercomput 72:58CrossRef Jabbar S, Naseer K, Gohar M, Rho S, Chang H (2016) Trust model at service layer of cloud computing for educational institutes. J Supercomput 72:58CrossRef
Metadaten
Titel
SCOUT: a sink camouflage and concealed data delivery paradigm for circumvention of sink-targeted cyber threats in wireless sensor networks
verfasst von
Saqib Ubaid
M. Farrukh Shafeeq
Majid Hussain
Ali Hammad Akbar
Abdelrahman Abuarqoub
M. Sultan Zia
Beenish Abbas
Publikationsdatum
03.04.2018
Verlag
Springer US
Erschienen in
The Journal of Supercomputing / Ausgabe 10/2018
Print ISSN: 0920-8542
Elektronische ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-018-2346-1

Weitere Artikel der Ausgabe 10/2018

The Journal of Supercomputing 10/2018 Zur Ausgabe