On Eavesdropping Attacks in Wireless Sensor Networks with Directional Antennas

被引:60
|
作者
Dai, Hong-Ning [1 ]
Wang, Qiu [1 ]
Li, Dong [1 ]
Wong, Raymond Chi-Wing [2 ]
机构
[1] Macau Univ Sci & Technol, Fac Informat Technol, Taipa, Macau, Peoples R China
[2] Hong Kong Univ Sci & Technol, Dept Comp Sci & Engn, Kowloon, Hong Kong, Peoples R China
关键词
AD HOC NETWORKS; MAC SCHEME; CAPACITY; DEAFNESS;
D O I
10.1155/2013/760834
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The eavesdropping attack is a serious security threat to a wireless sensor network (WSN) since the eavesdropping attack is a prerequisite for other attacks. Conventional WSNs consist of wireless nodes equipped with omnidirectional antennas, which broadcast radio signals in all directions and are consequently prone to the eavesdropping attacks. Different from omnidirectional antennas, directional antennas radiate radio signals on desired directions and potentially reduce the possibility of the eavesdropping attacks. In this paper, we propose a model to analyze the eavesdropping probability in both single-hop WSNs and multihop WSNs with omnidirectional antennas and directional antennas. We verify the correctness of our analytical model by conducting extensive simulations. We have found that using directional antennas in either single-hop WSNs or multihop WSNs can significantly reduce the eavesdropping probability. The reason of the improved security of WSNs with directional antennas lies in (i) the smaller exposure region of a directional antenna and (ii) the fewer hops to route a packet due to the longer transmission range of a directional antenna. Our results have also shown that the security improvement factor heavily depends on the node density, the antenna beamwidth, and the signal path loss factor.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] Eavesdropping Security in Wireless Ad Hoc Networks with Directional Antennas
    Wang, Qiu
    Dai, Hong-Ning
    Zhao, Qinglin
    [J]. 2013 22ND WIRELESS AND OPTICAL COMMUNICATIONS CONFERENCE (WOCC 2013), 2013, : 687 - 692
  • [2] On Connectivity of Wireless Sensor Networks with Directional Antennas
    Wang, Qiu
    Dai, Hong-Ning
    Zheng, Zibin
    Imran, Muhammad
    Vasilakos, Athanasios V.
    [J]. SENSORS, 2017, 17 (01)
  • [3] Impact of directional antennas in wireless sensor networks
    Dunlop, John
    Cortes, Joan
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR SYSTEMS, VOLS 1-3, 2007, : 899 - 904
  • [4] On Autonomous Clustering in Wireless Sensor Networks With Directional Antennas
    Chen, Ying-Chih
    Chung, Pei-Lun
    Wen, Chih-Yu
    [J]. 2010 FOURTH INTERNATIONAL CONFERENCE ON SENSOR TECHNOLOGIES AND APPLICATIONS (SENSORCOMM), 2008, : 531 - 538
  • [5] Location tracking with directional antennas in wireless sensor networks
    Yang, CL
    Bagchi, S
    Chappell, WJ
    [J]. 2005 IEEE MTT-S International Microwave Symposium, Vols 1-4, 2005, : 131 - 134
  • [6] Distributed Clustering With Directional Antennas for Wireless Sensor Networks
    Chen, Ying-Chih
    Wen, Chih-Yu
    [J]. IEEE SENSORS JOURNAL, 2013, 13 (06) : 2166 - 2180
  • [7] Symmetric Connectivity in Wireless Sensor Networks with Directional Antennas
    Tien Tran
    An, Min Kyung
    Huynh, D. T.
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2015, : 6400 - 6405
  • [8] On modeling eavesdropping attacks in wireless networks
    Li, Xuran
    Xu, Jianlong
    Dai, Hong-Ning
    Zhao, Qinglin
    Cheang, Chak Fong
    Wang, Qiu
    [J]. JOURNAL OF COMPUTATIONAL SCIENCE, 2015, 11 : 196 - 204
  • [9] Directional Antennas for Convergecast in Wireless Sensor Networks: Are They a Good Idea?
    Tarter, Giovanni
    Mottola, Luca
    Picco, Gian Pietro
    [J]. PROCEEDINGS 2016 IEEE 13TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SENSOR SYSTEMS (MASS 2016), 2016, : 172 - 182
  • [10] Fingerprinting localisation with cruciate directional antennas for wireless sensor networks
    Jiang, Jehn-Ruey
    Lin, Chih-Ming
    Cheng, Kai-Chao
    Huang, Shing-Tsaan
    [J]. INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2014, 15 (1-3) : 161 - 170