A Hybrid Approach for Path Vulnerability Matrix on Random Key Predistribution for Wireless Sensor Networks

被引:0
|
作者
Priyanka Ahlawat
Mayank Dave
机构
[1] National Institute of Technology,Department of Computer Engineering
来源
关键词
Vulnerability model; Node capture attack; Secure routing; Random key predistribution scheme;
D O I
暂无
中图分类号
学科分类号
摘要
In this paper, we address the problem of physical node capture attack from an adversarial view. In this type of attack, an adversary intelligently captures the node(s) and extracts the cryptographic information to destroy the privacy, safety and reliability of the network. We propose a novel hybrid approach for constructing the path vulnerability matrix that maximizes the attacking efficiency and lowers the resource expenditure of the adversary. The main strength of the proposed matrix lies in incorporating various criteria such as the type of application running on the nodes, capturing cost, key dominance ranking, articulation point and intersecting shortest path nodes in estimating the vulnerability. The location of the data sink is considered as a major factor in estimating the vulnerability of the nodes in the network. The proposed matrix is compared with existing attacking strategies in terms of the number of attacking rounds, energy cost and fraction of compromised traffic. Although in this paper, we have considered adversarial point of view but the proposed matrix can be extended for the defender application also. The path vulnerability matrix provides vulnerability estimation that can be used to analyze system security weakness and helps to defend against them effectively and efficiently. The performance of proposed approach has been validated with respect to average path compromise ratio, average routing path length and average route successful ratio. We have also introduced an attack resistant random key predistribution scheme based on the proposed approach and the results confirm its effectiveness in decreasing node capture impact.
引用
收藏
页码:3327 / 3353
页数:26
相关论文
共 50 条
  • [1] A Hybrid Approach for Path Vulnerability Matrix on Random Key Predistribution for Wireless Sensor Networks
    Ahlawat, Priyanka
    Dave, Mayank
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 94 (04) : 3327 - 3353
  • [2] Key Predistribution Approach in Wireless Sensor Networks Using LU Matrix
    Dai, Hangyang
    Xu, Hongbing
    IEEE SENSORS JOURNAL, 2010, 10 (08) : 1399 - 1409
  • [3] On Applicability of Random Graphs for Modeling Random Key Predistribution for Wireless Sensor Networks
    Tuan Manh Vu
    Safavi-Naini, Reihaneh
    Williamson, Carey
    STABILIZATION, SAFETY, AND SECURITY OF DISTRIBUTED SYSTEMS, 2010, 6366 : 159 - 175
  • [4] Random key predistribution for wireless sensor networks using deployment knowledge
    Jaworski, J.
    Ren, M.
    Rybarczyk, K.
    COMPUTING, 2009, 85 (1-2) : 57 - 76
  • [5] Random key predistribution for wireless sensor networks using deployment knowledge
    J. Jaworski
    M. Ren
    K. Rybarczyk
    Computing, 2009, 85 : 57 - 76
  • [6] A Key Predistribution Scheme with Matrix Decomposition for Secure Wireless Sensor Networks
    Dai, Hangyang
    Xu, Hongbing
    2008 7TH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-23, 2008, : 1724 - 1727
  • [7] A Robust on-Demand Path-Key Establishment Framework via Random Key Predistribution for Wireless Sensor Networks
    Guanfeng Li
    Hui Ling
    Taieb Znati
    Weili Wu
    EURASIP Journal on Wireless Communications and Networking, 2006
  • [8] A robust on-demand path-key establishment framework via random key predistribution for wireless sensor networks
    Li, Guanfeng
    Ling, Hui
    Znati, Taieb
    Wu, Weili
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2006, 2006 (1) : 1 - 10
  • [9] Random key predistribution schemes for sensor networks
    Chan, HW
    Perrig, A
    Song, D
    2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, : 197 - 213
  • [10] Scalable grouping random key predistribution in large scale wireless sensor networks
    Chuang, Po-Jen
    Chao, Tun-Hao
    Li, Bo-Yi
    Tamkang Journal of Science and Engineering, 2009, 12 (02): : 151 - 160