DocumentCode :
2350978
Title :
A Sensor Network Design from a Probabilistic Automaton Model of Impersonation Attack
Author :
Roy, Suman ; Mukhopadhayay, Debapriyay ; Thejaswi, Chandrasekhara
Author_Institution :
Honeywell Technol. Solutions Lab., Bangalore
fYear :
0
fDate :
0-0 0
Firstpage :
1
Lastpage :
7
Abstract :
We envision a future where thousands to millions of small sensors for self-organizing wireless networks. As it provides solutions to many needs such as wireless communication, remote monitoring, surveillance etc. wireless networking will likely become widespread. Most applications will be done where wiring is impossible to install, or too expensive or where operating and supporting costs are prohibitively high. Thus one need to carefully design a wireless network considering lot of issues like network design, data compression, security parameters etc. We focus on one of such issues of security and provide an estimate of some design parameters of wireless networks. In wireless networks the fundamental nature of communication is broadcast, it is under the control of an adversary. It can modify messages and/or inject fresh messages into the network. It can also try to masquerade as node i and get message from other node. Hence impersonation attack which is a deception whereby one entity purports to be another is frequently occurring one. People have proposed pre-distribution schemes which substantially improve the resilience and security of the network and associated overhead. These schemes rely on probabilistic key sharing among the nodes of a random graph and uses simple protocols for shared-key discovery and path-key establishment. We model an impersonation attack in this framework in terms of a probabilistic automaton. Based on some security parameters we estimate network parameters. Various security and network connectivity parameters are also taken into account in the calculation
Keywords :
data compression; graph theory; parameter estimation; probabilistic automata; protocols; security of data; telecommunication security; wireless sensor networks; data compression; impersonation attack; network security; parameter estimation; path-key establishment; predistribution scheme; probabilistic automaton model; protocol; random graph; sensor network design; shared-key discovery; wireless network; Automata; Communication system security; Costs; Data security; Remote monitoring; Surveillance; Wireless communication; Wireless networks; Wireless sensor networks; Wiring; Message Authentication Code (MAC); Models for Security; Network Design; Network Infrastructure; Network Security; Probabilistic Automaton; Random Key Pre-distribution; Security Protocol Analysis; Wireless Sensor Networks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Communication System Software and Middleware, 2006. Comsware 2006. First International Conference on
Conference_Location :
New Delhi
Print_ISBN :
0-7803-9575-1
Type :
conf
DOI :
10.1109/COMSWA.2006.1665175
Filename :
1665175
Link To Document :
بازگشت