• DocumentCode
    2947486
  • Title

    Modeling node capture attacks in wireless sensor networks

  • Author

    Tague, Patrick ; Poovendran, Radha

  • Author_Institution
    Electr. Eng. Dept., Univ. of Washington, Seattle, WA
  • fYear
    2008
  • fDate
    23-26 Sept. 2008
  • Firstpage
    1221
  • Lastpage
    1224
  • Abstract
    We formalize a model for node capture attacks in which an adversary collects information about the network via eavesdropping on the wireless medium and captures nodes based on the learned information. We show that attacks in this adversary model correspond to NP-hard optimization problems and discuss the behavior of a reasonable heuristic algorithm. We show that the goals of node capture attacks can be decomposed into a collection of primitive events, the impact of which can be evaluated and recombined to yield an overall evaluation of the attack. We demonstrate the use of the attack decomposition model for derivation of attack metrics and discuss the potential use of this decomposition technique for the purposes of defense against node capture attacks.
  • Keywords
    computational complexity; optimisation; telecommunication security; wireless sensor networks; NP-hard optimization problems; adversary model; attack decomposition model; heuristic algorithm; node capture attack modeling; wireless medium; wireless sensor networks; Access protocols; Collaborative work; Cryptography; Data mining; Hardware; Heuristic algorithms; Information security; Sensor phenomena and characterization; US Government; Wireless sensor networks;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Communication, Control, and Computing, 2008 46th Annual Allerton Conference on
  • Conference_Location
    Urbana-Champaign, IL
  • Print_ISBN
    978-1-4244-2925-7
  • Electronic_ISBN
    978-1-4244-2926-4
  • Type

    conf

  • DOI
    10.1109/ALLERTON.2008.4797699
  • Filename
    4797699