DocumentCode
2947486
Title
Modeling node capture attacks in wireless sensor networks
Author
Tague, Patrick ; Poovendran, Radha
Author_Institution
Electr. Eng. Dept., Univ. of Washington, Seattle, WA
fYear
2008
fDate
23-26 Sept. 2008
Firstpage
1221
Lastpage
1224
Abstract
We formalize a model for node capture attacks in which an adversary collects information about the network via eavesdropping on the wireless medium and captures nodes based on the learned information. We show that attacks in this adversary model correspond to NP-hard optimization problems and discuss the behavior of a reasonable heuristic algorithm. We show that the goals of node capture attacks can be decomposed into a collection of primitive events, the impact of which can be evaluated and recombined to yield an overall evaluation of the attack. We demonstrate the use of the attack decomposition model for derivation of attack metrics and discuss the potential use of this decomposition technique for the purposes of defense against node capture attacks.
Keywords
computational complexity; optimisation; telecommunication security; wireless sensor networks; NP-hard optimization problems; adversary model; attack decomposition model; heuristic algorithm; node capture attack modeling; wireless medium; wireless sensor networks; Access protocols; Collaborative work; Cryptography; Data mining; Hardware; Heuristic algorithms; Information security; Sensor phenomena and characterization; US Government; Wireless sensor networks;
fLanguage
English
Publisher
ieee
Conference_Titel
Communication, Control, and Computing, 2008 46th Annual Allerton Conference on
Conference_Location
Urbana-Champaign, IL
Print_ISBN
978-1-4244-2925-7
Electronic_ISBN
978-1-4244-2926-4
Type
conf
DOI
10.1109/ALLERTON.2008.4797699
Filename
4797699
Link To Document