Abstract | ||
---|---|---|
Wireless sensor network (WSN) applications are often deployed under hostile environments. Monitoring sensor nodes carefully, detecting and providing defence against malicious activity in the region is a challenging task. Legitimate sensor nodes may be captured by an adversary to extract important security information regarding shared secrets and cryptographic keys. This type of attack may result in a severe WSN security breach. Using `tamper-resistant` nodes for securing communication in a WSN cannot be considered as a solution against these attacks as it increases the network cost tremendously. Nevertheless, destroying a legitimate node by erasing its memory and destroying its radio service based on a misjudgement may bring severe damage to the WSN. The authors propose the novel sensor node capture attack detection and defence (SCADD) protocol. SCADD provides a cost-effective solution against the node compromise and capture attacks in WSNs, enhancing the overall WSN security for security-sensitive applications. This protocol consists of two building blocks: node attack detection block and defence advocating measure block. The former provides strategic-based attack detection to eliminate the possibility of misjudgement and the latter uses a self-destruction defence measure against node capture attack, without actually destroying the node`s radio service, to avoid a major security breach. |
Year | DOI | Venue |
---|---|---|
2012 | 10.1049/iet-wss.2011.0064 | Wireless Sensor Systems, IET |
Keywords | Field | DocType |
cryptographic protocols,telecommunication security,wireless sensor networks,SCADD protocol,WSN security breach,communication security,cryptographic key,defence advocating measure block,hostile environment,legitimate node,malicious activity,network cost,node attack detection block,radio service,security information,security-sensitive application,self-destruction defence measure,sensor node capture attack detection and defence protocol,sensor node monitoring,shared secrets,strategic-based attack detection,tamper-resistant node,wireless sensor network | Sensor node,Computer science,Computer security,Node compromise,Computer network,Adversary,Network cost,Wireless sensor network,Key (cryptography),Communications security | Journal |
Volume | Issue | ISSN |
2 | 3 | 2043-6386 |
Citations | PageRank | References |
14 | 0.75 | 15 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Jokhio, S.H. | 1 | 14 | 0.75 |
Imran Ali Jokhio | 2 | 20 | 1.60 |
Andrew H. Kemp | 3 | 14 | 0.75 |