Skip to main content

Minimizing Resource Expenditure While Maximizing Destructiveness for Node Capture Attacks

  • Conference paper
  • First Online:
Algorithms and Architectures for Parallel Processing (ICA3PP 2015)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 9530))

Abstract

In node capture attacks, an attacker intellectually captures nodes and extracts cryptographic keys from their memories to wreck security, reliability and confidentiality of wireless sensor networks. Previous methods suffered from low attacking efficiency and neglected resource expenditure. A novel method of modeling the node capture attack is proposed aiming at maximizing destructiveness while minimizing resource expenditure. We convert routing paths into abstracted vertexes and formalize hybrid graph model for the network. A property called destructive value is defined for expressing the destructiveness of attacking a node. We develop a Greedy AttaCking algoRithm named GACR on the hybrid graph. An attacker is able to maximize the destructiveness of the attack while constructing the shortest Hamiltonian cycle to reduce resource expenditure. At last, extensive simulations are conducted to show the advantages of our scheme. Simulation results demonstrate that, GACR can reduce the attacking times, enhance the attacking efficiencies and save energy cost in compromising the network.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Wu, G., Chen, X., Obaidat, M.S., Lin, C.: A high efficient node capture attack algorithm in wireless sensor network based on route minimum key set. Secur. Commun. Netw. 6(2), 230–238 (2013)

    Article  Google Scholar 

  2. Tague, P., Lee, J., Poovendran, R.: A set-covering approach for modeling attacks on key predistribution in wireless sensor networks. In: Third International Conference on Intelligent Sensing and Information Processing, ICISIP 2005, pp. 254–259. IEEE (2005)

    Google Scholar 

  3. Tague, P., Poovendran, R.: A canonical seed assignment model for key predistribution in wireless sensor networks. ACM Trans. Sens. Netw. (TOSN) 3(4), 19-es (2007)

    Article  Google Scholar 

  4. Tague, P.: Identifying, modeling, and mitigating attacks in wireless ad-hoc and sensor networks. PhD thesis, University of Washington (2009)

    Google Scholar 

  5. Lin, C., Wu, G.: Enhancing the attacking efficiency of the node capture attack in WSN: a matrix approach. J. Supercomputing 66(2), 989–1007 (2013)

    Article  Google Scholar 

  6. Lin, C., Wu, G., Xia, F., Yao, L.: Enhancing efficiency of node compromise attacks in vehicular ad-hoc networks using connected dominating set. Mob. Netw. Appl. 18(6), 908–922 (2013)

    Article  Google Scholar 

  7. Lin, C., Wu, G., Yim, K., Yao, L., Hou, G.: Compromising ad-hoc networks by attacking weakly connected dominating set. In: The 9-th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2015). IEEE (2015) (to appear)

    Google Scholar 

  8. Lin, C., Wu, G., Yu, C.W., Yao, L.: Maximizing destructiveness of node capture attack in wireless sensor networks. J. Supercomputing (2015) (to appear) doi:10.1007/s11227-015-1435-7

  9. Tague, P., Slater, D., Rogers, J., Poovendran, R.: Vulnerability of network traffic under node capture attacks using circuit theoretic analysis. In: The 27th Conference on Computer Communications, INFOCOM 2008, IEEE, pp. 161–165. IEEE (2008)

    Google Scholar 

  10. Tague, P., Slater, D., Rogers, J., Poovendran, R.: Evaluating the vulnerability of network traffic using joint security and routing analysis. IEEE Trans. Dependable Secure Comput. 6, 111–123 (2008)

    Article  Google Scholar 

  11. Liu, D., Ning, P., Li, R.: Establishing pairwise keys in distributed sensor networks. ACM Trans. Inf. Syst. Secur. (TISSEC) 8(1), 41–77 (2005)

    Article  Google Scholar 

  12. Perkins, C., Belding-Royer, E., Das, S., et al.: Ad hoc on-demand distance vector (AODV) routing (2003)

    Google Scholar 

  13. Schurgers, C., Srivastava, M.: Energy efficient routing in wireless sensor networks. In: Military Communications Conference on Communications for Network-Centric Operations: Creating the Information Force, IEEE, MILCOM 2001, vol. 1, pp. 357–361. IEEE (2001)

    Google Scholar 

  14. Jain, K.: Security based on network topology against the wiretapping attack. IEEE Wirel. Commun. 11(1), 68–71 (2004)

    Article  MathSciNet  Google Scholar 

  15. Brin, S., Page, L.: The anatomy of a large-scale hypertextual web search engine* 1. Comput. Netw. ISDN Syst. 30(1–7), 107–117 (1998)

    Article  Google Scholar 

  16. Langville, A., Meyer, C.: Google Page Rank and Beyond. Princeton University Press, Princeton (2006)

    Google Scholar 

  17. http://www.math.uwaterloo.ca/tsp/concorde.html

  18. Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensornetworks (2003)

    Google Scholar 

  19. Eschenauer, L., Gligor, V.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 41–47. ACM (2002)

    Google Scholar 

  20. Akkaya, K., Younis, M.: A survey on routing protocols for wireless sensor networks. Ad hoc Netw. 3(3), 325–349 (2005)

    Article  Google Scholar 

Download references

Acknowledgments

This research is sponsored in part by the National Natural Science Foundation of China (No.61173179, No.61202443 and No.61402078), Major National Science and Technology Special Projects High-Nuclear-Based Project of China under Grant (No. 2012ZX01039-004-21 and No. 2012ZX01039-004-44) and Program for New Century Excellent Talents in University (NCET-13-0083). This research is also sponsored in part supported by the Fundamental Research Funds for the Central Universities (No.DUT14RC(3)090) and Major State Basic Research Development Program of China (973 Program), No.201300185.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chi Lin .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Lin, C., Wu, G., Lai, X., Qiu, T. (2015). Minimizing Resource Expenditure While Maximizing Destructiveness for Node Capture Attacks. In: Wang, G., Zomaya, A., Martinez, G., Li, K. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2015. Lecture Notes in Computer Science(), vol 9530. Springer, Cham. https://doi.org/10.1007/978-3-319-27137-8_30

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-27137-8_30

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-27136-1

  • Online ISBN: 978-3-319-27137-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics