Loading…

Using network traffic to infer compromised neighbors in wireless sensor nodes

This work introduces a novel security framework for wireless sensor networks (WSN) based on dynamic duty cycle, which allows nodes to detect their compromised neighbors based on unanticipated fluctuations in network traffic send rate over time. Our framework was assessed by its ability to detect adv...

Full description

Saved in:
Bibliographic Details
Main Authors: Chandramouli, J. M., Ramos, Juan, Srinivasan, Lakshmi, Suresh, Prahlad, Kannan, Prashanth, Crosby, Garth, Watkins, Lanier
Format: Conference Proceeding
Language:English
Subjects:
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page 1023
container_issue
container_start_page 1022
container_title
container_volume
creator Chandramouli, J. M.
Ramos, Juan
Srinivasan, Lakshmi
Suresh, Prahlad
Kannan, Prashanth
Crosby, Garth
Watkins, Lanier
description This work introduces a novel security framework for wireless sensor networks (WSN) based on dynamic duty cycle, which allows nodes to detect their compromised neighbors based on unanticipated fluctuations in network traffic send rate over time. Our framework was assessed by its ability to detect advanced WSN threats (e.g., active, passive, or both attacks). One of the benefits of this framework is that it reduces all threats to unanticipated power dissipation. In other words, the framework assumes any neighbor not conforming to predicted power levels has been communicating with an unauthorized node, and thus is compromised. This threat model is emulated by applying pseudo random but bound (large to small) power dissipations to arbitrary nodes. Simulation results demonstrated that this framework was effective in detecting and isolating compromised sensor nodes.
doi_str_mv 10.1109/CCNC.2017.7983279
format conference_proceeding
fullrecord <record><control><sourceid>ieee_CHZPO</sourceid><recordid>TN_cdi_ieee_primary_7983279</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>7983279</ieee_id><sourcerecordid>7983279</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-157dab1d31df4b7f6b93d775ae2bb8b05e02915b6723eef01ba98ce545ec13893</originalsourceid><addsrcrecordid>eNotkMtOwzAQRQ0SElXJByA2_oGEmbiOPUsU8ZIKbOi6ipNxMTRxZUeq-Hsq0dVdnKOzuELcIlSIQPdt-95WNaCpDFlVG7oQBRmLGggapIYuxaJWCkuyDVyLIudvAECwWpNdiLdNDtNOTjwfY_qRc-q8D72cowyT5yT7OB5SHEPm4SSF3ZeLKZ-YPIbEe85ZZp5yTHKKA-cbceW7febivEuxeXr8bF_K9cfza_uwLgMaPZeozdA5HBQOfuWMbxypwRjdce2cdaAZakLtGlMrZg_oOrI965XmHpUltRR3_93AzNtDCmOXfrfnA9QfsV5QFA</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Using network traffic to infer compromised neighbors in wireless sensor nodes</title><source>IEEE Xplore All Conference Series</source><creator>Chandramouli, J. M. ; Ramos, Juan ; Srinivasan, Lakshmi ; Suresh, Prahlad ; Kannan, Prashanth ; Crosby, Garth ; Watkins, Lanier</creator><creatorcontrib>Chandramouli, J. M. ; Ramos, Juan ; Srinivasan, Lakshmi ; Suresh, Prahlad ; Kannan, Prashanth ; Crosby, Garth ; Watkins, Lanier</creatorcontrib><description>This work introduces a novel security framework for wireless sensor networks (WSN) based on dynamic duty cycle, which allows nodes to detect their compromised neighbors based on unanticipated fluctuations in network traffic send rate over time. Our framework was assessed by its ability to detect advanced WSN threats (e.g., active, passive, or both attacks). One of the benefits of this framework is that it reduces all threats to unanticipated power dissipation. In other words, the framework assumes any neighbor not conforming to predicted power levels has been communicating with an unauthorized node, and thus is compromised. This threat model is emulated by applying pseudo random but bound (large to small) power dissipations to arbitrary nodes. Simulation results demonstrated that this framework was effective in detecting and isolating compromised sensor nodes.</description><identifier>EISSN: 2331-9860</identifier><identifier>EISBN: 9781509061969</identifier><identifier>EISBN: 1509061967</identifier><identifier>DOI: 10.1109/CCNC.2017.7983279</identifier><language>eng</language><publisher>IEEE</publisher><subject>Communication system security ; Conferences ; Logic gates ; Mathematical model ; Power Levels ; Security ; Wireless communication ; Wireless Nodes ; Wireless sensor networks ; WSN APT</subject><ispartof>2017 14th IEEE Annual Consumer Communications &amp; Networking Conference (CCNC), 2017, p.1022-1023</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/7983279$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,27925,54555,54932</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/7983279$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Chandramouli, J. M.</creatorcontrib><creatorcontrib>Ramos, Juan</creatorcontrib><creatorcontrib>Srinivasan, Lakshmi</creatorcontrib><creatorcontrib>Suresh, Prahlad</creatorcontrib><creatorcontrib>Kannan, Prashanth</creatorcontrib><creatorcontrib>Crosby, Garth</creatorcontrib><creatorcontrib>Watkins, Lanier</creatorcontrib><title>Using network traffic to infer compromised neighbors in wireless sensor nodes</title><title>2017 14th IEEE Annual Consumer Communications &amp; Networking Conference (CCNC)</title><addtitle>CCNC</addtitle><description>This work introduces a novel security framework for wireless sensor networks (WSN) based on dynamic duty cycle, which allows nodes to detect their compromised neighbors based on unanticipated fluctuations in network traffic send rate over time. Our framework was assessed by its ability to detect advanced WSN threats (e.g., active, passive, or both attacks). One of the benefits of this framework is that it reduces all threats to unanticipated power dissipation. In other words, the framework assumes any neighbor not conforming to predicted power levels has been communicating with an unauthorized node, and thus is compromised. This threat model is emulated by applying pseudo random but bound (large to small) power dissipations to arbitrary nodes. Simulation results demonstrated that this framework was effective in detecting and isolating compromised sensor nodes.</description><subject>Communication system security</subject><subject>Conferences</subject><subject>Logic gates</subject><subject>Mathematical model</subject><subject>Power Levels</subject><subject>Security</subject><subject>Wireless communication</subject><subject>Wireless Nodes</subject><subject>Wireless sensor networks</subject><subject>WSN APT</subject><issn>2331-9860</issn><isbn>9781509061969</isbn><isbn>1509061967</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2017</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNotkMtOwzAQRQ0SElXJByA2_oGEmbiOPUsU8ZIKbOi6ipNxMTRxZUeq-Hsq0dVdnKOzuELcIlSIQPdt-95WNaCpDFlVG7oQBRmLGggapIYuxaJWCkuyDVyLIudvAECwWpNdiLdNDtNOTjwfY_qRc-q8D72cowyT5yT7OB5SHEPm4SSF3ZeLKZ-YPIbEe85ZZp5yTHKKA-cbceW7febivEuxeXr8bF_K9cfza_uwLgMaPZeozdA5HBQOfuWMbxypwRjdce2cdaAZakLtGlMrZg_oOrI965XmHpUltRR3_93AzNtDCmOXfrfnA9QfsV5QFA</recordid><startdate>201701</startdate><enddate>201701</enddate><creator>Chandramouli, J. M.</creator><creator>Ramos, Juan</creator><creator>Srinivasan, Lakshmi</creator><creator>Suresh, Prahlad</creator><creator>Kannan, Prashanth</creator><creator>Crosby, Garth</creator><creator>Watkins, Lanier</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201701</creationdate><title>Using network traffic to infer compromised neighbors in wireless sensor nodes</title><author>Chandramouli, J. M. ; Ramos, Juan ; Srinivasan, Lakshmi ; Suresh, Prahlad ; Kannan, Prashanth ; Crosby, Garth ; Watkins, Lanier</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-157dab1d31df4b7f6b93d775ae2bb8b05e02915b6723eef01ba98ce545ec13893</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2017</creationdate><topic>Communication system security</topic><topic>Conferences</topic><topic>Logic gates</topic><topic>Mathematical model</topic><topic>Power Levels</topic><topic>Security</topic><topic>Wireless communication</topic><topic>Wireless Nodes</topic><topic>Wireless sensor networks</topic><topic>WSN APT</topic><toplevel>online_resources</toplevel><creatorcontrib>Chandramouli, J. M.</creatorcontrib><creatorcontrib>Ramos, Juan</creatorcontrib><creatorcontrib>Srinivasan, Lakshmi</creatorcontrib><creatorcontrib>Suresh, Prahlad</creatorcontrib><creatorcontrib>Kannan, Prashanth</creatorcontrib><creatorcontrib>Crosby, Garth</creatorcontrib><creatorcontrib>Watkins, Lanier</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Chandramouli, J. M.</au><au>Ramos, Juan</au><au>Srinivasan, Lakshmi</au><au>Suresh, Prahlad</au><au>Kannan, Prashanth</au><au>Crosby, Garth</au><au>Watkins, Lanier</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Using network traffic to infer compromised neighbors in wireless sensor nodes</atitle><btitle>2017 14th IEEE Annual Consumer Communications &amp; Networking Conference (CCNC)</btitle><stitle>CCNC</stitle><date>2017-01</date><risdate>2017</risdate><spage>1022</spage><epage>1023</epage><pages>1022-1023</pages><eissn>2331-9860</eissn><eisbn>9781509061969</eisbn><eisbn>1509061967</eisbn><abstract>This work introduces a novel security framework for wireless sensor networks (WSN) based on dynamic duty cycle, which allows nodes to detect their compromised neighbors based on unanticipated fluctuations in network traffic send rate over time. Our framework was assessed by its ability to detect advanced WSN threats (e.g., active, passive, or both attacks). One of the benefits of this framework is that it reduces all threats to unanticipated power dissipation. In other words, the framework assumes any neighbor not conforming to predicted power levels has been communicating with an unauthorized node, and thus is compromised. This threat model is emulated by applying pseudo random but bound (large to small) power dissipations to arbitrary nodes. Simulation results demonstrated that this framework was effective in detecting and isolating compromised sensor nodes.</abstract><pub>IEEE</pub><doi>10.1109/CCNC.2017.7983279</doi><tpages>2</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier EISSN: 2331-9860
ispartof 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC), 2017, p.1022-1023
issn 2331-9860
language eng
recordid cdi_ieee_primary_7983279
source IEEE Xplore All Conference Series
subjects Communication system security
Conferences
Logic gates
Mathematical model
Power Levels
Security
Wireless communication
Wireless Nodes
Wireless sensor networks
WSN APT
title Using network traffic to infer compromised neighbors in wireless sensor nodes
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-01T11%3A51%3A41IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_CHZPO&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Using%20network%20traffic%20to%20infer%20compromised%20neighbors%20in%20wireless%20sensor%20nodes&rft.btitle=2017%2014th%20IEEE%20Annual%20Consumer%20Communications%20&%20Networking%20Conference%20(CCNC)&rft.au=Chandramouli,%20J.%20M.&rft.date=2017-01&rft.spage=1022&rft.epage=1023&rft.pages=1022-1023&rft.eissn=2331-9860&rft_id=info:doi/10.1109/CCNC.2017.7983279&rft.eisbn=9781509061969&rft.eisbn_list=1509061967&rft_dat=%3Cieee_CHZPO%3E7983279%3C/ieee_CHZPO%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i175t-157dab1d31df4b7f6b93d775ae2bb8b05e02915b6723eef01ba98ce545ec13893%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=7983279&rfr_iscdi=true