Loading…
Using network traffic to infer compromised neighbors in wireless sensor nodes
This work introduces a novel security framework for wireless sensor networks (WSN) based on dynamic duty cycle, which allows nodes to detect their compromised neighbors based on unanticipated fluctuations in network traffic send rate over time. Our framework was assessed by its ability to detect adv...
Saved in:
Main Authors: | , , , , , , |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | 1023 |
container_issue | |
container_start_page | 1022 |
container_title | |
container_volume | |
creator | Chandramouli, J. M. Ramos, Juan Srinivasan, Lakshmi Suresh, Prahlad Kannan, Prashanth Crosby, Garth Watkins, Lanier |
description | This work introduces a novel security framework for wireless sensor networks (WSN) based on dynamic duty cycle, which allows nodes to detect their compromised neighbors based on unanticipated fluctuations in network traffic send rate over time. Our framework was assessed by its ability to detect advanced WSN threats (e.g., active, passive, or both attacks). One of the benefits of this framework is that it reduces all threats to unanticipated power dissipation. In other words, the framework assumes any neighbor not conforming to predicted power levels has been communicating with an unauthorized node, and thus is compromised. This threat model is emulated by applying pseudo random but bound (large to small) power dissipations to arbitrary nodes. Simulation results demonstrated that this framework was effective in detecting and isolating compromised sensor nodes. |
doi_str_mv | 10.1109/CCNC.2017.7983279 |
format | conference_proceeding |
fullrecord | <record><control><sourceid>ieee_CHZPO</sourceid><recordid>TN_cdi_ieee_primary_7983279</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>7983279</ieee_id><sourcerecordid>7983279</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-157dab1d31df4b7f6b93d775ae2bb8b05e02915b6723eef01ba98ce545ec13893</originalsourceid><addsrcrecordid>eNotkMtOwzAQRQ0SElXJByA2_oGEmbiOPUsU8ZIKbOi6ipNxMTRxZUeq-Hsq0dVdnKOzuELcIlSIQPdt-95WNaCpDFlVG7oQBRmLGggapIYuxaJWCkuyDVyLIudvAECwWpNdiLdNDtNOTjwfY_qRc-q8D72cowyT5yT7OB5SHEPm4SSF3ZeLKZ-YPIbEe85ZZp5yTHKKA-cbceW7febivEuxeXr8bF_K9cfza_uwLgMaPZeozdA5HBQOfuWMbxypwRjdce2cdaAZakLtGlMrZg_oOrI965XmHpUltRR3_93AzNtDCmOXfrfnA9QfsV5QFA</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Using network traffic to infer compromised neighbors in wireless sensor nodes</title><source>IEEE Xplore All Conference Series</source><creator>Chandramouli, J. M. ; Ramos, Juan ; Srinivasan, Lakshmi ; Suresh, Prahlad ; Kannan, Prashanth ; Crosby, Garth ; Watkins, Lanier</creator><creatorcontrib>Chandramouli, J. M. ; Ramos, Juan ; Srinivasan, Lakshmi ; Suresh, Prahlad ; Kannan, Prashanth ; Crosby, Garth ; Watkins, Lanier</creatorcontrib><description>This work introduces a novel security framework for wireless sensor networks (WSN) based on dynamic duty cycle, which allows nodes to detect their compromised neighbors based on unanticipated fluctuations in network traffic send rate over time. Our framework was assessed by its ability to detect advanced WSN threats (e.g., active, passive, or both attacks). One of the benefits of this framework is that it reduces all threats to unanticipated power dissipation. In other words, the framework assumes any neighbor not conforming to predicted power levels has been communicating with an unauthorized node, and thus is compromised. This threat model is emulated by applying pseudo random but bound (large to small) power dissipations to arbitrary nodes. Simulation results demonstrated that this framework was effective in detecting and isolating compromised sensor nodes.</description><identifier>EISSN: 2331-9860</identifier><identifier>EISBN: 9781509061969</identifier><identifier>EISBN: 1509061967</identifier><identifier>DOI: 10.1109/CCNC.2017.7983279</identifier><language>eng</language><publisher>IEEE</publisher><subject>Communication system security ; Conferences ; Logic gates ; Mathematical model ; Power Levels ; Security ; Wireless communication ; Wireless Nodes ; Wireless sensor networks ; WSN APT</subject><ispartof>2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC), 2017, p.1022-1023</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/7983279$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,27925,54555,54932</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/7983279$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Chandramouli, J. M.</creatorcontrib><creatorcontrib>Ramos, Juan</creatorcontrib><creatorcontrib>Srinivasan, Lakshmi</creatorcontrib><creatorcontrib>Suresh, Prahlad</creatorcontrib><creatorcontrib>Kannan, Prashanth</creatorcontrib><creatorcontrib>Crosby, Garth</creatorcontrib><creatorcontrib>Watkins, Lanier</creatorcontrib><title>Using network traffic to infer compromised neighbors in wireless sensor nodes</title><title>2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC)</title><addtitle>CCNC</addtitle><description>This work introduces a novel security framework for wireless sensor networks (WSN) based on dynamic duty cycle, which allows nodes to detect their compromised neighbors based on unanticipated fluctuations in network traffic send rate over time. Our framework was assessed by its ability to detect advanced WSN threats (e.g., active, passive, or both attacks). One of the benefits of this framework is that it reduces all threats to unanticipated power dissipation. In other words, the framework assumes any neighbor not conforming to predicted power levels has been communicating with an unauthorized node, and thus is compromised. This threat model is emulated by applying pseudo random but bound (large to small) power dissipations to arbitrary nodes. Simulation results demonstrated that this framework was effective in detecting and isolating compromised sensor nodes.</description><subject>Communication system security</subject><subject>Conferences</subject><subject>Logic gates</subject><subject>Mathematical model</subject><subject>Power Levels</subject><subject>Security</subject><subject>Wireless communication</subject><subject>Wireless Nodes</subject><subject>Wireless sensor networks</subject><subject>WSN APT</subject><issn>2331-9860</issn><isbn>9781509061969</isbn><isbn>1509061967</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2017</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNotkMtOwzAQRQ0SElXJByA2_oGEmbiOPUsU8ZIKbOi6ipNxMTRxZUeq-Hsq0dVdnKOzuELcIlSIQPdt-95WNaCpDFlVG7oQBRmLGggapIYuxaJWCkuyDVyLIudvAECwWpNdiLdNDtNOTjwfY_qRc-q8D72cowyT5yT7OB5SHEPm4SSF3ZeLKZ-YPIbEe85ZZp5yTHKKA-cbceW7febivEuxeXr8bF_K9cfza_uwLgMaPZeozdA5HBQOfuWMbxypwRjdce2cdaAZakLtGlMrZg_oOrI965XmHpUltRR3_93AzNtDCmOXfrfnA9QfsV5QFA</recordid><startdate>201701</startdate><enddate>201701</enddate><creator>Chandramouli, J. M.</creator><creator>Ramos, Juan</creator><creator>Srinivasan, Lakshmi</creator><creator>Suresh, Prahlad</creator><creator>Kannan, Prashanth</creator><creator>Crosby, Garth</creator><creator>Watkins, Lanier</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201701</creationdate><title>Using network traffic to infer compromised neighbors in wireless sensor nodes</title><author>Chandramouli, J. M. ; Ramos, Juan ; Srinivasan, Lakshmi ; Suresh, Prahlad ; Kannan, Prashanth ; Crosby, Garth ; Watkins, Lanier</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-157dab1d31df4b7f6b93d775ae2bb8b05e02915b6723eef01ba98ce545ec13893</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2017</creationdate><topic>Communication system security</topic><topic>Conferences</topic><topic>Logic gates</topic><topic>Mathematical model</topic><topic>Power Levels</topic><topic>Security</topic><topic>Wireless communication</topic><topic>Wireless Nodes</topic><topic>Wireless sensor networks</topic><topic>WSN APT</topic><toplevel>online_resources</toplevel><creatorcontrib>Chandramouli, J. M.</creatorcontrib><creatorcontrib>Ramos, Juan</creatorcontrib><creatorcontrib>Srinivasan, Lakshmi</creatorcontrib><creatorcontrib>Suresh, Prahlad</creatorcontrib><creatorcontrib>Kannan, Prashanth</creatorcontrib><creatorcontrib>Crosby, Garth</creatorcontrib><creatorcontrib>Watkins, Lanier</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Chandramouli, J. M.</au><au>Ramos, Juan</au><au>Srinivasan, Lakshmi</au><au>Suresh, Prahlad</au><au>Kannan, Prashanth</au><au>Crosby, Garth</au><au>Watkins, Lanier</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Using network traffic to infer compromised neighbors in wireless sensor nodes</atitle><btitle>2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC)</btitle><stitle>CCNC</stitle><date>2017-01</date><risdate>2017</risdate><spage>1022</spage><epage>1023</epage><pages>1022-1023</pages><eissn>2331-9860</eissn><eisbn>9781509061969</eisbn><eisbn>1509061967</eisbn><abstract>This work introduces a novel security framework for wireless sensor networks (WSN) based on dynamic duty cycle, which allows nodes to detect their compromised neighbors based on unanticipated fluctuations in network traffic send rate over time. Our framework was assessed by its ability to detect advanced WSN threats (e.g., active, passive, or both attacks). One of the benefits of this framework is that it reduces all threats to unanticipated power dissipation. In other words, the framework assumes any neighbor not conforming to predicted power levels has been communicating with an unauthorized node, and thus is compromised. This threat model is emulated by applying pseudo random but bound (large to small) power dissipations to arbitrary nodes. Simulation results demonstrated that this framework was effective in detecting and isolating compromised sensor nodes.</abstract><pub>IEEE</pub><doi>10.1109/CCNC.2017.7983279</doi><tpages>2</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | EISSN: 2331-9860 |
ispartof | 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC), 2017, p.1022-1023 |
issn | 2331-9860 |
language | eng |
recordid | cdi_ieee_primary_7983279 |
source | IEEE Xplore All Conference Series |
subjects | Communication system security Conferences Logic gates Mathematical model Power Levels Security Wireless communication Wireless Nodes Wireless sensor networks WSN APT |
title | Using network traffic to infer compromised neighbors in wireless sensor nodes |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-01T11%3A51%3A41IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_CHZPO&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Using%20network%20traffic%20to%20infer%20compromised%20neighbors%20in%20wireless%20sensor%20nodes&rft.btitle=2017%2014th%20IEEE%20Annual%20Consumer%20Communications%20&%20Networking%20Conference%20(CCNC)&rft.au=Chandramouli,%20J.%20M.&rft.date=2017-01&rft.spage=1022&rft.epage=1023&rft.pages=1022-1023&rft.eissn=2331-9860&rft_id=info:doi/10.1109/CCNC.2017.7983279&rft.eisbn=9781509061969&rft.eisbn_list=1509061967&rft_dat=%3Cieee_CHZPO%3E7983279%3C/ieee_CHZPO%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i175t-157dab1d31df4b7f6b93d775ae2bb8b05e02915b6723eef01ba98ce545ec13893%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=7983279&rfr_iscdi=true |