Loading…

Dependable wireless sensor networks for reliable and secure humanitarian relief applications

Disasters such as flooding, earthquake, famine and terrorist attacks might occur any time anywhere without prior warnings. In most cases it is difficult to predict when a disaster might occur however, well-planned disaster recovery procedures will reduce the intensity of expected consequences. When...

Full description

Saved in:
Bibliographic Details
Published in:Ad hoc networks 2014-02, Vol.13, p.94-106
Main Authors: Khalil, Issa M., Khreishah, Abdallah, Ahmed, Faheem, Shuaib, Khaled
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c336t-eb87c86c5a5a7f965ba485a5518749a2f3888ed0bc7555dbdf5f4cad8fe692e83
cites cdi_FETCH-LOGICAL-c336t-eb87c86c5a5a7f965ba485a5518749a2f3888ed0bc7555dbdf5f4cad8fe692e83
container_end_page 106
container_issue
container_start_page 94
container_title Ad hoc networks
container_volume 13
creator Khalil, Issa M.
Khreishah, Abdallah
Ahmed, Faheem
Shuaib, Khaled
description Disasters such as flooding, earthquake, famine and terrorist attacks might occur any time anywhere without prior warnings. In most cases it is difficult to predict when a disaster might occur however, well-planned disaster recovery procedures will reduce the intensity of expected consequences. When a disaster occurs, infrastructure based communications are most likely to be crippled, worsening the critical situation on hand. Wireless ad hoc and sensor network (WASN) technologies are proven to be valuable in coordinating and managing rescue operations during disasters. However, the increasing reliance on WASNs make them attractive to malicious attackers, especially terrorist groups, in a bid to hamper rescue operations amplifying the damage and increasing the number of casualties. Therefore, it is necessary to ensure the fidelity of data traffic through WASN against malicious traffic disruption attacks. In this paper, we first demonstrate how WASN can be used in a well-planned disaster recovery effort. Then, we introduce and analyze one of the most severe traffic disruption attacks against WASNs, called Identity Delegation, and its countermeasures. Its severity lies in its capability to evade detection by even state-of-the-art intrusion detection techniques such as the neighbor monitoring based mechanisms. Through identity delegation, an adversary can drop packets, evade detection, and frame innocent nodes for dropping the traffic. We introduce a technique to mitigate identity delegation attack, dubbed Sadec, and compare it with the state-of-the-art mitigation technique namely Basic Local Monitoring (BLM) under a wide range of network scenarios. Our analysis which is validated by extensive ns-2 simulation scenarios show that BLM fails to efficiently mitigate packet drop through identity delegation attacks while Sadec successfully mitigates them. The results also show that Sadec achieves higher delivery ratios of data packets compared to BLM. On the other hand, the results show similar behavior in framing probabilities between Sadec and BLM. However, the desirable features of Sadec come at the expense of higher false isolation probabilities in networks with heavy traffic load and poor communication links.
doi_str_mv 10.1016/j.adhoc.2012.06.002
format article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1531029720</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S1570870512001102</els_id><sourcerecordid>1531029720</sourcerecordid><originalsourceid>FETCH-LOGICAL-c336t-eb87c86c5a5a7f965ba485a5518749a2f3888ed0bc7555dbdf5f4cad8fe692e83</originalsourceid><addsrcrecordid>eNp9kD1PwzAQhi0EEqXwC1gysjTYSZ04AwMqn1IlFtiQrIt9Vl1SO9gJFf8et0WMTHene96T7iHkktGcUVZdr3PQK6_ygrIip1VOaXFEJozXdCZqVh7_9ZSfkrMY1wloEjwh73fYo9PQdphtbcAOY8wiuuhD5nDY-vARM5OGtLJ7CpxOgBoDZqtxA84OECy4PYAmg77vrILBehfPyYmBLuLFb52St4f718XTbPny-Ly4Xc5UWVbDDFtRK1EpDhxq01S8hblIA2einjdQmFIIgZq2quac61YbbuYKtDBYNQWKckquDnf74D9HjIPc2Kiw68ChH6NkvGTp4bqgCS0PqAo-xoBG9sFuIHxLRuXOpVzLvUu5cylpJZOqlLo5pDB98WUxyKgsOoU6KVOD1N7-m_8BTmSAQQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1531029720</pqid></control><display><type>article</type><title>Dependable wireless sensor networks for reliable and secure humanitarian relief applications</title><source>ScienceDirect Freedom Collection</source><creator>Khalil, Issa M. ; Khreishah, Abdallah ; Ahmed, Faheem ; Shuaib, Khaled</creator><creatorcontrib>Khalil, Issa M. ; Khreishah, Abdallah ; Ahmed, Faheem ; Shuaib, Khaled</creatorcontrib><description>Disasters such as flooding, earthquake, famine and terrorist attacks might occur any time anywhere without prior warnings. In most cases it is difficult to predict when a disaster might occur however, well-planned disaster recovery procedures will reduce the intensity of expected consequences. When a disaster occurs, infrastructure based communications are most likely to be crippled, worsening the critical situation on hand. Wireless ad hoc and sensor network (WASN) technologies are proven to be valuable in coordinating and managing rescue operations during disasters. However, the increasing reliance on WASNs make them attractive to malicious attackers, especially terrorist groups, in a bid to hamper rescue operations amplifying the damage and increasing the number of casualties. Therefore, it is necessary to ensure the fidelity of data traffic through WASN against malicious traffic disruption attacks. In this paper, we first demonstrate how WASN can be used in a well-planned disaster recovery effort. Then, we introduce and analyze one of the most severe traffic disruption attacks against WASNs, called Identity Delegation, and its countermeasures. Its severity lies in its capability to evade detection by even state-of-the-art intrusion detection techniques such as the neighbor monitoring based mechanisms. Through identity delegation, an adversary can drop packets, evade detection, and frame innocent nodes for dropping the traffic. We introduce a technique to mitigate identity delegation attack, dubbed Sadec, and compare it with the state-of-the-art mitigation technique namely Basic Local Monitoring (BLM) under a wide range of network scenarios. Our analysis which is validated by extensive ns-2 simulation scenarios show that BLM fails to efficiently mitigate packet drop through identity delegation attacks while Sadec successfully mitigates them. The results also show that Sadec achieves higher delivery ratios of data packets compared to BLM. On the other hand, the results show similar behavior in framing probabilities between Sadec and BLM. However, the desirable features of Sadec come at the expense of higher false isolation probabilities in networks with heavy traffic load and poor communication links.</description><identifier>ISSN: 1570-8705</identifier><identifier>EISSN: 1570-8713</identifier><identifier>DOI: 10.1016/j.adhoc.2012.06.002</identifier><language>eng</language><publisher>Elsevier B.V</publisher><subject>Disasters ; Disruption ; Identity delegation ; Local monitoring ; Monitoring ; Multi-hop wireless networks ; Networks ; Packet dropping ; Recovery ; Security attacks ; State of the art ; Traffic engineering ; Traffic flow</subject><ispartof>Ad hoc networks, 2014-02, Vol.13, p.94-106</ispartof><rights>2012 Elsevier B.V.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c336t-eb87c86c5a5a7f965ba485a5518749a2f3888ed0bc7555dbdf5f4cad8fe692e83</citedby><cites>FETCH-LOGICAL-c336t-eb87c86c5a5a7f965ba485a5518749a2f3888ed0bc7555dbdf5f4cad8fe692e83</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><creatorcontrib>Khalil, Issa M.</creatorcontrib><creatorcontrib>Khreishah, Abdallah</creatorcontrib><creatorcontrib>Ahmed, Faheem</creatorcontrib><creatorcontrib>Shuaib, Khaled</creatorcontrib><title>Dependable wireless sensor networks for reliable and secure humanitarian relief applications</title><title>Ad hoc networks</title><description>Disasters such as flooding, earthquake, famine and terrorist attacks might occur any time anywhere without prior warnings. In most cases it is difficult to predict when a disaster might occur however, well-planned disaster recovery procedures will reduce the intensity of expected consequences. When a disaster occurs, infrastructure based communications are most likely to be crippled, worsening the critical situation on hand. Wireless ad hoc and sensor network (WASN) technologies are proven to be valuable in coordinating and managing rescue operations during disasters. However, the increasing reliance on WASNs make them attractive to malicious attackers, especially terrorist groups, in a bid to hamper rescue operations amplifying the damage and increasing the number of casualties. Therefore, it is necessary to ensure the fidelity of data traffic through WASN against malicious traffic disruption attacks. In this paper, we first demonstrate how WASN can be used in a well-planned disaster recovery effort. Then, we introduce and analyze one of the most severe traffic disruption attacks against WASNs, called Identity Delegation, and its countermeasures. Its severity lies in its capability to evade detection by even state-of-the-art intrusion detection techniques such as the neighbor monitoring based mechanisms. Through identity delegation, an adversary can drop packets, evade detection, and frame innocent nodes for dropping the traffic. We introduce a technique to mitigate identity delegation attack, dubbed Sadec, and compare it with the state-of-the-art mitigation technique namely Basic Local Monitoring (BLM) under a wide range of network scenarios. Our analysis which is validated by extensive ns-2 simulation scenarios show that BLM fails to efficiently mitigate packet drop through identity delegation attacks while Sadec successfully mitigates them. The results also show that Sadec achieves higher delivery ratios of data packets compared to BLM. On the other hand, the results show similar behavior in framing probabilities between Sadec and BLM. However, the desirable features of Sadec come at the expense of higher false isolation probabilities in networks with heavy traffic load and poor communication links.</description><subject>Disasters</subject><subject>Disruption</subject><subject>Identity delegation</subject><subject>Local monitoring</subject><subject>Monitoring</subject><subject>Multi-hop wireless networks</subject><subject>Networks</subject><subject>Packet dropping</subject><subject>Recovery</subject><subject>Security attacks</subject><subject>State of the art</subject><subject>Traffic engineering</subject><subject>Traffic flow</subject><issn>1570-8705</issn><issn>1570-8713</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2014</creationdate><recordtype>article</recordtype><recordid>eNp9kD1PwzAQhi0EEqXwC1gysjTYSZ04AwMqn1IlFtiQrIt9Vl1SO9gJFf8et0WMTHene96T7iHkktGcUVZdr3PQK6_ygrIip1VOaXFEJozXdCZqVh7_9ZSfkrMY1wloEjwh73fYo9PQdphtbcAOY8wiuuhD5nDY-vARM5OGtLJ7CpxOgBoDZqtxA84OECy4PYAmg77vrILBehfPyYmBLuLFb52St4f718XTbPny-Ly4Xc5UWVbDDFtRK1EpDhxq01S8hblIA2einjdQmFIIgZq2quac61YbbuYKtDBYNQWKckquDnf74D9HjIPc2Kiw68ChH6NkvGTp4bqgCS0PqAo-xoBG9sFuIHxLRuXOpVzLvUu5cylpJZOqlLo5pDB98WUxyKgsOoU6KVOD1N7-m_8BTmSAQQ</recordid><startdate>201402</startdate><enddate>201402</enddate><creator>Khalil, Issa M.</creator><creator>Khreishah, Abdallah</creator><creator>Ahmed, Faheem</creator><creator>Shuaib, Khaled</creator><general>Elsevier B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>201402</creationdate><title>Dependable wireless sensor networks for reliable and secure humanitarian relief applications</title><author>Khalil, Issa M. ; Khreishah, Abdallah ; Ahmed, Faheem ; Shuaib, Khaled</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c336t-eb87c86c5a5a7f965ba485a5518749a2f3888ed0bc7555dbdf5f4cad8fe692e83</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2014</creationdate><topic>Disasters</topic><topic>Disruption</topic><topic>Identity delegation</topic><topic>Local monitoring</topic><topic>Monitoring</topic><topic>Multi-hop wireless networks</topic><topic>Networks</topic><topic>Packet dropping</topic><topic>Recovery</topic><topic>Security attacks</topic><topic>State of the art</topic><topic>Traffic engineering</topic><topic>Traffic flow</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Khalil, Issa M.</creatorcontrib><creatorcontrib>Khreishah, Abdallah</creatorcontrib><creatorcontrib>Ahmed, Faheem</creatorcontrib><creatorcontrib>Shuaib, Khaled</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Ad hoc networks</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Khalil, Issa M.</au><au>Khreishah, Abdallah</au><au>Ahmed, Faheem</au><au>Shuaib, Khaled</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Dependable wireless sensor networks for reliable and secure humanitarian relief applications</atitle><jtitle>Ad hoc networks</jtitle><date>2014-02</date><risdate>2014</risdate><volume>13</volume><spage>94</spage><epage>106</epage><pages>94-106</pages><issn>1570-8705</issn><eissn>1570-8713</eissn><abstract>Disasters such as flooding, earthquake, famine and terrorist attacks might occur any time anywhere without prior warnings. In most cases it is difficult to predict when a disaster might occur however, well-planned disaster recovery procedures will reduce the intensity of expected consequences. When a disaster occurs, infrastructure based communications are most likely to be crippled, worsening the critical situation on hand. Wireless ad hoc and sensor network (WASN) technologies are proven to be valuable in coordinating and managing rescue operations during disasters. However, the increasing reliance on WASNs make them attractive to malicious attackers, especially terrorist groups, in a bid to hamper rescue operations amplifying the damage and increasing the number of casualties. Therefore, it is necessary to ensure the fidelity of data traffic through WASN against malicious traffic disruption attacks. In this paper, we first demonstrate how WASN can be used in a well-planned disaster recovery effort. Then, we introduce and analyze one of the most severe traffic disruption attacks against WASNs, called Identity Delegation, and its countermeasures. Its severity lies in its capability to evade detection by even state-of-the-art intrusion detection techniques such as the neighbor monitoring based mechanisms. Through identity delegation, an adversary can drop packets, evade detection, and frame innocent nodes for dropping the traffic. We introduce a technique to mitigate identity delegation attack, dubbed Sadec, and compare it with the state-of-the-art mitigation technique namely Basic Local Monitoring (BLM) under a wide range of network scenarios. Our analysis which is validated by extensive ns-2 simulation scenarios show that BLM fails to efficiently mitigate packet drop through identity delegation attacks while Sadec successfully mitigates them. The results also show that Sadec achieves higher delivery ratios of data packets compared to BLM. On the other hand, the results show similar behavior in framing probabilities between Sadec and BLM. However, the desirable features of Sadec come at the expense of higher false isolation probabilities in networks with heavy traffic load and poor communication links.</abstract><pub>Elsevier B.V</pub><doi>10.1016/j.adhoc.2012.06.002</doi><tpages>13</tpages></addata></record>
fulltext fulltext
identifier ISSN: 1570-8705
ispartof Ad hoc networks, 2014-02, Vol.13, p.94-106
issn 1570-8705
1570-8713
language eng
recordid cdi_proquest_miscellaneous_1531029720
source ScienceDirect Freedom Collection
subjects Disasters
Disruption
Identity delegation
Local monitoring
Monitoring
Multi-hop wireless networks
Networks
Packet dropping
Recovery
Security attacks
State of the art
Traffic engineering
Traffic flow
title Dependable wireless sensor networks for reliable and secure humanitarian relief applications
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-27T14%3A42%3A54IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Dependable%20wireless%20sensor%20networks%20for%20reliable%20and%20secure%20humanitarian%20relief%20applications&rft.jtitle=Ad%20hoc%20networks&rft.au=Khalil,%20Issa%20M.&rft.date=2014-02&rft.volume=13&rft.spage=94&rft.epage=106&rft.pages=94-106&rft.issn=1570-8705&rft.eissn=1570-8713&rft_id=info:doi/10.1016/j.adhoc.2012.06.002&rft_dat=%3Cproquest_cross%3E1531029720%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c336t-eb87c86c5a5a7f965ba485a5518749a2f3888ed0bc7555dbdf5f4cad8fe692e83%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=1531029720&rft_id=info:pmid/&rfr_iscdi=true