Loading…
Dependable wireless sensor networks for reliable and secure humanitarian relief applications
Disasters such as flooding, earthquake, famine and terrorist attacks might occur any time anywhere without prior warnings. In most cases it is difficult to predict when a disaster might occur however, well-planned disaster recovery procedures will reduce the intensity of expected consequences. When...
Saved in:
Published in: | Ad hoc networks 2014-02, Vol.13, p.94-106 |
---|---|
Main Authors: | , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c336t-eb87c86c5a5a7f965ba485a5518749a2f3888ed0bc7555dbdf5f4cad8fe692e83 |
---|---|
cites | cdi_FETCH-LOGICAL-c336t-eb87c86c5a5a7f965ba485a5518749a2f3888ed0bc7555dbdf5f4cad8fe692e83 |
container_end_page | 106 |
container_issue | |
container_start_page | 94 |
container_title | Ad hoc networks |
container_volume | 13 |
creator | Khalil, Issa M. Khreishah, Abdallah Ahmed, Faheem Shuaib, Khaled |
description | Disasters such as flooding, earthquake, famine and terrorist attacks might occur any time anywhere without prior warnings. In most cases it is difficult to predict when a disaster might occur however, well-planned disaster recovery procedures will reduce the intensity of expected consequences. When a disaster occurs, infrastructure based communications are most likely to be crippled, worsening the critical situation on hand. Wireless ad hoc and sensor network (WASN) technologies are proven to be valuable in coordinating and managing rescue operations during disasters. However, the increasing reliance on WASNs make them attractive to malicious attackers, especially terrorist groups, in a bid to hamper rescue operations amplifying the damage and increasing the number of casualties. Therefore, it is necessary to ensure the fidelity of data traffic through WASN against malicious traffic disruption attacks. In this paper, we first demonstrate how WASN can be used in a well-planned disaster recovery effort. Then, we introduce and analyze one of the most severe traffic disruption attacks against WASNs, called Identity Delegation, and its countermeasures. Its severity lies in its capability to evade detection by even state-of-the-art intrusion detection techniques such as the neighbor monitoring based mechanisms. Through identity delegation, an adversary can drop packets, evade detection, and frame innocent nodes for dropping the traffic. We introduce a technique to mitigate identity delegation attack, dubbed Sadec, and compare it with the state-of-the-art mitigation technique namely Basic Local Monitoring (BLM) under a wide range of network scenarios. Our analysis which is validated by extensive ns-2 simulation scenarios show that BLM fails to efficiently mitigate packet drop through identity delegation attacks while Sadec successfully mitigates them. The results also show that Sadec achieves higher delivery ratios of data packets compared to BLM. On the other hand, the results show similar behavior in framing probabilities between Sadec and BLM. However, the desirable features of Sadec come at the expense of higher false isolation probabilities in networks with heavy traffic load and poor communication links. |
doi_str_mv | 10.1016/j.adhoc.2012.06.002 |
format | article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1531029720</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S1570870512001102</els_id><sourcerecordid>1531029720</sourcerecordid><originalsourceid>FETCH-LOGICAL-c336t-eb87c86c5a5a7f965ba485a5518749a2f3888ed0bc7555dbdf5f4cad8fe692e83</originalsourceid><addsrcrecordid>eNp9kD1PwzAQhi0EEqXwC1gysjTYSZ04AwMqn1IlFtiQrIt9Vl1SO9gJFf8et0WMTHene96T7iHkktGcUVZdr3PQK6_ygrIip1VOaXFEJozXdCZqVh7_9ZSfkrMY1wloEjwh73fYo9PQdphtbcAOY8wiuuhD5nDY-vARM5OGtLJ7CpxOgBoDZqtxA84OECy4PYAmg77vrILBehfPyYmBLuLFb52St4f718XTbPny-Ly4Xc5UWVbDDFtRK1EpDhxq01S8hblIA2einjdQmFIIgZq2quac61YbbuYKtDBYNQWKckquDnf74D9HjIPc2Kiw68ChH6NkvGTp4bqgCS0PqAo-xoBG9sFuIHxLRuXOpVzLvUu5cylpJZOqlLo5pDB98WUxyKgsOoU6KVOD1N7-m_8BTmSAQQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1531029720</pqid></control><display><type>article</type><title>Dependable wireless sensor networks for reliable and secure humanitarian relief applications</title><source>ScienceDirect Freedom Collection</source><creator>Khalil, Issa M. ; Khreishah, Abdallah ; Ahmed, Faheem ; Shuaib, Khaled</creator><creatorcontrib>Khalil, Issa M. ; Khreishah, Abdallah ; Ahmed, Faheem ; Shuaib, Khaled</creatorcontrib><description>Disasters such as flooding, earthquake, famine and terrorist attacks might occur any time anywhere without prior warnings. In most cases it is difficult to predict when a disaster might occur however, well-planned disaster recovery procedures will reduce the intensity of expected consequences. When a disaster occurs, infrastructure based communications are most likely to be crippled, worsening the critical situation on hand. Wireless ad hoc and sensor network (WASN) technologies are proven to be valuable in coordinating and managing rescue operations during disasters. However, the increasing reliance on WASNs make them attractive to malicious attackers, especially terrorist groups, in a bid to hamper rescue operations amplifying the damage and increasing the number of casualties. Therefore, it is necessary to ensure the fidelity of data traffic through WASN against malicious traffic disruption attacks. In this paper, we first demonstrate how WASN can be used in a well-planned disaster recovery effort. Then, we introduce and analyze one of the most severe traffic disruption attacks against WASNs, called Identity Delegation, and its countermeasures. Its severity lies in its capability to evade detection by even state-of-the-art intrusion detection techniques such as the neighbor monitoring based mechanisms. Through identity delegation, an adversary can drop packets, evade detection, and frame innocent nodes for dropping the traffic. We introduce a technique to mitigate identity delegation attack, dubbed Sadec, and compare it with the state-of-the-art mitigation technique namely Basic Local Monitoring (BLM) under a wide range of network scenarios. Our analysis which is validated by extensive ns-2 simulation scenarios show that BLM fails to efficiently mitigate packet drop through identity delegation attacks while Sadec successfully mitigates them. The results also show that Sadec achieves higher delivery ratios of data packets compared to BLM. On the other hand, the results show similar behavior in framing probabilities between Sadec and BLM. However, the desirable features of Sadec come at the expense of higher false isolation probabilities in networks with heavy traffic load and poor communication links.</description><identifier>ISSN: 1570-8705</identifier><identifier>EISSN: 1570-8713</identifier><identifier>DOI: 10.1016/j.adhoc.2012.06.002</identifier><language>eng</language><publisher>Elsevier B.V</publisher><subject>Disasters ; Disruption ; Identity delegation ; Local monitoring ; Monitoring ; Multi-hop wireless networks ; Networks ; Packet dropping ; Recovery ; Security attacks ; State of the art ; Traffic engineering ; Traffic flow</subject><ispartof>Ad hoc networks, 2014-02, Vol.13, p.94-106</ispartof><rights>2012 Elsevier B.V.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c336t-eb87c86c5a5a7f965ba485a5518749a2f3888ed0bc7555dbdf5f4cad8fe692e83</citedby><cites>FETCH-LOGICAL-c336t-eb87c86c5a5a7f965ba485a5518749a2f3888ed0bc7555dbdf5f4cad8fe692e83</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><creatorcontrib>Khalil, Issa M.</creatorcontrib><creatorcontrib>Khreishah, Abdallah</creatorcontrib><creatorcontrib>Ahmed, Faheem</creatorcontrib><creatorcontrib>Shuaib, Khaled</creatorcontrib><title>Dependable wireless sensor networks for reliable and secure humanitarian relief applications</title><title>Ad hoc networks</title><description>Disasters such as flooding, earthquake, famine and terrorist attacks might occur any time anywhere without prior warnings. In most cases it is difficult to predict when a disaster might occur however, well-planned disaster recovery procedures will reduce the intensity of expected consequences. When a disaster occurs, infrastructure based communications are most likely to be crippled, worsening the critical situation on hand. Wireless ad hoc and sensor network (WASN) technologies are proven to be valuable in coordinating and managing rescue operations during disasters. However, the increasing reliance on WASNs make them attractive to malicious attackers, especially terrorist groups, in a bid to hamper rescue operations amplifying the damage and increasing the number of casualties. Therefore, it is necessary to ensure the fidelity of data traffic through WASN against malicious traffic disruption attacks. In this paper, we first demonstrate how WASN can be used in a well-planned disaster recovery effort. Then, we introduce and analyze one of the most severe traffic disruption attacks against WASNs, called Identity Delegation, and its countermeasures. Its severity lies in its capability to evade detection by even state-of-the-art intrusion detection techniques such as the neighbor monitoring based mechanisms. Through identity delegation, an adversary can drop packets, evade detection, and frame innocent nodes for dropping the traffic. We introduce a technique to mitigate identity delegation attack, dubbed Sadec, and compare it with the state-of-the-art mitigation technique namely Basic Local Monitoring (BLM) under a wide range of network scenarios. Our analysis which is validated by extensive ns-2 simulation scenarios show that BLM fails to efficiently mitigate packet drop through identity delegation attacks while Sadec successfully mitigates them. The results also show that Sadec achieves higher delivery ratios of data packets compared to BLM. On the other hand, the results show similar behavior in framing probabilities between Sadec and BLM. However, the desirable features of Sadec come at the expense of higher false isolation probabilities in networks with heavy traffic load and poor communication links.</description><subject>Disasters</subject><subject>Disruption</subject><subject>Identity delegation</subject><subject>Local monitoring</subject><subject>Monitoring</subject><subject>Multi-hop wireless networks</subject><subject>Networks</subject><subject>Packet dropping</subject><subject>Recovery</subject><subject>Security attacks</subject><subject>State of the art</subject><subject>Traffic engineering</subject><subject>Traffic flow</subject><issn>1570-8705</issn><issn>1570-8713</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2014</creationdate><recordtype>article</recordtype><recordid>eNp9kD1PwzAQhi0EEqXwC1gysjTYSZ04AwMqn1IlFtiQrIt9Vl1SO9gJFf8et0WMTHene96T7iHkktGcUVZdr3PQK6_ygrIip1VOaXFEJozXdCZqVh7_9ZSfkrMY1wloEjwh73fYo9PQdphtbcAOY8wiuuhD5nDY-vARM5OGtLJ7CpxOgBoDZqtxA84OECy4PYAmg77vrILBehfPyYmBLuLFb52St4f718XTbPny-Ly4Xc5UWVbDDFtRK1EpDhxq01S8hblIA2einjdQmFIIgZq2quac61YbbuYKtDBYNQWKckquDnf74D9HjIPc2Kiw68ChH6NkvGTp4bqgCS0PqAo-xoBG9sFuIHxLRuXOpVzLvUu5cylpJZOqlLo5pDB98WUxyKgsOoU6KVOD1N7-m_8BTmSAQQ</recordid><startdate>201402</startdate><enddate>201402</enddate><creator>Khalil, Issa M.</creator><creator>Khreishah, Abdallah</creator><creator>Ahmed, Faheem</creator><creator>Shuaib, Khaled</creator><general>Elsevier B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>201402</creationdate><title>Dependable wireless sensor networks for reliable and secure humanitarian relief applications</title><author>Khalil, Issa M. ; Khreishah, Abdallah ; Ahmed, Faheem ; Shuaib, Khaled</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c336t-eb87c86c5a5a7f965ba485a5518749a2f3888ed0bc7555dbdf5f4cad8fe692e83</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2014</creationdate><topic>Disasters</topic><topic>Disruption</topic><topic>Identity delegation</topic><topic>Local monitoring</topic><topic>Monitoring</topic><topic>Multi-hop wireless networks</topic><topic>Networks</topic><topic>Packet dropping</topic><topic>Recovery</topic><topic>Security attacks</topic><topic>State of the art</topic><topic>Traffic engineering</topic><topic>Traffic flow</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Khalil, Issa M.</creatorcontrib><creatorcontrib>Khreishah, Abdallah</creatorcontrib><creatorcontrib>Ahmed, Faheem</creatorcontrib><creatorcontrib>Shuaib, Khaled</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Ad hoc networks</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Khalil, Issa M.</au><au>Khreishah, Abdallah</au><au>Ahmed, Faheem</au><au>Shuaib, Khaled</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Dependable wireless sensor networks for reliable and secure humanitarian relief applications</atitle><jtitle>Ad hoc networks</jtitle><date>2014-02</date><risdate>2014</risdate><volume>13</volume><spage>94</spage><epage>106</epage><pages>94-106</pages><issn>1570-8705</issn><eissn>1570-8713</eissn><abstract>Disasters such as flooding, earthquake, famine and terrorist attacks might occur any time anywhere without prior warnings. In most cases it is difficult to predict when a disaster might occur however, well-planned disaster recovery procedures will reduce the intensity of expected consequences. When a disaster occurs, infrastructure based communications are most likely to be crippled, worsening the critical situation on hand. Wireless ad hoc and sensor network (WASN) technologies are proven to be valuable in coordinating and managing rescue operations during disasters. However, the increasing reliance on WASNs make them attractive to malicious attackers, especially terrorist groups, in a bid to hamper rescue operations amplifying the damage and increasing the number of casualties. Therefore, it is necessary to ensure the fidelity of data traffic through WASN against malicious traffic disruption attacks. In this paper, we first demonstrate how WASN can be used in a well-planned disaster recovery effort. Then, we introduce and analyze one of the most severe traffic disruption attacks against WASNs, called Identity Delegation, and its countermeasures. Its severity lies in its capability to evade detection by even state-of-the-art intrusion detection techniques such as the neighbor monitoring based mechanisms. Through identity delegation, an adversary can drop packets, evade detection, and frame innocent nodes for dropping the traffic. We introduce a technique to mitigate identity delegation attack, dubbed Sadec, and compare it with the state-of-the-art mitigation technique namely Basic Local Monitoring (BLM) under a wide range of network scenarios. Our analysis which is validated by extensive ns-2 simulation scenarios show that BLM fails to efficiently mitigate packet drop through identity delegation attacks while Sadec successfully mitigates them. The results also show that Sadec achieves higher delivery ratios of data packets compared to BLM. On the other hand, the results show similar behavior in framing probabilities between Sadec and BLM. However, the desirable features of Sadec come at the expense of higher false isolation probabilities in networks with heavy traffic load and poor communication links.</abstract><pub>Elsevier B.V</pub><doi>10.1016/j.adhoc.2012.06.002</doi><tpages>13</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1570-8705 |
ispartof | Ad hoc networks, 2014-02, Vol.13, p.94-106 |
issn | 1570-8705 1570-8713 |
language | eng |
recordid | cdi_proquest_miscellaneous_1531029720 |
source | ScienceDirect Freedom Collection |
subjects | Disasters Disruption Identity delegation Local monitoring Monitoring Multi-hop wireless networks Networks Packet dropping Recovery Security attacks State of the art Traffic engineering Traffic flow |
title | Dependable wireless sensor networks for reliable and secure humanitarian relief applications |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-27T14%3A42%3A54IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Dependable%20wireless%20sensor%20networks%20for%20reliable%20and%20secure%20humanitarian%20relief%20applications&rft.jtitle=Ad%20hoc%20networks&rft.au=Khalil,%20Issa%20M.&rft.date=2014-02&rft.volume=13&rft.spage=94&rft.epage=106&rft.pages=94-106&rft.issn=1570-8705&rft.eissn=1570-8713&rft_id=info:doi/10.1016/j.adhoc.2012.06.002&rft_dat=%3Cproquest_cross%3E1531029720%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c336t-eb87c86c5a5a7f965ba485a5518749a2f3888ed0bc7555dbdf5f4cad8fe692e83%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=1531029720&rft_id=info:pmid/&rfr_iscdi=true |