当前位置: X-MOL 学术Peer-to-Peer Netw. Appl. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Non-cryptography countermeasure against controllable event triggering attack in WSNs
Peer-to-Peer Networking and Applications ( IF 3.3 ) Pub Date : 2021-02-05 , DOI: 10.1007/s12083-020-01062-6
Haoran Hu , Wei Chang

Compressive sensing-based data collecting is a promising technique, which can significantly reduce the communication costs in wireless sensor networks (WSNs). However, a recent study shows that it is vulnerable to controllable event triggering attack (CETA): after compromising a sensor and carefully manipulating the environmental elements around a target in the subtree rooted at the sensor, an attacker is able to infer sensitive parameters of the target. The existing countermeasure is purely based on cryptography and requires central control. In this paper, we propose a lightweight non-cryptography-based approach by termly modifying the structure of the data gathering tree. However, how to efficiently and effectively construct the tree is an open problem. To solve the problem, we create a novel topology-based coding scheme and a set of distributed algorithms to mitigate the CETA attack. By adopting this approach, the time for successfully launching a CETA attack is significantly increased. Extensive simulations and experiments show that our solution can efficiently and securely build different data gathering trees for consecutive sensing tasks.



中文翻译:

WSN中可控事件触发攻击的非加密对策

基于压缩感测的数据收集是一种很有前途的技术,它可以大大降低无线传感器网络(WSN)中的通信成本。但是,最近的一项研究表明,它很容易受到可控事件触发攻击(CETA)的攻击:在破坏传感器并仔细操纵以传感器为根的子树中目标周围的环境元素之后,攻击者便能够推断出目标的敏感参数。目标。现有的对策完全基于加密技术,需要集中控制。在本文中,我们通过术语修改数据收集树的结构,提出了一种轻量级的非基于加密的方法。然而,如何有效地构造树是一个悬而未决的问题。为了解决这个问题 我们创建了一种新颖的基于拓扑的编码方案和一组分布式算法,以减轻CETA攻击。通过采用这种方法,成功发起CETA攻击的时间将大大增加。大量的仿真和实验表明,我们的解决方案可以有效,安全地为连续的传感任务构建不同的数据收集树。

更新日期:2021-02-05
down
wechat
bug