首页> 外文期刊>Journal of supercomputing >SCOUT: a sink camouflage and concealed data delivery paradigm for circumvention of sink-targeted cyber threats in wireless sensor networks
【24h】

SCOUT: a sink camouflage and concealed data delivery paradigm for circumvention of sink-targeted cyber threats in wireless sensor networks

机译:SCOUT:接收器伪装和隐藏的数据传递范例,用于规避无线传感器网络中以接收器为目标的网络威胁

获取原文
获取原文并翻译 | 示例
           

摘要

In modern epoch of cyber warfare and their countermeasures, wireless sensor networks (WSNs) are highly susceptible to cyber attacks due to their primary reliance over sink. WSNs perform routing and communication to deliver data from sources to sink. In this many-to-one communication paradigm, while some failure might be affordable at the many sources side, the single sink cannot be allowed any downtime, let alone be a failure. In a WSN security attack scenario, an attacker makes efforts to bring a sink down by identifying and capturing it. The current state of the art in sink protection schemes prevents such failures by preserving its privacy through letting it operate in promiscuous and all-the-time listening mode. However, such operation is still vulnerable to privacy divulgence because the attacker detects its all-the-time listening operation and identifies it. Furthermore, listening is an energy-expensive operation in WSNs that makes the sink battery die very quickly. In this paper, we propose a new sink privacy preservation scheme that defines the role of cooperating nodes. These cooperating nodes create a camouflage around the sink such that the location of the sink is never revealed. Such operational dispositioning reduces the susceptibility of WSNs generally and sink, particularly against the sink-targeted cyber attacks. Since the sink adopts sleep schedule, our scheme is energy efficient as well.
机译:在现代网络战争及其对策时代,无线传感器网络(WSN)主要依赖于接收器,因此极易受到网络攻击。 WSN执行路由和通信,以将数据从源传递到接收器。在这种多对一的通信范例中,尽管某些故障在许多源端都可以承受,但单个接收器不能允许任何停机时间,更不用说是故障了。在WSN安全攻击情形中,攻击者通过识别和捕获来努力降低接收器的数量。接收器保护方案中的最新技术通过使其处于混杂和始终监听的模式来保护其隐私,从而防止了此类故障。但是,这样的操作仍然容易受到隐私泄露的影响,因为攻击者会检测到它的全时监听操作并对其进行识别。此外,在WSN中,监听是一项耗费能量的操作,它会使接收器电池很快耗尽。在本文中,我们提出了一种新的接收器隐私保护方案,该方案定义了协作节点的角色。这些协作节点在水槽周围创建了伪装,因此从不显示水槽的位置。这样的操作部署通常降低了WSN和接收器的敏感性,尤其是针对以接收器为目标的网络攻击。由于接收器采用睡眠时间表,因此我们的方案也具有能源效率。

著录项

  • 来源
    《Journal of supercomputing》 |2018年第10期|5022-5040|共19页
  • 作者单位

    Department of Computer Science, Khawaja Fareed University of Engineering and Information Technology;

    Department of Computer Science and Engineering, University of Engineering and Technology;

    Department of Computer Science, COMSATS Institute of Information Technology;

    Department of Computer Science and Engineering, University of Engineering and Technology;

    Faculty of Information Technology, Middle East University;

    Department of Computer Science, COMSATS Institute of Information Technology;

    Department of Computing, Universiti Teknologi Malaysia (UTM);

  • 收录信息 美国《科学引文索引》(SCI);美国《工程索引》(EI);
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    SCOUT; Privacy preservation; Security threats; Wireless sensor networks;

    机译:SCOUT;隐私保护;安全威胁;无线传感器网络;

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号