Optimized and Executive Survey of Physical Node Capture Attack in Wireless Sensor Network

Full Text (PDF, 294KB), PP.26-34

Views: 0 Downloads: 0

Author(s)

Bhavana Butani 1,* Piyush Kumar Shukla 1 Sanjay Silakari 1

1. University Institute of Technology, RGPV, Bhopal, 462036, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2014.11.04

Received: 12 Feb. 2014 / Revised: 1 May 2014 / Accepted: 5 Jul. 2014 / Published: 8 Oct. 2014

Index Terms

Wireless Sensor Network, Node Capture Attack, security, Key pre-distributions, VANET

Abstract

Wireless sensor networks (WSNs) are novel large-scale wireless networks that consist of distributed, self organizing, low-power, low-cost, tiny sensor devices to cooperatively collect information through infrastructure less wireless networks. These networks are envisioned to play a crucial role in variety of applications like critical military surveillance applications, forest fire monitoring, commercial applications such as building security monitoring, traffic surveillance, habitat monitoring and smart homes and many more scenarios. Node capture attack is one of the most dreadful security attack exist in wireless sensor networks. An adversary steals cryptographic key or other confidential information like node’s id etc from a captured node to compromise entire network. So, Security of wireless sensor network is an important issue for maintaining confidentiality and integrity of wireless links. Now-a-days, researchers are paying attention towards developing security schemes against Node capture attack. Our survey provides deep insights of existing techniques that enhance the attacking efficiency of the node capture attack in wireless sensor network. It also analyzes various detection and key pre-distribution schemes for inventing a new scheme to improve resilience against node capture attack.

Cite This Paper

Bhavana Butani, Piyush Kumar Shukla, Sanjay Silakari, "Optimized and Executive Survey of Physical Node Capture Attack in Wireless Sensor Network", International Journal of Computer Network and Information Security(IJCNIS), vol.6, no.11, pp.26-34, 2014. DOI:10.5815/ijcnis.2014.11.04

Reference

[1]Tague P, Poovendran R, “Modeling adaptive node capture attacks in multi-hop wireless networks”, In Ad Hoc Network, Vol. 5, No. 6, pp. 801–814, 2007.
[2]Tague P, Poovendran R, “Modeling node capture attacks in wireless sensor networks”, In: Proc 46th annual Allerton conference on communication, control, and computing, pp 1221–1224, 2008.
[3]Tague P, Slater D, Rogers J, Poovendran R, “Evaluating the vulnerability of network traffic using joint security and routing analysis”, IEEE Trans Dependable Secure Comput, Vol. 6,No. 2, pp. 111–123, 2008.
[4]De P, Liu Y, Das S, “Deployment-aware modeling of node compromise spread in wireless sensor networks using epidemic theory”, In ACM Trans Sensor Network, Vol. 5, No. 3, pp. 1–33, 2009.
[5]Bonaci T, Bushnell L, Poovendran R, “Node capture attacks in wireless sensor networks: a system theoretic approach”, In: Proc IEEE 49th international conference on decision and control, pp. 6765–6772, 2010.
[6]Mishra A, Turuk A, “Adversary information gathering model for node capture attack in wireless sensor networks”, In: Proc IEEE international conference in devices and communication, pp. 1–5, 2010.
[7]Wu G, Chen X, Obaidat MS, Lin C, “A high efficient node capture attack algorithm in wireless sensor network based on route minimum key set”, In Secure Communication Network, 2012.
[8]Chi Lin, GW, Enhancing the attacking efficiency of the node capture attack in wsn: a matrix approach, J Supercomput, 2013.
[9]Chi Lin, Guowei Wu, Feng Xia, Lin Yao, “Enhancing Efficiency of Node Compromise Attacks in Vehicular Ad-hoc Networks Using Connected Dominating Set”, In Mobile Networks and Applications, Vol. 18, No. 6, pp. 908-922, 2013.
[10]H. Chan, A. Perrig, and D. Song, “Random Key Pre-distribution Schemes for Sensor Networks”, In Proc. IEEE Sym. Security and Privacy, pp. 197, 2003.
[11]Jun-Won Ho, “Distributed Detection of Node Capture Attacks in Wireless Sensor Networks”, In Smart Wireless Sensor Networks, pp. 345-360, 2010.
[12]K. Shaila, S. H. Manjula, J. Thriveni, K. R. Venugopal, and L. M. Patnaik, “Resilience Against Node Capture Attack using Asymmetric Matrices in Key Pre-distribution Scheme in Wireless Sensor Networks”, International Journal on Computer Science and Engineering, Vol. 3, pp. 3490-3501, 2011.
[13]Bryan Parno, Adrian Perrig, and Virgil Gligor, “Distributed detection of node replication attacks in sensor networks”, In Proceedings of the IEEE Symposium on Security and Privacy, pages 49–63, May 2005.
[14]Amar Rasheed and Rabi N. Mahapatra, “Key Pre-distribution Schemes for Establishing Pairwise Keys with a Mobile Sink in Sensor Networks”, IEEE Trans. Parallel and Distributed Systems, Vol. 22, No. 1, pp. 176-184, 2011.
[15]Ruhma Tahir, Klaus McDonald-Maier, “Improving resilience against Node capture Attack in Wireless Sensor Networks using ICmetrics”, In IEEE 3rd international conference on Emerging Security Technologies, 2012.
[16]Sarmad Ullah khan, Luciano Lavagno, Claudio Pastrone, “A Key Management Scheme Supporting Node Mobility in Heterogeneous Sensor Network”, In IEEE 6th ICET, pp. 364-369, 2010.
[17]T.D.Subash, C.Divya, “Double Hash Function Scheme in Wireless Sensor Networks”, In IEEE Information and communication technologies, pp. 88-92, 2011.
[18]V. J. Rathod, M. Mehta, Security in Wireless Sensor Network: A Survey, Ganpat Univ. J Eng Technology, Vol. 1, No. 1, pp. 35-44, 2011.
[19]S.H. Jokhio, I.A. Jokhio, A.H. Kemp, “Node capture attack detection and defence in wireless sensor networks”, In IEEE IET Jounnals & Magazines, Vol. 2, No. 3, pp. 161-169, 2011.
[20]Yong Wang, Garhan Attebury, and Byrav Ramamurthy, “A survey of security issues in wireless sensor networks”, In IEEE Communications Surveys & Tutorials, Vol. 8, No. 2, pp. 02–23, 2006.