ETRI-Knowledge Sharing Plaform

ENGLISH

성과물

논문 검색
구분 SCI
연도 ~ 키워드

상세정보

학술지 A Scheme for Adaptively Countering Application Layer Security Attacks in Wireless Sensor Networks
Cited 11 time in scopus Download 0 time Share share facebook twitter linkedin kakaostory
저자
이해영, 조대호
발행일
201007
출처
IEICE Transactions on Communications, v.E93.B no.7, pp.1881-1889
ISSN
0916-8516
출판사
일본, 전자정보통신학회 (IEICE)
DOI
https://dx.doi.org/10.1587/transcom.E93.B.1881
협약과제
09MS4700, 정보 산업기기용 임베디드SW 공통 플랫폼 개발, 임채덕
초록
In wireless sensor networks, adversaries can easily launch application layer attacks, such as false data injection attacks and false vote insertion attacks. False data injection attacks may drain energy resources and waste real world response efforts. False vote insertion attacks would prevent reporting of important information on the field. In order to minimize the damage from such attacks, several prevention based solutions have been proposed by researchers, but may be inefficient in normal condition due to their overhead. Thus, they should be activated upon detection of such attacks. Existing detection based solutions, however, does not address application layer attacks. This paper presents a scheme to adaptively counter false data injection attacks and false vote insertion attacks in sensor networks. The proposed scheme consists of two sub-units: one used to detect the security attacks and the other used to select efficient countermeasures against the attacks. Countermeasures are activated upon detection of the security attacks with the consideration of the current network status and the attacks. Such adaptive countering approach can conserve energy resources especially in normal condition and provide reliability against false vote insertion attacks. Copyright © 2010 The Institute of Electronics, Information and Communication Engineers.
키워드
Adaptive countering, False data injection attacks, False vote insertion attacks, Fuzzy logic, Security attack detection, Wireless sensor networks
KSP 제안 키워드
Attack Detection, False data injection attacks, Information and communication, Network status, Normal condition, Real-world, Security attacks, Wireless sensor networks(WSNs), application layer security, energy resources, fuzzy logic(FL)