Conference Paper

Quantifying eavesdropping vulnerability in sensor networks.

DOI: 10.1145/1080885.1080887 Conference: Proceedings of the 2nd Workshop on Data Management for Sensor Networks, in conjunction with VLDB, DMSN 2005, Trondheim, Norway, August 30, 2005
Source: DBLP

ABSTRACT With respect to security, sensor networks have a number of considerations that separate them from traditional distributed systems. First, sensor devices are typically vulnerable to physical compromise. Second, they have significant power and processing constraints. Third, the most critical security issue is protecting the (statistically derived) aggregate output of the system, even if individual nodes may be compromised. We suggest that these considerations merit a rethinking of traditional security techniques: rather than depending on the resilience of cryptographic techniques, in this paper we develop new techniques to tolerate compromised nodes and to even mislead an adversary. We present our initial work on probabilistically quantifying the security of sensor network protocols, with respect to sensor data distributions and network topologies. Beginning with a taxonomy of attacks based on an adversary's goals, we focus on how to evaluate the vulnerability of sensor network protocols to eavesdropping. Different topologies and aggregation functions provide different probabilistic guarantees about system security, and make different trade-offs in power and accuracy.

  • [Show abstract] [Hide abstract]
    ABSTRACT: The previous works in sensor networks security have focused on the aspect of confidentiality, authentication and integrity based on cryptographic primitives. There has been no prior work to assess the survivability in systematic way. In this paper, we propose a framework for enhancing the survivability of sensor networks using self-regenerative software rejuvenation and reconfiguration. We utilize self- regenerative capabilities for detecting misbehaving in node level and apply software rejuvenation and reconfiguration methodology or both in order to extend the availability of sensor networks. The security analysis shows the feasibility of our approach.
    Computational Intelligence and Security Workshops, 2007. CISW 2007. International Conference on; 01/2008
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: This paper concerns the eavesdropping problem from the eavesdroppers' perspective, which is new since most of previous studies only concentrate on the good nodes. We propose an analytical framework to investigate the eavesdropping attacks, taking account into various channel conditions and antenna models. Our extensive numerical results show that the probability of eavesdropping attacks heavily depends on the shadow fading effect, the path loss effect and the antenna models; particularly, they imply that using directional antennas at eavesdroppers can increase the probability of eavesdropping attacks when the path loss effect is less notable. This study is helpful for us to prevent the eavesdropping attacks effectively and economically.
    IEEE International Conference on Communication Systems; 11/2014
  • [Show abstract] [Hide abstract]
    ABSTRACT: The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying the security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security protocol literature.
    Proceedings of the 2012 international conference on Computer Safety, Reliability, and Security; 09/2012

Full-text (2 Sources)

Available from
Jun 10, 2014