In wireless sensor networks, adversaries can easily launch application layer attacks, such as false data injection attacks and false vote insertion attacks. False data injection attacks may drain energy resources and waste real world response efforts. False vote insertion attacks would prevent reporting of important information on the field. In order to minimize the damage from such attacks, several prevention based solutions have been proposed by researchers, but may be inefficient in normal condition due to their overhead. Thus, they should be activated upon detection of such attacks. Existing detection based solutions, however, does not address application layer attacks. This paper presents a scheme to adaptively counter false data injection attacks and false vote insertion attacks in sensor networks. The proposed scheme consists of two sub-units: one used to detect the security attacks and the other used to select efficient countermeasures against the attacks. Countermeasures are activated upon detection of the security attacks, with the consideration of the current network status and the attacks. Such adaptive countering approach can conserve energy resources especially in normal condition and provide reliability against false vote insertion attacks.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Hae Young LEE, Tae Ho CHO, "A Scheme for Adaptively Countering Application Layer Security Attacks in Wireless Sensor Networks" in IEICE TRANSACTIONS on Communications,
vol. E93-B, no. 7, pp. 1881-1889, July 2010, doi: 10.1587/transcom.E93.B.1881.
Abstract: In wireless sensor networks, adversaries can easily launch application layer attacks, such as false data injection attacks and false vote insertion attacks. False data injection attacks may drain energy resources and waste real world response efforts. False vote insertion attacks would prevent reporting of important information on the field. In order to minimize the damage from such attacks, several prevention based solutions have been proposed by researchers, but may be inefficient in normal condition due to their overhead. Thus, they should be activated upon detection of such attacks. Existing detection based solutions, however, does not address application layer attacks. This paper presents a scheme to adaptively counter false data injection attacks and false vote insertion attacks in sensor networks. The proposed scheme consists of two sub-units: one used to detect the security attacks and the other used to select efficient countermeasures against the attacks. Countermeasures are activated upon detection of the security attacks, with the consideration of the current network status and the attacks. Such adaptive countering approach can conserve energy resources especially in normal condition and provide reliability against false vote insertion attacks.
URL: https://global.ieice.org/en_transactions/communications/10.1587/transcom.E93.B.1881/_p
Copy
@ARTICLE{e93-b_7_1881,
author={Hae Young LEE, Tae Ho CHO, },
journal={IEICE TRANSACTIONS on Communications},
title={A Scheme for Adaptively Countering Application Layer Security Attacks in Wireless Sensor Networks},
year={2010},
volume={E93-B},
number={7},
pages={1881-1889},
abstract={In wireless sensor networks, adversaries can easily launch application layer attacks, such as false data injection attacks and false vote insertion attacks. False data injection attacks may drain energy resources and waste real world response efforts. False vote insertion attacks would prevent reporting of important information on the field. In order to minimize the damage from such attacks, several prevention based solutions have been proposed by researchers, but may be inefficient in normal condition due to their overhead. Thus, they should be activated upon detection of such attacks. Existing detection based solutions, however, does not address application layer attacks. This paper presents a scheme to adaptively counter false data injection attacks and false vote insertion attacks in sensor networks. The proposed scheme consists of two sub-units: one used to detect the security attacks and the other used to select efficient countermeasures against the attacks. Countermeasures are activated upon detection of the security attacks, with the consideration of the current network status and the attacks. Such adaptive countering approach can conserve energy resources especially in normal condition and provide reliability against false vote insertion attacks.},
keywords={},
doi={10.1587/transcom.E93.B.1881},
ISSN={1745-1345},
month={July},}
Copy
TY - JOUR
TI - A Scheme for Adaptively Countering Application Layer Security Attacks in Wireless Sensor Networks
T2 - IEICE TRANSACTIONS on Communications
SP - 1881
EP - 1889
AU - Hae Young LEE
AU - Tae Ho CHO
PY - 2010
DO - 10.1587/transcom.E93.B.1881
JO - IEICE TRANSACTIONS on Communications
SN - 1745-1345
VL - E93-B
IS - 7
JA - IEICE TRANSACTIONS on Communications
Y1 - July 2010
AB - In wireless sensor networks, adversaries can easily launch application layer attacks, such as false data injection attacks and false vote insertion attacks. False data injection attacks may drain energy resources and waste real world response efforts. False vote insertion attacks would prevent reporting of important information on the field. In order to minimize the damage from such attacks, several prevention based solutions have been proposed by researchers, but may be inefficient in normal condition due to their overhead. Thus, they should be activated upon detection of such attacks. Existing detection based solutions, however, does not address application layer attacks. This paper presents a scheme to adaptively counter false data injection attacks and false vote insertion attacks in sensor networks. The proposed scheme consists of two sub-units: one used to detect the security attacks and the other used to select efficient countermeasures against the attacks. Countermeasures are activated upon detection of the security attacks, with the consideration of the current network status and the attacks. Such adaptive countering approach can conserve energy resources especially in normal condition and provide reliability against false vote insertion attacks.
ER -