Author : Wenjun Gu
Publisher :
ISBN 13 :
Total Pages : 133 pages
Book Rating : 4.:/5 (244 download)
Book Synopsis Defending Against Node-targeted Attacks in Wireless Networks by : Wenjun Gu
Download or read book Defending Against Node-targeted Attacks in Wireless Networks written by Wenjun Gu and published by . This book was released on 2008 with total page 133 pages. Available in PDF, EPUB and Kindle. Book excerpt: Abstract: In recent years, Wireless Sensor Networks (WSNs) and Wireless Local Area Networks (WLANs) have witnessed dramatic development due to the variety of applications and cost effectiveness in network deployment. However, we believe the wide application of both WSNs and WLANs in the future is contingent on the security of the networks. Considering that wireless nodes in both WSNs and WLANs are less powerful and more vulnerable than their wired counterparts, we focus on studying the attacks targeting on wireless nodes and their defenses in this dissertation. First, we study node destroying attack in WSNs and its defense. In search based node destroying attack we model, the attacker walks through the network using signal detecting equipment to locate active sensors, and then destroys them. To defend against such attack, we design a defense approach based on sacrificial nodes. The core principle of our defense is to trade short term local coverage for long term global coverage through the sacrificial node assisted attack notification and sensors states switching. Second, we study node penetrating attack in WSNs and its defense. In node penetrating attack, the attacker is able to penetrate a certain percentage of the nodes in the network, and access all the secret information stored in the penetrated nodes. We propose a defense methodology called network decoupling to deal with such attack, based on which we design two new key management protocols, i.e., RKP-DE and RKP-DEA. Third, we study node spoofing attack in IEEE 802.11 based WLANs. Such attack takes advantage of the security vulnerabilities of a special but important type of frames in 802.11 WLANs called null data frame. We first model and implement the node spoofing attack, and evaluate its effectiveness based on extensive experiments. Then, we design and implement our defense mechanism based on embedded temporal information in the genuine null data frames. With the popularity and wide applications of WSNs and WLANs, security is becoming increasingly critical to the success of such wireless networks. We hope that our work in this dissertation can provide strong foundations and further motivate other researchers to explore this area in the future.