30677

An Efficient Overlapped Groups based Compromised Nodes Detection at First Stage for WSN

Article

Last updated: 04 Jan 2025

Subjects

-

Tags

-

Abstract

Surveillance WSNs are deployed in hostile environments such as perimeter, border locations and battlefields to detect unauthorized intrusions. Therefore, Surveillance WSNs are highly vulnerable to collaborative work of attackers to compromise many legitimate nodes. Securing surveillance WSNs is challenging because of low-cost, limited capabilities, resource-constrained sensor nodes. Several protocols have been proposed for detecting compromised nodes. However, some protocols rely on an implicit assumption that compromised node will change its location or its signal strength will alter after it is compromised; other protocols use alert messages or reputation based trust models which require the nodes misbehavior to discover the compromised nodes. Node compromise attack is a multi-stage attack which consists of three stages: physically capturing and compromising sensor nodes; redeploying the compromised nodes back to network and compromised sensor nodes rejoining the network. Our work studies how to achieve high resiliency against an increasing number of compromised nodes in large surveillance WSN in hostile environment by collaborative work of attackers at the first stage. Specifically, after sensor nodes are deployed they first build overlapped groups in ad hoc pattern where a group is composed of four nodes. Then, the nodes within the overlapped groups can monitor each other to detect any node compromise attempt. We describe the building blocks that can be used to build the protocol for the detection process. Our protocol is designed to be resistant against large number of compromised nodes by collaborative work of attackers. Extensive simulation results are given to demonstrate the high detection rate of the proposed scheme.

DOI

10.21608/iceeng.2012.30677

Keywords

Overlapped groups, Wireless Sensor Network, Node Compromise Attack, surveillance

Authors

First Name

Mohamed

Last Name

Megahed

MiddleName

Helmy

Affiliation

Egyptian Armed Forces.

Email

-

City

-

Orcid

-

First Name

Dimitrios

Last Name

Makrakis

MiddleName

-

Affiliation

Prof., School of Information Technology and Engineering, University of Ottawa, Ottawa, Canada.

Email

-

City

-

Orcid

-

Volume

8

Article Issue

8th International Conference on Electrical Engineering ICEENG 2012

Related Issue

5272

Issue Date

2012-05-01

Receive Date

2019-04-24

Publish Date

2012-05-01

Page Start

1

Page End

14

Print ISSN

2636-4433

Online ISSN

2636-4441

Link

https://iceeng.journals.ekb.eg/article_30677.html

Detail API

https://iceeng.journals.ekb.eg/service?article_code=30677

Order

42

Type

Original Article

Type Code

833

Publication Type

Journal

Publication Title

The International Conference on Electrical Engineering

Publication Link

https://iceeng.journals.ekb.eg/

MainTitle

An Efficient Overlapped Groups based Compromised Nodes Detection at First Stage for WSN

Details

Type

Article

Created At

22 Jan 2023