Insider DoS attacks on epidemic propagation strategies of network reprogramming in wireless sensor networks

Yu Zhang, Xing She Zhou, Yee Wei Law, Marimuthu Palaniswami

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Network reprogramming is a crucial service in wireless sensor networks (WSNs) that relies on epidemic strategy for spreading software updates by just having a local view of the networks. Securing the process of network reprogramming is essential in some certain WSNs applications, state-of-the-art secure network reprogramming protocols for WSNs aim for the efficient source authentication and integrity verification of code image, however, due to the resource constrains of WSNs, existing secure network reprogramming protocols are vulnerable to Denial of Service (DoS) attacks when sensor nodes can be compromised (insider DoS attacks). In this paper, we identify different types of DoS attacks exploiting the epidemic propagation strategies used by Deluge and propose corresponding analysis models to attempt to quantify the cost of these attacks damage. Simulation further shows the impact of insider DoS attacks on network reprogramming in WSNs.

Original languageEnglish
Title of host publication5th International Conference on Information Assurance and Security, IAS 2009
Pages263-266
Number of pages4
DOIs
StatePublished - 2009
Event5th International Conference on Information Assurance and Security, IAS 2009 - Xian, China
Duration: 18 Aug 200920 Sep 2009

Publication series

Name5th International Conference on Information Assurance and Security, IAS 2009
Volume2

Conference

Conference5th International Conference on Information Assurance and Security, IAS 2009
Country/TerritoryChina
CityXian
Period18/08/0920/09/09

Keywords

  • Deluge
  • DoS attacks
  • Network reprogramming
  • Security
  • Sensor networks

Fingerprint

Dive into the research topics of 'Insider DoS attacks on epidemic propagation strategies of network reprogramming in wireless sensor networks'. Together they form a unique fingerprint.

Cite this