Computer Science ›› 2017, Vol. 44 ›› Issue (8): 129-133.doi: 10.11896/j.issn.1002-137X.2017.08.023

Previous Articles     Next Articles

Survivability Evaluation Model for Wireless Sensor Network under Multiple Attacks

LIU Zhi-feng, CHEN Kai, LI Lei and ZHOU Cong-hua   

  • Online:2018-11-13 Published:2018-11-13

Abstract: Survivability of wireless sensor networks has emerged as a fundamental concern for sensor network deployment.One survivable wireless network demands continuous supplies of critical services under concurrent attacks.Due to such requirement,a survivability evaluation model of WSN under mixed means of attacks,where the network topology is described as a cluster-based one was presented.Because of several nodes being attacked in one single cluster,a threshold mechanism to trigger the transition between the states of WSN under mixed ways of attacks was designed to make countermeasures more accurately.Adopting the continuous time Markov chain,one survivability evaluation model of WSN is constructed,thus attributes as availability and survivability can be obtained.Parameters which influence the availability and survivability have been analyzed.Simulation results show that enhancing the repair rate and response rate of attack can improve the availability and survivability effectively and the introduced model can reflect means of attacks correctly.

Key words: Wireless sensor networks,Survivability,Availability,Attack,Continuoustime Markov chain

[1] MAHMOOD M A,SEAH W K G,WELCH I.Reliability inwireless sensor networks:A survey and challenges ahead[J].Computer Networks,2015,79:166-187.
[2] DENG X,ZHANG L J.Overview of WSNs survivability enhancing technology[J].Transducer and Microsystem Technologies,2014,3(1):1-4.(in Chinese) 邓鑫,张乐君.无线传感器网络可生存性增强技术研究概述[J].传感器与微系统,2014,33(1):1-4.
[3] ZHANG H,CHENG P,SHI L,et al.Optimal DoS Attack Sche- duling in Wireless Networked Control System[J].IEEE Tran-sactions on Control Systems Technology,2015,24(3):843-852.
[4] BHISE A M,KAMBLE S D.Review on Detection and Mitigation of Sybil Attack in the Network[J].Procedia Computer Science,2016,78:395-401.
[5] GUI M Q,LIU Y B,ZHOU L Y.Intrusion detection based on game theory in wireless sensor network[J].Journal of Chongqing University of Posts and Telecommunications (Natural Science Edition), 2016,28(3):414-420.(in Chinese) 桂明倩,刘宴兵,周瞭永.WSN中基于博弈理论的入侵检测研究[J].重庆邮电大学学报(自然科学版),2016,28(3):414-420.
[6] JI G Y.Tolerate Invasion Ability Evaluation Modeling Wireless Network Simulation Analysis[J].Computer Simulation,2016,33(7):273-276.(in Chinese) 姬广永.无线网络中容忍入侵能力评估模型仿真分析[J].计算机仿真,2016,33(7):273-276.
[7] FU X W,LI W F,DUAN Y.Invulner-Ability of ClusteringWireless Sensor Networks Towards Cascading Failures[J].Journal of Computer Research and Development,2016,53(12):2882-2892.(in Chinese) 符修文,李文锋,段莹.分簇无线传感器网络级联失效抗毁性研究[J].计算机研究与发展,2016,53(12):2882-2892.
[8] ZHU S C,WANG H T,WU L C,et al.Survivability Estimation Model for Clustered Wireless Sensor Network Based on SMP[J].Chinese Journal of Sensors & Actuators,2014,27(3):383-387.(in Chinese)朱世才,王海涛,吴连才,等.基于SMP的分簇WSN生存性评估模型[J].传感技术学报,2014,27(3):383-387.
[9] YI Z,DOHI T,OKAMURA H.Survivability modeling and ana-lysis for a power-aware wireless ad hoc network[C]∥International Congress on Ultra Modern Telecommunications and Control Systems and Workshops.IEEE,2012:813-819.
[10] XIONG S M,WANG L M,ZHAN Y Z.Quantitative evaluation of topology intrusion tolerance in wireless sensor networks based on semi-Markov process[J].Journal on Communications,2010, 31(7):24-32.(in Chinese) 熊书明,王良民,詹永照.基于SMP的无线传感器网络拓扑容侵定量评估[J].通信学报,2010,31(7):24-32.
[11] SHEN S G,HUANG L J,FAN E.Survivability evaluation for WSNs under malware infection[J].Chinese Journal of Sensors and Actuators,2016,29(7):1083-1089.(in Chinese) 沈士根,黄龙军,范恩.受恶意程序传染的WSNs可生存性评估[J].传感技术学报,2016,29(7):1083-1089.
[12] LI J P,WANG X K.WSN reliability evaluation based on fuzzy neural network[J].Journal of Computer Applications,2016,36(A02):69-72.(in Chinese) 李建平,王晓凯.基于模糊神经网络的无线传感器网络可靠性评估[J].计算机应用,2016,36(A02):69-72.
[13] YUE Y,LI J,FAN H,et al.An efficient reliability evaluation method for industrial wireless sensor networks[J].Journal of Southeast University,2016,32(2):195-200.
[14] YI Z,DOHI T.Survivability Analysis for a Wireless Ad HocNetwork Based on Semi-Markov Model[J].IEICE Transactions on Information&Systems,2012,E95.D (12):2844-2851.
[15] CHANG C J,ZHU C H,WANG H G,et al.Survivability Evalua-tion of Cluster-Based Wireless Sensor Network under DoS Attacks[C]∥Wireless Communications,Networking and Mobile Computing.2009.
[16] STAVROU E,PITSLLIDES A.Situation aware intrusion reco-very policy in WSNs[C]∥International Conference on Cyber Si-tuational Awareness,Data Analytics and Assessment.2016:1-8.
[17] VIRMANI D,KAUR S,JAIN S.Secure and Fault Tolerant Dynamic Cluster Head Selection Method for Wireless Sensor Net- works [J].Procedia Computer Science,2015,46(2):989-996.
[18] NEWELL A,YAO H,RYKER A,et al.Node-Capture Resilient Key Establishment in Sensor Networks:Design Space and New Protocols [J].Acm Computing Surveys,2015,47(2):1-34.
[19] HAMMOUDEH M,NEWMAN R.Adaptive routing in wireless sensor networks:QoS optimisation for enhanced application performance [J].Information Fusion,2015,22(71):3-15.
[20] WARD J R,YOUNIS M.Base Station anonymity distributedSelf-assessment in Wireless Sensor Networks[C]∥IEEE International Conference on Intelligence and Security Informatics.IEEE,2015.
[21] KIM T Y,LEED R.Communication method,base station,communication system,and mobile terminal [J].Journal of Organizational Behavior,2015,30(7):1001-1018.
[22] ZHANG Q,YU T,NING P.A Framework for Identifying Com- promised Nodes in Wireless Sensor Networks [J].ACM Tran-sactions on Information & System Security,2008,11(3):1-10.
[23] SINGH V P,JAIN S,SINGHAI J.Hello Flood Attack and its Countermeasures in Wireless Sensor Networks [J].InternationalJournal of Computer Science Issues,2010,7(3):23-24.
[24] KARLOF C,WAGNER D.Secure routing in wireless sensor net-works:attacks and countermeasures[C]∥IEEE International Workshop on Sensor Network Protocols and Applications,2003.IEEE,2003:293-315.
[25] GOYAL S,BHATIA T,VERMA A K.Wormhole and Sybil attack in WSN:A review[C]∥International Conference on Computing for Sustainable Global Development.IEEE,2015.
[26] ZHANG Y,FAN K F,ZHANG S B.AOA based trust evaluation scheme for Sybil attack detection in WSN[J].Application Research of Computers,2010,27(5):1847-1844.(in Chinese) 张艳,范科峰,张素兵.一种基于AOA信任评估的无线传感器网络Sybil攻击检测新方法[J].计算机应用研究,2010,27(5):1847-1849.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!