The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
Dans les réseaux de capteurs sans fil, les adversaires peuvent facilement lancer des attaques au niveau de la couche application, telles que de fausses attaques par injection de données et de fausses attaques par insertion de votes. Les fausses attaques par injection de données peuvent épuiser les ressources énergétiques et gâcher les efforts de réponse du monde réel. Les fausses attaques par insertion de votes empêcheraient la communication d’informations importantes sur le terrain. Afin de minimiser les dommages causés par de telles attaques, plusieurs solutions basées sur la prévention ont été proposées par les chercheurs, mais peuvent s'avérer inefficaces dans des conditions normales en raison de leur surcharge. Ainsi, ils doivent être activés dès la détection de telles attaques. Toutefois, les solutions existantes basées sur la détection ne répondent pas aux attaques de la couche application. Cet article présente un schéma permettant de contrer de manière adaptative les fausses attaques par injection de données et les fausses attaques par insertion de votes dans les réseaux de capteurs. Le schéma proposé se compose de deux sous-unités : l’une utilisée pour détecter les attaques de sécurité et l’autre utilisée pour sélectionner des contre-mesures efficaces contre les attaques. Les contre-mesures sont activées dès la détection des attaques de sécurité, en tenant compte de l'état actuel du réseau et des attaques. Une telle approche de contre-attaque adaptative peut conserver les ressources énergétiques, en particulier dans des conditions normales, et offrir une fiabilité contre les fausses attaques d'insertion de votes.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copier
Hae Young LEE, Tae Ho CHO, "A Scheme for Adaptively Countering Application Layer Security Attacks in Wireless Sensor Networks" in IEICE TRANSACTIONS on Communications,
vol. E93-B, no. 7, pp. 1881-1889, July 2010, doi: 10.1587/transcom.E93.B.1881.
Abstract: In wireless sensor networks, adversaries can easily launch application layer attacks, such as false data injection attacks and false vote insertion attacks. False data injection attacks may drain energy resources and waste real world response efforts. False vote insertion attacks would prevent reporting of important information on the field. In order to minimize the damage from such attacks, several prevention based solutions have been proposed by researchers, but may be inefficient in normal condition due to their overhead. Thus, they should be activated upon detection of such attacks. Existing detection based solutions, however, does not address application layer attacks. This paper presents a scheme to adaptively counter false data injection attacks and false vote insertion attacks in sensor networks. The proposed scheme consists of two sub-units: one used to detect the security attacks and the other used to select efficient countermeasures against the attacks. Countermeasures are activated upon detection of the security attacks, with the consideration of the current network status and the attacks. Such adaptive countering approach can conserve energy resources especially in normal condition and provide reliability against false vote insertion attacks.
URL: https://global.ieice.org/en_transactions/communications/10.1587/transcom.E93.B.1881/_p
Copier
@ARTICLE{e93-b_7_1881,
author={Hae Young LEE, Tae Ho CHO, },
journal={IEICE TRANSACTIONS on Communications},
title={A Scheme for Adaptively Countering Application Layer Security Attacks in Wireless Sensor Networks},
year={2010},
volume={E93-B},
number={7},
pages={1881-1889},
abstract={In wireless sensor networks, adversaries can easily launch application layer attacks, such as false data injection attacks and false vote insertion attacks. False data injection attacks may drain energy resources and waste real world response efforts. False vote insertion attacks would prevent reporting of important information on the field. In order to minimize the damage from such attacks, several prevention based solutions have been proposed by researchers, but may be inefficient in normal condition due to their overhead. Thus, they should be activated upon detection of such attacks. Existing detection based solutions, however, does not address application layer attacks. This paper presents a scheme to adaptively counter false data injection attacks and false vote insertion attacks in sensor networks. The proposed scheme consists of two sub-units: one used to detect the security attacks and the other used to select efficient countermeasures against the attacks. Countermeasures are activated upon detection of the security attacks, with the consideration of the current network status and the attacks. Such adaptive countering approach can conserve energy resources especially in normal condition and provide reliability against false vote insertion attacks.},
keywords={},
doi={10.1587/transcom.E93.B.1881},
ISSN={1745-1345},
month={July},}
Copier
TY - JOUR
TI - A Scheme for Adaptively Countering Application Layer Security Attacks in Wireless Sensor Networks
T2 - IEICE TRANSACTIONS on Communications
SP - 1881
EP - 1889
AU - Hae Young LEE
AU - Tae Ho CHO
PY - 2010
DO - 10.1587/transcom.E93.B.1881
JO - IEICE TRANSACTIONS on Communications
SN - 1745-1345
VL - E93-B
IS - 7
JA - IEICE TRANSACTIONS on Communications
Y1 - July 2010
AB - In wireless sensor networks, adversaries can easily launch application layer attacks, such as false data injection attacks and false vote insertion attacks. False data injection attacks may drain energy resources and waste real world response efforts. False vote insertion attacks would prevent reporting of important information on the field. In order to minimize the damage from such attacks, several prevention based solutions have been proposed by researchers, but may be inefficient in normal condition due to their overhead. Thus, they should be activated upon detection of such attacks. Existing detection based solutions, however, does not address application layer attacks. This paper presents a scheme to adaptively counter false data injection attacks and false vote insertion attacks in sensor networks. The proposed scheme consists of two sub-units: one used to detect the security attacks and the other used to select efficient countermeasures against the attacks. Countermeasures are activated upon detection of the security attacks, with the consideration of the current network status and the attacks. Such adaptive countering approach can conserve energy resources especially in normal condition and provide reliability against false vote insertion attacks.
ER -