Non-cryptography countermeasure against controllable event triggering attack in WSNs

Compressive sensing-based data collecting is a promising technique, which can significantly reduce the communication costs in wireless sensor networks (WSNs). However, a recent study shows that it is vulnerable to controllable event triggering attack (CETA): after compromising a sensor and carefully...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Peer-to-peer networking and applications 2021-05, Vol.14 (3), p.1071-1087
Hauptverfasser: Hu, Haoran, Chang, Wei
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 1087
container_issue 3
container_start_page 1071
container_title Peer-to-peer networking and applications
container_volume 14
creator Hu, Haoran
Chang, Wei
description Compressive sensing-based data collecting is a promising technique, which can significantly reduce the communication costs in wireless sensor networks (WSNs). However, a recent study shows that it is vulnerable to controllable event triggering attack (CETA): after compromising a sensor and carefully manipulating the environmental elements around a target in the subtree rooted at the sensor, an attacker is able to infer sensitive parameters of the target. The existing countermeasure is purely based on cryptography and requires central control. In this paper, we propose a lightweight non-cryptography-based approach by termly modifying the structure of the data gathering tree. However, how to efficiently and effectively construct the tree is an open problem. To solve the problem, we create a novel topology-based coding scheme and a set of distributed algorithms to mitigate the CETA attack. By adopting this approach, the time for successfully launching a CETA attack is significantly increased. Extensive simulations and experiments show that our solution can efficiently and securely build different data gathering trees for consecutive sensing tasks.
doi_str_mv 10.1007/s12083-020-01062-6
format Article
fullrecord <record><control><sourceid>proquest_webof</sourceid><recordid>TN_cdi_webofscience_primary_000615113600001</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2512388109</sourcerecordid><originalsourceid>FETCH-LOGICAL-c270t-72b6a9e19e538e820cffc364a1193ecd501157431f07f3bac801782ba12f67343</originalsourceid><addsrcrecordid>eNqNkMtOwzAQRSMEEqXwA6wisUSBGTtx0iWqeEkVLChiaTlmElJaO9guqH-PSxDsECuPrHvmcZLkGOEMAcpzjwwqngGDDBAEy8ROMsIJF5nIC9j9qXO2nxx4vwAQyAs2SuZ31mTabfpgW6f6l02q7doEcitSfu0oVa3qjA_x2wRnl0tVLymldzIhDa5rW3KdaVMVgtKvaWfSp4c7f5jsNWrp6ej7HSePV5fz6U02u7--nV7MMs1KCFnJaqEmhBMqeEUVA900motcYdyW9HMBiEWZc2ygbHitdAVYVqxWyBpR8pyPk5Ohb-_s25p8kAu7diaOlKxAxqsKYRJTbEhpZ7131MjedSvlNhJBbu3JwZ6M9uSXPSkidDpAH1TbxuuOjKYfELb-CkQuYgUY09X_09MuqNBZM92KjigfUN9vTZL7veGP9T4B5YaTFQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2512388109</pqid></control><display><type>article</type><title>Non-cryptography countermeasure against controllable event triggering attack in WSNs</title><source>Springer Nature - Complete Springer Journals</source><source>Web of Science - Science Citation Index Expanded - 2021&lt;img src="https://exlibris-pub.s3.amazonaws.com/fromwos-v2.jpg" /&gt;</source><creator>Hu, Haoran ; Chang, Wei</creator><creatorcontrib>Hu, Haoran ; Chang, Wei</creatorcontrib><description>Compressive sensing-based data collecting is a promising technique, which can significantly reduce the communication costs in wireless sensor networks (WSNs). However, a recent study shows that it is vulnerable to controllable event triggering attack (CETA): after compromising a sensor and carefully manipulating the environmental elements around a target in the subtree rooted at the sensor, an attacker is able to infer sensitive parameters of the target. The existing countermeasure is purely based on cryptography and requires central control. In this paper, we propose a lightweight non-cryptography-based approach by termly modifying the structure of the data gathering tree. However, how to efficiently and effectively construct the tree is an open problem. To solve the problem, we create a novel topology-based coding scheme and a set of distributed algorithms to mitigate the CETA attack. By adopting this approach, the time for successfully launching a CETA attack is significantly increased. Extensive simulations and experiments show that our solution can efficiently and securely build different data gathering trees for consecutive sensing tasks.</description><identifier>ISSN: 1936-6442</identifier><identifier>EISSN: 1936-6450</identifier><identifier>DOI: 10.1007/s12083-020-01062-6</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Algorithms ; Communications Engineering ; Computer Communication Networks ; Computer Science ; Computer Science, Information Systems ; Cryptography ; Engineering ; Information Systems and Communication Service ; Networks ; Parameter sensitivity ; Science &amp; Technology ; Sensors ; Signal,Image and Speech Processing ; Stability ; Technology ; Telecommunications ; Topology ; Wireless communications ; Wireless sensor networks</subject><ispartof>Peer-to-peer networking and applications, 2021-05, Vol.14 (3), p.1071-1087</ispartof><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC part of Springer Nature 2021</rights><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC part of Springer Nature 2021.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>true</woscitedreferencessubscribed><woscitedreferencescount>0</woscitedreferencescount><woscitedreferencesoriginalsourcerecordid>wos000615113600001</woscitedreferencesoriginalsourcerecordid><cites>FETCH-LOGICAL-c270t-72b6a9e19e538e820cffc364a1193ecd501157431f07f3bac801782ba12f67343</cites><orcidid>0000-0002-1156-6742</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s12083-020-01062-6$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s12083-020-01062-6$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>315,781,785,27929,27930,39263,41493,42562,51324</link.rule.ids></links><search><creatorcontrib>Hu, Haoran</creatorcontrib><creatorcontrib>Chang, Wei</creatorcontrib><title>Non-cryptography countermeasure against controllable event triggering attack in WSNs</title><title>Peer-to-peer networking and applications</title><addtitle>Peer-to-Peer Netw. Appl</addtitle><addtitle>PEER PEER NETW APPL</addtitle><description>Compressive sensing-based data collecting is a promising technique, which can significantly reduce the communication costs in wireless sensor networks (WSNs). However, a recent study shows that it is vulnerable to controllable event triggering attack (CETA): after compromising a sensor and carefully manipulating the environmental elements around a target in the subtree rooted at the sensor, an attacker is able to infer sensitive parameters of the target. The existing countermeasure is purely based on cryptography and requires central control. In this paper, we propose a lightweight non-cryptography-based approach by termly modifying the structure of the data gathering tree. However, how to efficiently and effectively construct the tree is an open problem. To solve the problem, we create a novel topology-based coding scheme and a set of distributed algorithms to mitigate the CETA attack. By adopting this approach, the time for successfully launching a CETA attack is significantly increased. Extensive simulations and experiments show that our solution can efficiently and securely build different data gathering trees for consecutive sensing tasks.</description><subject>Algorithms</subject><subject>Communications Engineering</subject><subject>Computer Communication Networks</subject><subject>Computer Science</subject><subject>Computer Science, Information Systems</subject><subject>Cryptography</subject><subject>Engineering</subject><subject>Information Systems and Communication Service</subject><subject>Networks</subject><subject>Parameter sensitivity</subject><subject>Science &amp; Technology</subject><subject>Sensors</subject><subject>Signal,Image and Speech Processing</subject><subject>Stability</subject><subject>Technology</subject><subject>Telecommunications</subject><subject>Topology</subject><subject>Wireless communications</subject><subject>Wireless sensor networks</subject><issn>1936-6442</issn><issn>1936-6450</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><sourceid>HGBXW</sourceid><sourceid>8G5</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><sourceid>GUQSH</sourceid><sourceid>M2O</sourceid><recordid>eNqNkMtOwzAQRSMEEqXwA6wisUSBGTtx0iWqeEkVLChiaTlmElJaO9guqH-PSxDsECuPrHvmcZLkGOEMAcpzjwwqngGDDBAEy8ROMsIJF5nIC9j9qXO2nxx4vwAQyAs2SuZ31mTabfpgW6f6l02q7doEcitSfu0oVa3qjA_x2wRnl0tVLymldzIhDa5rW3KdaVMVgtKvaWfSp4c7f5jsNWrp6ej7HSePV5fz6U02u7--nV7MMs1KCFnJaqEmhBMqeEUVA900motcYdyW9HMBiEWZc2ygbHitdAVYVqxWyBpR8pyPk5Ohb-_s25p8kAu7diaOlKxAxqsKYRJTbEhpZ7131MjedSvlNhJBbu3JwZ6M9uSXPSkidDpAH1TbxuuOjKYfELb-CkQuYgUY09X_09MuqNBZM92KjigfUN9vTZL7veGP9T4B5YaTFQ</recordid><startdate>20210501</startdate><enddate>20210501</enddate><creator>Hu, Haoran</creator><creator>Chang, Wei</creator><general>Springer US</general><general>Springer Nature</general><general>Springer Nature B.V</general><scope>BLEPL</scope><scope>DTL</scope><scope>HGBXW</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7XB</scope><scope>88I</scope><scope>8AL</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8G5</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0N</scope><scope>M2O</scope><scope>M2P</scope><scope>MBDVC</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope><orcidid>https://orcid.org/0000-0002-1156-6742</orcidid></search><sort><creationdate>20210501</creationdate><title>Non-cryptography countermeasure against controllable event triggering attack in WSNs</title><author>Hu, Haoran ; Chang, Wei</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c270t-72b6a9e19e538e820cffc364a1193ecd501157431f07f3bac801782ba12f67343</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Algorithms</topic><topic>Communications Engineering</topic><topic>Computer Communication Networks</topic><topic>Computer Science</topic><topic>Computer Science, Information Systems</topic><topic>Cryptography</topic><topic>Engineering</topic><topic>Information Systems and Communication Service</topic><topic>Networks</topic><topic>Parameter sensitivity</topic><topic>Science &amp; Technology</topic><topic>Sensors</topic><topic>Signal,Image and Speech Processing</topic><topic>Stability</topic><topic>Technology</topic><topic>Telecommunications</topic><topic>Topology</topic><topic>Wireless communications</topic><topic>Wireless sensor networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Hu, Haoran</creatorcontrib><creatorcontrib>Chang, Wei</creatorcontrib><collection>Web of Science Core Collection</collection><collection>Science Citation Index Expanded</collection><collection>Web of Science - Science Citation Index Expanded - 2021</collection><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Science Database (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>Research Library (Alumni Edition)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Computing Database</collection><collection>Research Library</collection><collection>Science Database</collection><collection>Research Library (Corporate)</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>Peer-to-peer networking and applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Hu, Haoran</au><au>Chang, Wei</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Non-cryptography countermeasure against controllable event triggering attack in WSNs</atitle><jtitle>Peer-to-peer networking and applications</jtitle><stitle>Peer-to-Peer Netw. Appl</stitle><stitle>PEER PEER NETW APPL</stitle><date>2021-05-01</date><risdate>2021</risdate><volume>14</volume><issue>3</issue><spage>1071</spage><epage>1087</epage><pages>1071-1087</pages><issn>1936-6442</issn><eissn>1936-6450</eissn><abstract>Compressive sensing-based data collecting is a promising technique, which can significantly reduce the communication costs in wireless sensor networks (WSNs). However, a recent study shows that it is vulnerable to controllable event triggering attack (CETA): after compromising a sensor and carefully manipulating the environmental elements around a target in the subtree rooted at the sensor, an attacker is able to infer sensitive parameters of the target. The existing countermeasure is purely based on cryptography and requires central control. In this paper, we propose a lightweight non-cryptography-based approach by termly modifying the structure of the data gathering tree. However, how to efficiently and effectively construct the tree is an open problem. To solve the problem, we create a novel topology-based coding scheme and a set of distributed algorithms to mitigate the CETA attack. By adopting this approach, the time for successfully launching a CETA attack is significantly increased. Extensive simulations and experiments show that our solution can efficiently and securely build different data gathering trees for consecutive sensing tasks.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s12083-020-01062-6</doi><tpages>17</tpages><orcidid>https://orcid.org/0000-0002-1156-6742</orcidid></addata></record>
fulltext fulltext
identifier ISSN: 1936-6442
ispartof Peer-to-peer networking and applications, 2021-05, Vol.14 (3), p.1071-1087
issn 1936-6442
1936-6450
language eng
recordid cdi_webofscience_primary_000615113600001
source Springer Nature - Complete Springer Journals; Web of Science - Science Citation Index Expanded - 2021<img src="https://exlibris-pub.s3.amazonaws.com/fromwos-v2.jpg" />
subjects Algorithms
Communications Engineering
Computer Communication Networks
Computer Science
Computer Science, Information Systems
Cryptography
Engineering
Information Systems and Communication Service
Networks
Parameter sensitivity
Science & Technology
Sensors
Signal,Image and Speech Processing
Stability
Technology
Telecommunications
Topology
Wireless communications
Wireless sensor networks
title Non-cryptography countermeasure against controllable event triggering attack in WSNs
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-16T11%3A06%3A32IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_webof&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Non-cryptography%20countermeasure%20against%20controllable%20event%20triggering%20attack%20in%20WSNs&rft.jtitle=Peer-to-peer%20networking%20and%20applications&rft.au=Hu,%20Haoran&rft.date=2021-05-01&rft.volume=14&rft.issue=3&rft.spage=1071&rft.epage=1087&rft.pages=1071-1087&rft.issn=1936-6442&rft.eissn=1936-6450&rft_id=info:doi/10.1007/s12083-020-01062-6&rft_dat=%3Cproquest_webof%3E2512388109%3C/proquest_webof%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2512388109&rft_id=info:pmid/&rfr_iscdi=true