Non-cryptography countermeasure against controllable event triggering attack in WSNs
Compressive sensing-based data collecting is a promising technique, which can significantly reduce the communication costs in wireless sensor networks (WSNs). However, a recent study shows that it is vulnerable to controllable event triggering attack (CETA): after compromising a sensor and carefully...
Gespeichert in:
Veröffentlicht in: | Peer-to-peer networking and applications 2021-05, Vol.14 (3), p.1071-1087 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 1087 |
---|---|
container_issue | 3 |
container_start_page | 1071 |
container_title | Peer-to-peer networking and applications |
container_volume | 14 |
creator | Hu, Haoran Chang, Wei |
description | Compressive sensing-based data collecting is a promising technique, which can significantly reduce the communication costs in wireless sensor networks (WSNs). However, a recent study shows that it is vulnerable to controllable event triggering attack (CETA): after compromising a sensor and carefully manipulating the environmental elements around a target in the subtree rooted at the sensor, an attacker is able to infer sensitive parameters of the target. The existing countermeasure is purely based on cryptography and requires central control. In this paper, we propose a lightweight non-cryptography-based approach by termly modifying the structure of the data gathering tree. However, how to efficiently and effectively construct the tree is an open problem. To solve the problem, we create a novel topology-based coding scheme and a set of distributed algorithms to mitigate the CETA attack. By adopting this approach, the time for successfully launching a CETA attack is significantly increased. Extensive simulations and experiments show that our solution can efficiently and securely build different data gathering trees for consecutive sensing tasks. |
doi_str_mv | 10.1007/s12083-020-01062-6 |
format | Article |
fullrecord | <record><control><sourceid>proquest_webof</sourceid><recordid>TN_cdi_webofscience_primary_000615113600001</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2512388109</sourcerecordid><originalsourceid>FETCH-LOGICAL-c270t-72b6a9e19e538e820cffc364a1193ecd501157431f07f3bac801782ba12f67343</originalsourceid><addsrcrecordid>eNqNkMtOwzAQRSMEEqXwA6wisUSBGTtx0iWqeEkVLChiaTlmElJaO9guqH-PSxDsECuPrHvmcZLkGOEMAcpzjwwqngGDDBAEy8ROMsIJF5nIC9j9qXO2nxx4vwAQyAs2SuZ31mTabfpgW6f6l02q7doEcitSfu0oVa3qjA_x2wRnl0tVLymldzIhDa5rW3KdaVMVgtKvaWfSp4c7f5jsNWrp6ej7HSePV5fz6U02u7--nV7MMs1KCFnJaqEmhBMqeEUVA900motcYdyW9HMBiEWZc2ygbHitdAVYVqxWyBpR8pyPk5Ohb-_s25p8kAu7diaOlKxAxqsKYRJTbEhpZ7131MjedSvlNhJBbu3JwZ6M9uSXPSkidDpAH1TbxuuOjKYfELb-CkQuYgUY09X_09MuqNBZM92KjigfUN9vTZL7veGP9T4B5YaTFQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2512388109</pqid></control><display><type>article</type><title>Non-cryptography countermeasure against controllable event triggering attack in WSNs</title><source>Springer Nature - Complete Springer Journals</source><source>Web of Science - Science Citation Index Expanded - 2021<img src="https://exlibris-pub.s3.amazonaws.com/fromwos-v2.jpg" /></source><creator>Hu, Haoran ; Chang, Wei</creator><creatorcontrib>Hu, Haoran ; Chang, Wei</creatorcontrib><description>Compressive sensing-based data collecting is a promising technique, which can significantly reduce the communication costs in wireless sensor networks (WSNs). However, a recent study shows that it is vulnerable to controllable event triggering attack (CETA): after compromising a sensor and carefully manipulating the environmental elements around a target in the subtree rooted at the sensor, an attacker is able to infer sensitive parameters of the target. The existing countermeasure is purely based on cryptography and requires central control. In this paper, we propose a lightweight non-cryptography-based approach by termly modifying the structure of the data gathering tree. However, how to efficiently and effectively construct the tree is an open problem. To solve the problem, we create a novel topology-based coding scheme and a set of distributed algorithms to mitigate the CETA attack. By adopting this approach, the time for successfully launching a CETA attack is significantly increased. Extensive simulations and experiments show that our solution can efficiently and securely build different data gathering trees for consecutive sensing tasks.</description><identifier>ISSN: 1936-6442</identifier><identifier>EISSN: 1936-6450</identifier><identifier>DOI: 10.1007/s12083-020-01062-6</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Algorithms ; Communications Engineering ; Computer Communication Networks ; Computer Science ; Computer Science, Information Systems ; Cryptography ; Engineering ; Information Systems and Communication Service ; Networks ; Parameter sensitivity ; Science & Technology ; Sensors ; Signal,Image and Speech Processing ; Stability ; Technology ; Telecommunications ; Topology ; Wireless communications ; Wireless sensor networks</subject><ispartof>Peer-to-peer networking and applications, 2021-05, Vol.14 (3), p.1071-1087</ispartof><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC part of Springer Nature 2021</rights><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC part of Springer Nature 2021.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>true</woscitedreferencessubscribed><woscitedreferencescount>0</woscitedreferencescount><woscitedreferencesoriginalsourcerecordid>wos000615113600001</woscitedreferencesoriginalsourcerecordid><cites>FETCH-LOGICAL-c270t-72b6a9e19e538e820cffc364a1193ecd501157431f07f3bac801782ba12f67343</cites><orcidid>0000-0002-1156-6742</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s12083-020-01062-6$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s12083-020-01062-6$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>315,781,785,27929,27930,39263,41493,42562,51324</link.rule.ids></links><search><creatorcontrib>Hu, Haoran</creatorcontrib><creatorcontrib>Chang, Wei</creatorcontrib><title>Non-cryptography countermeasure against controllable event triggering attack in WSNs</title><title>Peer-to-peer networking and applications</title><addtitle>Peer-to-Peer Netw. Appl</addtitle><addtitle>PEER PEER NETW APPL</addtitle><description>Compressive sensing-based data collecting is a promising technique, which can significantly reduce the communication costs in wireless sensor networks (WSNs). However, a recent study shows that it is vulnerable to controllable event triggering attack (CETA): after compromising a sensor and carefully manipulating the environmental elements around a target in the subtree rooted at the sensor, an attacker is able to infer sensitive parameters of the target. The existing countermeasure is purely based on cryptography and requires central control. In this paper, we propose a lightweight non-cryptography-based approach by termly modifying the structure of the data gathering tree. However, how to efficiently and effectively construct the tree is an open problem. To solve the problem, we create a novel topology-based coding scheme and a set of distributed algorithms to mitigate the CETA attack. By adopting this approach, the time for successfully launching a CETA attack is significantly increased. Extensive simulations and experiments show that our solution can efficiently and securely build different data gathering trees for consecutive sensing tasks.</description><subject>Algorithms</subject><subject>Communications Engineering</subject><subject>Computer Communication Networks</subject><subject>Computer Science</subject><subject>Computer Science, Information Systems</subject><subject>Cryptography</subject><subject>Engineering</subject><subject>Information Systems and Communication Service</subject><subject>Networks</subject><subject>Parameter sensitivity</subject><subject>Science & Technology</subject><subject>Sensors</subject><subject>Signal,Image and Speech Processing</subject><subject>Stability</subject><subject>Technology</subject><subject>Telecommunications</subject><subject>Topology</subject><subject>Wireless communications</subject><subject>Wireless sensor networks</subject><issn>1936-6442</issn><issn>1936-6450</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><sourceid>HGBXW</sourceid><sourceid>8G5</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><sourceid>GUQSH</sourceid><sourceid>M2O</sourceid><recordid>eNqNkMtOwzAQRSMEEqXwA6wisUSBGTtx0iWqeEkVLChiaTlmElJaO9guqH-PSxDsECuPrHvmcZLkGOEMAcpzjwwqngGDDBAEy8ROMsIJF5nIC9j9qXO2nxx4vwAQyAs2SuZ31mTabfpgW6f6l02q7doEcitSfu0oVa3qjA_x2wRnl0tVLymldzIhDa5rW3KdaVMVgtKvaWfSp4c7f5jsNWrp6ej7HSePV5fz6U02u7--nV7MMs1KCFnJaqEmhBMqeEUVA900motcYdyW9HMBiEWZc2ygbHitdAVYVqxWyBpR8pyPk5Ohb-_s25p8kAu7diaOlKxAxqsKYRJTbEhpZ7131MjedSvlNhJBbu3JwZ6M9uSXPSkidDpAH1TbxuuOjKYfELb-CkQuYgUY09X_09MuqNBZM92KjigfUN9vTZL7veGP9T4B5YaTFQ</recordid><startdate>20210501</startdate><enddate>20210501</enddate><creator>Hu, Haoran</creator><creator>Chang, Wei</creator><general>Springer US</general><general>Springer Nature</general><general>Springer Nature B.V</general><scope>BLEPL</scope><scope>DTL</scope><scope>HGBXW</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7XB</scope><scope>88I</scope><scope>8AL</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8G5</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0N</scope><scope>M2O</scope><scope>M2P</scope><scope>MBDVC</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope><orcidid>https://orcid.org/0000-0002-1156-6742</orcidid></search><sort><creationdate>20210501</creationdate><title>Non-cryptography countermeasure against controllable event triggering attack in WSNs</title><author>Hu, Haoran ; Chang, Wei</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c270t-72b6a9e19e538e820cffc364a1193ecd501157431f07f3bac801782ba12f67343</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Algorithms</topic><topic>Communications Engineering</topic><topic>Computer Communication Networks</topic><topic>Computer Science</topic><topic>Computer Science, Information Systems</topic><topic>Cryptography</topic><topic>Engineering</topic><topic>Information Systems and Communication Service</topic><topic>Networks</topic><topic>Parameter sensitivity</topic><topic>Science & Technology</topic><topic>Sensors</topic><topic>Signal,Image and Speech Processing</topic><topic>Stability</topic><topic>Technology</topic><topic>Telecommunications</topic><topic>Topology</topic><topic>Wireless communications</topic><topic>Wireless sensor networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Hu, Haoran</creatorcontrib><creatorcontrib>Chang, Wei</creatorcontrib><collection>Web of Science Core Collection</collection><collection>Science Citation Index Expanded</collection><collection>Web of Science - Science Citation Index Expanded - 2021</collection><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Science Database (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>Research Library (Alumni Edition)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Computing Database</collection><collection>Research Library</collection><collection>Science Database</collection><collection>Research Library (Corporate)</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>Peer-to-peer networking and applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Hu, Haoran</au><au>Chang, Wei</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Non-cryptography countermeasure against controllable event triggering attack in WSNs</atitle><jtitle>Peer-to-peer networking and applications</jtitle><stitle>Peer-to-Peer Netw. Appl</stitle><stitle>PEER PEER NETW APPL</stitle><date>2021-05-01</date><risdate>2021</risdate><volume>14</volume><issue>3</issue><spage>1071</spage><epage>1087</epage><pages>1071-1087</pages><issn>1936-6442</issn><eissn>1936-6450</eissn><abstract>Compressive sensing-based data collecting is a promising technique, which can significantly reduce the communication costs in wireless sensor networks (WSNs). However, a recent study shows that it is vulnerable to controllable event triggering attack (CETA): after compromising a sensor and carefully manipulating the environmental elements around a target in the subtree rooted at the sensor, an attacker is able to infer sensitive parameters of the target. The existing countermeasure is purely based on cryptography and requires central control. In this paper, we propose a lightweight non-cryptography-based approach by termly modifying the structure of the data gathering tree. However, how to efficiently and effectively construct the tree is an open problem. To solve the problem, we create a novel topology-based coding scheme and a set of distributed algorithms to mitigate the CETA attack. By adopting this approach, the time for successfully launching a CETA attack is significantly increased. Extensive simulations and experiments show that our solution can efficiently and securely build different data gathering trees for consecutive sensing tasks.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s12083-020-01062-6</doi><tpages>17</tpages><orcidid>https://orcid.org/0000-0002-1156-6742</orcidid></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1936-6442 |
ispartof | Peer-to-peer networking and applications, 2021-05, Vol.14 (3), p.1071-1087 |
issn | 1936-6442 1936-6450 |
language | eng |
recordid | cdi_webofscience_primary_000615113600001 |
source | Springer Nature - Complete Springer Journals; Web of Science - Science Citation Index Expanded - 2021<img src="https://exlibris-pub.s3.amazonaws.com/fromwos-v2.jpg" /> |
subjects | Algorithms Communications Engineering Computer Communication Networks Computer Science Computer Science, Information Systems Cryptography Engineering Information Systems and Communication Service Networks Parameter sensitivity Science & Technology Sensors Signal,Image and Speech Processing Stability Technology Telecommunications Topology Wireless communications Wireless sensor networks |
title | Non-cryptography countermeasure against controllable event triggering attack in WSNs |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-16T11%3A06%3A32IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_webof&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Non-cryptography%20countermeasure%20against%20controllable%20event%20triggering%20attack%20in%20WSNs&rft.jtitle=Peer-to-peer%20networking%20and%20applications&rft.au=Hu,%20Haoran&rft.date=2021-05-01&rft.volume=14&rft.issue=3&rft.spage=1071&rft.epage=1087&rft.pages=1071-1087&rft.issn=1936-6442&rft.eissn=1936-6450&rft_id=info:doi/10.1007/s12083-020-01062-6&rft_dat=%3Cproquest_webof%3E2512388109%3C/proquest_webof%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2512388109&rft_id=info:pmid/&rfr_iscdi=true |