Abstract
Since sensor nodes are implemented in embedded computer systems, which do not have complicated hardware architecture and operating system. Therefore, worm attacks, which exploit buffer-overflow vulnerabilities, could compromise the entire sensor network by sending a single mal-packet. To address the severe problem, the technique of software diversity has been leveraged to defend against sensor worms. In this paper, we encompass random sensor node scheduling and software diversity to propose a novel sensor worm defense scheme. Our scheme can effectively improve the sensor network defensive capability. Then some practical considerations for its real application is proposed. Finally, analytical and simulation results confirm the effectiveness of our scheme in sensor worm defense.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Yang, Y., Zhu, S., Cao, G.: Improving sensor network immunity under worm attacks: a software diversity approach. In: MobiHoc, pp. 149–158 (2008)
Gu, Q., Noorani, R.: Towards self-propagate mal-packets in sensor networks. In: WISEC, pp. 172–182 (2008)
Liu, C., Wu, K., Xiao, Y., Sun, B.: Random coverage with guaranteed connectivity: Joint scheduling for wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 17(6), 562–575 (2006)
De, P., Liu, Y., Das, S.K.: Modeling node compromise spread in wireless sensor networks using epidemic theory. In: WOWMOM, pp. 237–243 (2006)
Kumar, R., Kohler, E., Srivastava, M.B.: Harbor: software-based memory protection for sensor nodes. In: IPSN, pp. 340–349 (2007)
Alarifi, A., Du, W.: Diversify sensor nodes to improve resilience against node compromise. In: SASN, pp. 101–112 (2006)
Chen, B., Jamieson, K., Balakrishnan, H., Morris, R.: Span: An energy-efficient coordination algorithm for topology maintenance in ad hoc wireless networks. In: MOBICOM, pp. 85–96 (2001)
Cerpa, A., Estrin, D.: Ascent: Adaptive self-configuring sensor networks topologies. In: INFOCOM (2002)
Schurgers, C., Tsiatsis, V., Ganeriwal, S., Srivastava, M.B.: Topology management for sensor networks: exploiting latency and density. In: MobiHoc, pp. 135–145 (2002)
Zhang, H., Hou, J.C.: Maintaining sensing coverage and connectivity in large sensor networks. Ad Hoc & Sensor Wireless Networks 1(1-2) (2005)
Tian, D., Georganas, N.D.: Connectivity maintenance and coverage preservation in wireless sensor networks. Ad Hoc Networks 3(6), 744–761 (2005)
Forrest, S., Somayaji, A., Ackley, D.H.: Building diverse computer systems. In: Workshop on Hot Topics in Operating Systems, pp. 67–72 (1997)
O’Donnell, A.J., Sethu, H.: On achieving software diversity for improved network security using distributed coloring algorithms. In: ACM Conference on Computer and Communications Security, pp. 121–131 (2004)
Kc, G.S., Keromytis, A.D., Prevelakis, V.: Countering code-injection attacks with instruction-set randomization. In: ACM Conference on Computer and Communications Security, pp. 272–280 (2003)
Zhou, L., Zhang, L., McSherry, F., Immorlica, N., Costa, M., Chien, S.: A first look at peer-to-peer worms: Threats and defenses. In: Castro, M., van Renesse, R. (eds.) IPTPS 2005. LNCS, vol. 3640, pp. 24–35. Springer, Heidelberg (2005)
Younis, M.F., Akkaya, K.: Strategies and techniques for node placement in wireless sensor networks: A survey. Ad Hoc Networks 6(4), 621–655 (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Gui, N., Zhai, E., Hu, J., Chen, Z. (2010). SWORDS: Improving Sensor Networks Immunity under Worm Attacks. In: Chen, L., Tang, C., Yang, J., Gao, Y. (eds) Web-Age Information Management. WAIM 2010. Lecture Notes in Computer Science, vol 6184. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14246-8_11
Download citation
DOI: https://doi.org/10.1007/978-3-642-14246-8_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-14245-1
Online ISBN: 978-3-642-14246-8
eBook Packages: Computer ScienceComputer Science (R0)