Improving robustness of a popular probabilistic clustering algorithm against insider attacks

Sayed M. Sayed, Tom La Porta, Simone Silvestri, Patrick McDaniel

Producción científica: Conference contributionrevisión exhaustiva

Resumen

Many clustering algorithms for mesh, ad hoc and Wireless Sensor Networks have been proposed. Probabilistic approaches are a popular class of such algorithms. However, it is essential to analyze their robustness against security compromise. We study the robustness of EEHCA, a popular energy efficient clustering algorithm as an example of probabilistic class in terms of security compromise. In this paper, we investigate attacks on EEHCA through analysis and experimental simulations. We analytically characterize two different attack models. In the first attack model, the attacker aims to gain control over the network by stealing network traffic, or by disrupting the data aggregation process (integrity attack). In the second attack model, the inducement of the attacker is to abridge the network lifetime (denial of service attack). We assume the clustering algorithm is running periodically and propose a detection solution by exploiting Bernoulli CUSUM charts.

Idioma originalEnglish
Título de la publicación alojadaSecurity and Privacy in Communication Networks - 16th EAI International Conference, SecureComm 2020, Proceedings
EditoresNoseong Park, Kun Sun, Sara Foresti, Kevin Butler, Nitesh Saxena
Páginas381-401
Número de páginas21
DOI
EstadoPublished - 2020
Evento16th International Conference on Security and Privacy in Communication Networks, SecureComm 2020 - Washington, United States
Duración: oct 21 2020oct 23 2020

Serie de la publicación

NombreLecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
Volumen335
ISSN (versión impresa)1867-8211

Conference

Conference16th International Conference on Security and Privacy in Communication Networks, SecureComm 2020
País/TerritorioUnited States
CiudadWashington
Período10/21/2010/23/20

Nota bibliográfica

Publisher Copyright:
© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2020.

Financiación

Acknowledgments. Research was sponsored by the Army Research Laboratory and was accomplished under Cooperative Agreement Number W911NF-13-2-0045 (ARL Cyber Security CRA). The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the Army Research Laboratory or the U.S. Government. The U.S. Government is authorized to reproduce and distribute reprints for Government purposes notwithstanding any copyright notation herein.

FinanciadoresNúmero del financiador
Army Research LaboratoryW911NF-13-2-0045
Army Research Laboratory

    ASJC Scopus subject areas

    • Computer Networks and Communications

    Huella

    Profundice en los temas de investigación de 'Improving robustness of a popular probabilistic clustering algorithm against insider attacks'. En conjunto forman una huella única.

    Citar esto