Stealthy Attacks and Defense Strategies in Competing Sensor Networks

Stealthy Attacks and Defense Strategies in Competing Sensor Networks
Author :
Publisher :
Total Pages :
Release :
ISBN-10 : OCLC:609701850
ISBN-13 :
Rating : 4/5 ( Downloads)

Book Synopsis Stealthy Attacks and Defense Strategies in Competing Sensor Networks by : Aleksandra Czarlinska

Download or read book Stealthy Attacks and Defense Strategies in Competing Sensor Networks written by Aleksandra Czarlinska and published by . This book was released on 2010 with total page pages. Available in PDF, EPUB and Kindle. Book excerpt: The fundamental objective of sensor networks underpinning a variety of applications is the collection of reliable information from the surrounding environment. The correctness of the collected data is especially important in applications involving societal welfare and safety, in which the acquired information may be utilized by end-users for decision-making. The distributed nature of sensor networks and their deployment in unattended and potentially hostile environments, however, renders this collection task challenging for both scalar and visual data. In this work we propose and address the twin problem of carrying out and defending against a stealthy attack on the information gathered by a sensor network at the physical sensing layer as perpetrated by a competing hostile network. A stealthy attack in this context is an intelligent attempt to disinform a sensor network in a manner that mitigates attack discovery. In comparison with previous sensor network security studies, we explicitly model the attack scenario as an active competition between two networks where difficulties arise from the pervasive nature of the attack, the possibility of tampering during data acquisition prior to encryption, and the lack of prior knowledge regarding the characteristics of the attack. We examine the problem from the perspective of both the hostile and the legitimate network. The interaction between the networks is modeled as a game where a stealth utility is derived and shown to be consistent for both players in the case of stealthy direct attacks and stealthy cross attacks. Based on the stealth utility, the optimal attack and defense strategies are obtained for each network. For the legitimate network, minimization of the attacker's stealth results in the possibility of attack detection through established paradigms and the ability to mitigate the power of the attack. For the hostile network, maximization of the stealth utility translates into the optimal attack avoidance. This attack avoidance does not require active communication among the hostile nodes but rather relies on a level of coordination which we quantify. We demonstrate the significance and effectiveness of the solution for sensor networks acquiring scalar and multidimensional data such as surveillance sequences and relate the results to existing image sensor networks. Finally we discuss the implications of these results for achieving secure event acquisition in unattended environments.


Stealthy Attacks and Defense Strategies in Competing Sensor Networks Related Books

Stealthy Attacks and Defense Strategies in Competing Sensor Networks
Language: en
Pages:
Authors: Aleksandra Czarlinska
Categories:
Type: BOOK - Published: 2010 - Publisher:

DOWNLOAD EBOOK

The fundamental objective of sensor networks underpinning a variety of applications is the collection of reliable information from the surrounding environment.
Stealthy Sensor Attacks on Feedback Systems
Language: en
Pages:
Authors: David Umsonst
Categories:
Type: BOOK - Published: 2021 - Publisher:

DOWNLOAD EBOOK

Deep Learning Strategies for Security Enhancement in Wireless Sensor Networks
Language: en
Pages: 405
Authors: Sagayam, K. Martin
Categories: Computers
Type: BOOK - Published: 2020-06-12 - Publisher: IGI Global

DOWNLOAD EBOOK

Wireless sensor networks have gained significant attention industrially and academically due to their wide range of uses in various fields. Because of their vas
Baiting for Defense Against Stealthy Attacks on Cyber-physical Systems
Language: en
Pages: 64
Authors: David B. Flamholz
Categories:
Type: BOOK - Published: 2019 - Publisher:

DOWNLOAD EBOOK

The goal of this thesis is to develop a defense methodology for a cyber-physical system (CPS) by which an attempted stealthy cyber-attack is detected in near re
Information Fusion in Distributed Sensor Networks with Byzantines
Language: en
Pages: 109
Authors: Andrea Abrardo
Categories: Technology & Engineering
Type: BOOK - Published: 2021-08-26 - Publisher: Springer

DOWNLOAD EBOOK

This book reviews the most powerful attack strategies and potential defense mechanisms, always approaching the interplay between the Fusion Center and the Byzan