Probably wireless

Sep 03, 2008

Wireless Sensor Networks (WSNs) used to detect and report events including hurricanes, earthquakes, and forest fires and for military surveillance and antiterrorist activities are prone to subterfuge. In the International Journal of Security and Networks, computer scientists at Florida Atlantic University describe a new antihacking system to protect WSNs.

Feng Li, Avinash Srinivasan, and Jie Wu explain that there are two types of cyber-sabotage that might occur on a WSN. The first is the fabricated report with false votes attack in which phony data is sent to the base station with forged validation. This presents the authorities monitoring a WSN for impending disaster with a quandary: if the data arriving from the network is validated but false, how can they know for sure?

The second kind of attack adds false validation votes to genuine incoming data. The problem facing those monitoring the WSN now is if genuine data is being labeled as false, how to trust any data arriving from the WSN.

Li and colleagues point out that most existing WSN systems have built-in software on the network that can ward off the first kind of attack so that false data usually cannot be given valid credentials and those monitoring the system will be able to spot subterfuge easily. However, WSNs are not usually protected against the second kind of attack, so that a genuine impending disaster cannot be verified remotely, which defeats the purpose of a WSN.

The team has now devised a Probabilistic Voting-based Filtering Scheme (PVFS) to deal with both of these attacks simultaneously. They used a general en-route filtering scheme that can achieve strong protection against hackers while maintaining normal filtering to make the WSN viable.

The scheme breaks WSNs into clusters, and locks each cluster to a particular data encryption key. As data reaches headquarters from the WSN clusters, the main cluster-heads along the path checks the report together with the votes, acting as the verification nodes in PVFS. The verification node is set up so that it will not drop a report immediately it finds a false vote, instead it will simply record the result. Only when the number of verified false votes reaches a designed threshold will a report be dropped.

This way, should a saboteur compromise one or more sensors on any given WSN to launch an attack, the PVFS will apply probability rules to determine the likelihood that this has happened. It will do so based on data arriving from other sensors in different clusters before reporting incoming data as false.

Detecting compromised sensors in a WSN in this way is of vital important to homeland security as well as successfully tracking natural events with the potential to devastate cities. By countering sabotage, false alarms that waste response efforts could be minimized in times of impending crisis.

Source: Inderscience Publishers

Explore further: Twitter chatter predicts health insurance marketplace enrollment, study shows

add to favorites email to friend print save as pdf

Related Stories

US spymaster warns over low-level cyber attacks

3 hours ago

A steady stream of low-level cyber attacks poses the most likely danger to the United States rather than a potential digital "armageddon," US intelligence director James Clapper said on Thursday.

Australian laws on storing phone, Internet records to change

4 hours ago

(AP)—A parliamentary committee on Friday recommended a major rewrite of draft laws that would force Australian telcos and Internet providers to store customers' personal data for the convenience of law enforcement agencies. ...

Stars found forming at Milky Way's outer edge

4 hours ago

Brazilian astronomers said Friday they had found two star clusters forming in a remote part of our Milky Way galaxy where such a thing was previously thought impossible.

China bans ivory carving imports for one year

4 hours ago

Beijing has imposed a one-year ban on the import of ivory carvings, amid international criticism that rapidly-growing Chinese demand could push wild African elephants to extinction within a generation.

Recommended for you

Facebook artificial intelligence team serves up 20 tasks

16 hours ago

In August last year, Daniela Hernandez wrote in Wired about Yann LeCun, director of AI Research at Facebook. His interests include machine learning, audio, video, image, and text understanding, optimization, computer architecture and software for AI. ...

User comments : 0

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.