Skip to main content

SWORDS: Improving Sensor Networks Immunity under Worm Attacks

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 6184))

Abstract

Since sensor nodes are implemented in embedded computer systems, which do not have complicated hardware architecture and operating system. Therefore, worm attacks, which exploit buffer-overflow vulnerabilities, could compromise the entire sensor network by sending a single mal-packet. To address the severe problem, the technique of software diversity has been leveraged to defend against sensor worms. In this paper, we encompass random sensor node scheduling and software diversity to propose a novel sensor worm defense scheme. Our scheme can effectively improve the sensor network defensive capability. Then some practical considerations for its real application is proposed. Finally, analytical and simulation results confirm the effectiveness of our scheme in sensor worm defense.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Yang, Y., Zhu, S., Cao, G.: Improving sensor network immunity under worm attacks: a software diversity approach. In: MobiHoc, pp. 149–158 (2008)

    Google Scholar 

  2. Gu, Q., Noorani, R.: Towards self-propagate mal-packets in sensor networks. In: WISEC, pp. 172–182 (2008)

    Google Scholar 

  3. Liu, C., Wu, K., Xiao, Y., Sun, B.: Random coverage with guaranteed connectivity: Joint scheduling for wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 17(6), 562–575 (2006)

    Article  Google Scholar 

  4. De, P., Liu, Y., Das, S.K.: Modeling node compromise spread in wireless sensor networks using epidemic theory. In: WOWMOM, pp. 237–243 (2006)

    Google Scholar 

  5. Kumar, R., Kohler, E., Srivastava, M.B.: Harbor: software-based memory protection for sensor nodes. In: IPSN, pp. 340–349 (2007)

    Google Scholar 

  6. Alarifi, A., Du, W.: Diversify sensor nodes to improve resilience against node compromise. In: SASN, pp. 101–112 (2006)

    Google Scholar 

  7. Chen, B., Jamieson, K., Balakrishnan, H., Morris, R.: Span: An energy-efficient coordination algorithm for topology maintenance in ad hoc wireless networks. In: MOBICOM, pp. 85–96 (2001)

    Google Scholar 

  8. Cerpa, A., Estrin, D.: Ascent: Adaptive self-configuring sensor networks topologies. In: INFOCOM (2002)

    Google Scholar 

  9. Schurgers, C., Tsiatsis, V., Ganeriwal, S., Srivastava, M.B.: Topology management for sensor networks: exploiting latency and density. In: MobiHoc, pp. 135–145 (2002)

    Google Scholar 

  10. Zhang, H., Hou, J.C.: Maintaining sensing coverage and connectivity in large sensor networks. Ad Hoc & Sensor Wireless Networks 1(1-2) (2005)

    Google Scholar 

  11. Tian, D., Georganas, N.D.: Connectivity maintenance and coverage preservation in wireless sensor networks. Ad Hoc Networks 3(6), 744–761 (2005)

    Article  Google Scholar 

  12. Forrest, S., Somayaji, A., Ackley, D.H.: Building diverse computer systems. In: Workshop on Hot Topics in Operating Systems, pp. 67–72 (1997)

    Google Scholar 

  13. O’Donnell, A.J., Sethu, H.: On achieving software diversity for improved network security using distributed coloring algorithms. In: ACM Conference on Computer and Communications Security, pp. 121–131 (2004)

    Google Scholar 

  14. Kc, G.S., Keromytis, A.D., Prevelakis, V.: Countering code-injection attacks with instruction-set randomization. In: ACM Conference on Computer and Communications Security, pp. 272–280 (2003)

    Google Scholar 

  15. Zhou, L., Zhang, L., McSherry, F., Immorlica, N., Costa, M., Chien, S.: A first look at peer-to-peer worms: Threats and defenses. In: Castro, M., van Renesse, R. (eds.) IPTPS 2005. LNCS, vol. 3640, pp. 24–35. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  16. Younis, M.F., Akkaya, K.: Strategies and techniques for node placement in wireless sensor networks: A survey. Ad Hoc Networks 6(4), 621–655 (2008)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Gui, N., Zhai, E., Hu, J., Chen, Z. (2010). SWORDS: Improving Sensor Networks Immunity under Worm Attacks. In: Chen, L., Tang, C., Yang, J., Gao, Y. (eds) Web-Age Information Management. WAIM 2010. Lecture Notes in Computer Science, vol 6184. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14246-8_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-14246-8_11

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-14245-1

  • Online ISBN: 978-3-642-14246-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics