Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Data Model Framework for Intruder Information Sharing in Sensor Networks


Affiliations
1 Sri Indu College of Engineering and Technology, India
     

   Subscribe/Renew Journal


In sensor networks, an intruder (i.e., compromised node) identified and isolated in one place can be relocated and/or duplicated to other places to continue attacks; hence, detection and isolation of the same intruder or its clones may have to be conducted repeatedly, wasting scarce network resources. Therefore, once an intruder is identified, it should be known to all innocent nodes such that the intruder or its clones can be recognized when appearing elsewhere. However, secure, efficient and scalable sharing of intruder information remains a challenging and unsolved problem. To address this problem, we propose a three-tier framework, consisting of a verifiable intruder reporting (VIR) scheme, a quorum based caching (QBC) scheme  for efficiently propagating intruder reports to the whole network, and a collaborative Bloom Filter (CBF) scheme for handling intruder information locally. Extensive analysis and evaluations are also conducted to verify the efficiency and scalability of the proposed framework.

Keywords

Network Security, Routing Alogrithms Intruder Information Caches, Dedicated Membership Servers, IP Spoofing.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 286

PDF Views: 4




  • Data Model Framework for Intruder Information Sharing in Sensor Networks

Abstract Views: 286  |  PDF Views: 4

Authors

K. Venkatesh Sharma
Sri Indu College of Engineering and Technology, India
K. Hanumantha Rao
Sri Indu College of Engineering and Technology, India
Vannoj Ravi Kumar
Sri Indu College of Engineering and Technology, India

Abstract


In sensor networks, an intruder (i.e., compromised node) identified and isolated in one place can be relocated and/or duplicated to other places to continue attacks; hence, detection and isolation of the same intruder or its clones may have to be conducted repeatedly, wasting scarce network resources. Therefore, once an intruder is identified, it should be known to all innocent nodes such that the intruder or its clones can be recognized when appearing elsewhere. However, secure, efficient and scalable sharing of intruder information remains a challenging and unsolved problem. To address this problem, we propose a three-tier framework, consisting of a verifiable intruder reporting (VIR) scheme, a quorum based caching (QBC) scheme  for efficiently propagating intruder reports to the whole network, and a collaborative Bloom Filter (CBF) scheme for handling intruder information locally. Extensive analysis and evaluations are also conducted to verify the efficiency and scalability of the proposed framework.

Keywords


Network Security, Routing Alogrithms Intruder Information Caches, Dedicated Membership Servers, IP Spoofing.