TY - GEN
T1 - Improving robustness of a popular probabilistic clustering algorithm against insider attacks
AU - Sayed, Sayed M.
AU - La Porta, Tom
AU - Silvestri, Simone
AU - McDaniel, Patrick
N1 - Publisher Copyright:
© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2020.
PY - 2020
Y1 - 2020
N2 - Many clustering algorithms for mesh, ad hoc and Wireless Sensor Networks have been proposed. Probabilistic approaches are a popular class of such algorithms. However, it is essential to analyze their robustness against security compromise. We study the robustness of EEHCA, a popular energy efficient clustering algorithm as an example of probabilistic class in terms of security compromise. In this paper, we investigate attacks on EEHCA through analysis and experimental simulations. We analytically characterize two different attack models. In the first attack model, the attacker aims to gain control over the network by stealing network traffic, or by disrupting the data aggregation process (integrity attack). In the second attack model, the inducement of the attacker is to abridge the network lifetime (denial of service attack). We assume the clustering algorithm is running periodically and propose a detection solution by exploiting Bernoulli CUSUM charts.
AB - Many clustering algorithms for mesh, ad hoc and Wireless Sensor Networks have been proposed. Probabilistic approaches are a popular class of such algorithms. However, it is essential to analyze their robustness against security compromise. We study the robustness of EEHCA, a popular energy efficient clustering algorithm as an example of probabilistic class in terms of security compromise. In this paper, we investigate attacks on EEHCA through analysis and experimental simulations. We analytically characterize two different attack models. In the first attack model, the attacker aims to gain control over the network by stealing network traffic, or by disrupting the data aggregation process (integrity attack). In the second attack model, the inducement of the attacker is to abridge the network lifetime (denial of service attack). We assume the clustering algorithm is running periodically and propose a detection solution by exploiting Bernoulli CUSUM charts.
UR - http://www.scopus.com/inward/record.url?scp=85098248099&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85098248099&partnerID=8YFLogxK
U2 - 10.1007/978-3-030-63086-7_21
DO - 10.1007/978-3-030-63086-7_21
M3 - Conference contribution
AN - SCOPUS:85098248099
SN - 9783030630850
T3 - Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
SP - 381
EP - 401
BT - Security and Privacy in Communication Networks - 16th EAI International Conference, SecureComm 2020, Proceedings
A2 - Park, Noseong
A2 - Sun, Kun
A2 - Foresti, Sara
A2 - Butler, Kevin
A2 - Saxena, Nitesh
PB - Springer Science and Business Media Deutschland GmbH
T2 - 16th International Conference on Security and Privacy in Communication Networks, SecureComm 2020
Y2 - 21 October 2020 through 23 October 2020
ER -