TY - JOUR
T1 - Improving sensor network immunity under worm attacks
T2 - A software diversity approach
AU - Yang, Yi
AU - Zhu, Sencun
AU - Cao, Guohong
N1 - Publisher Copyright:
© 2016 Elsevier B.V. All rights reserved.
PY - 2016/9/1
Y1 - 2016/9/1
N2 - Because of cost and resource constraints, sensor nodes do not have a complicated hardware architecture or operating system to protect program safety. Hence, the notorious buffer-overflow vulnerability that has caused numerous Internet worm attacks could also be exploited to attack sensor networks. We call the malicious code that exploits a buffer-overflow vulnerability in a sensor program sensor worm. Clearly, sensor worm will be a serious threat when an attacker could simply send a single packet to compromise the entire sensor network. Despite its importance, so far little work has focused on sensor worms. In this work, we first illustrate the feasibility of launching sensor worms through trial experiments on Mica2 motes. Inspired by the survivability through heterogeneity philosophy, we then explore the technique of software diversity to combat sensor worms. Given a limited number of software versions, we design an efficient algorithm to assign the appropriate version of software to each sensor, so that sensor worms are restrained from propagation. We also examine the impact of sensor node deployment errors on worm propagation, which directs the selection of our system parameters based on percolation theory. We then extend the above scheme by considering enhanced sensors that can load multiple program versions. We show that the existence of enhanced sensors could further improve the immunity and robustness of sensor networks under worm attacks. Finally, extensive analytical and simulation results confirm the effectiveness of our schemes in various settings.
AB - Because of cost and resource constraints, sensor nodes do not have a complicated hardware architecture or operating system to protect program safety. Hence, the notorious buffer-overflow vulnerability that has caused numerous Internet worm attacks could also be exploited to attack sensor networks. We call the malicious code that exploits a buffer-overflow vulnerability in a sensor program sensor worm. Clearly, sensor worm will be a serious threat when an attacker could simply send a single packet to compromise the entire sensor network. Despite its importance, so far little work has focused on sensor worms. In this work, we first illustrate the feasibility of launching sensor worms through trial experiments on Mica2 motes. Inspired by the survivability through heterogeneity philosophy, we then explore the technique of software diversity to combat sensor worms. Given a limited number of software versions, we design an efficient algorithm to assign the appropriate version of software to each sensor, so that sensor worms are restrained from propagation. We also examine the impact of sensor node deployment errors on worm propagation, which directs the selection of our system parameters based on percolation theory. We then extend the above scheme by considering enhanced sensors that can load multiple program versions. We show that the existence of enhanced sensors could further improve the immunity and robustness of sensor networks under worm attacks. Finally, extensive analytical and simulation results confirm the effectiveness of our schemes in various settings.
UR - http://www.scopus.com/inward/record.url?scp=84975263106&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84975263106&partnerID=8YFLogxK
U2 - 10.1016/j.adhoc.2016.04.011
DO - 10.1016/j.adhoc.2016.04.011
M3 - Article
AN - SCOPUS:84975263106
SN - 1570-8705
VL - 47
SP - 26
EP - 40
JO - Ad Hoc Networks
JF - Ad Hoc Networks
ER -