2016
DOI: 10.1016/j.adhoc.2016.04.011
|View full text |Cite
|
Sign up to set email alerts
|

Improving sensor network immunity under worm attacks: A software diversity approach

Abstract: Because of cost and resource constraints, sensor nodes do not have a complicated hardware architecture or operating system to protect program safety. Hence, the notorious buffer-overflow vulnerability that has caused numerous Internet worm attacks could also be exploited to attack sensor networks. We call the malicious code that exploits a buffer-overflow vulnerability in a sensor program sensor worm. Clearly, sensor worm will be a serious threat, if not the most dangerous one, when an attacker could simply se… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
32
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 27 publications
(32 citation statements)
references
References 16 publications
0
32
0
Order By: Relevance
“…Its solutions is a natural option in modelling a wide range of real-life problem for making globally optional decision [14] [4]. In most cases, however, the basic graph coloring problem fails to model some real-life problems where additional constraints have to be satisfied.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Its solutions is a natural option in modelling a wide range of real-life problem for making globally optional decision [14] [4]. In most cases, however, the basic graph coloring problem fails to model some real-life problems where additional constraints have to be satisfied.…”
Section: Related Workmentioning
confidence: 99%
“…Data randomization [10] is another randomized-based approach, which applies masks on data in the memory, so that the attacker cannot determine memory regions that are associated with particular objects. Diversity at the network level is achieved by using different applications [4] [5], operating systems, and shuffling techniques within a networked system [11]. N-version programming was introduced in the 1970s which depends on functionally equivalent versions of the same program and monitors the behavior of the variants in order to detect divergence of the results [12].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…To defend against the sensor worm attacks, several schemes are proposed to prevent worm propagation in sensor networks [1][2][3]12]. Yang et al [3] first applied a software diversity technique to prevent worm propagation in sensor networks.…”
Section: Related Workmentioning
confidence: 99%
“…To meet this goal, several schemes have been developed for worm defense in the sensor network [1][2][3]. The key idea of these schemes prevents worm propagation by enforcing two adjacent nodes to have distinct software versions, leading to worm dissemination failure between two adjacent nodes.…”
Section: Introductionmentioning
confidence: 99%