Research Article
Deception Framework for Sensor Networks
@INPROCEEDINGS{10.1109/SECCOM.2007.4550355, author={Ruiyi Zhang and Johnson Thomas and Venkata Manoj Mulpuru}, title={Deception Framework for Sensor Networks}, proceedings={3rd International ICST Conference on Security and Privacy in Communication Networks}, publisher={IEEE}, proceedings_a={SECURECOMM}, year={2008}, month={6}, keywords={Component; sensor networks deception}, doi={10.1109/SECCOM.2007.4550355} }
- Ruiyi Zhang
Johnson Thomas
Venkata Manoj Mulpuru
Year: 2008
Deception Framework for Sensor Networks
SECURECOMM
IEEE
DOI: 10.1109/SECCOM.2007.4550355
Abstract
Although a lot of work has been done in proposing secure mechanisms for sensor networks, very little work has been reported on how to respond to attacks that have infiltrated the network. In this paper we suggest a response framework to attacks that have been detected. We look at one particular response in detail, namely deception. Two modes for deception are proposed and the deception is executed by nodes that the neighboring to the attacker. We simulate a denial of service attack and simulation results show that under deception most of the useful traffic is delivered to the base station. Results also show that when compared to the overhead traffic when the network is under attack, the amount of deception trafficking is minimal.