3rd International ICST Conference on Security and Privacy in Communication Networks

Research Article

Deception Framework for Sensor Networks

  • @INPROCEEDINGS{10.1109/SECCOM.2007.4550355,
        author={Ruiyi Zhang and Johnson Thomas and Venkata Manoj Mulpuru},
        title={Deception Framework for Sensor Networks},
        proceedings={3rd International ICST Conference on Security and Privacy in Communication Networks},
        publisher={IEEE},
        proceedings_a={SECURECOMM},
        year={2008},
        month={6},
        keywords={Component; sensor networks deception},
        doi={10.1109/SECCOM.2007.4550355}
    }
    
  • Ruiyi Zhang
    Johnson Thomas
    Venkata Manoj Mulpuru
    Year: 2008
    Deception Framework for Sensor Networks
    SECURECOMM
    IEEE
    DOI: 10.1109/SECCOM.2007.4550355
Ruiyi Zhang1, Johnson Thomas1, Venkata Manoj Mulpuru1
  • 1: Department of Computer Science Oklahoma State University USA

Abstract

Although a lot of work has been done in proposing secure mechanisms for sensor networks, very little work has been reported on how to respond to attacks that have infiltrated the network. In this paper we suggest a response framework to attacks that have been detected. We look at one particular response in detail, namely deception. Two modes for deception are proposed and the deception is executed by nodes that the neighboring to the attacker. We simulate a denial of service attack and simulation results show that under deception most of the useful traffic is delivered to the base station. Results also show that when compared to the overhead traffic when the network is under attack, the amount of deception trafficking is minimal.