Probabilistic security analysis through path-based metric evaluation in wireless sensor networks

  • Authors

    • Sampath Kumar Pattem
    • Jayasankar K
    • Sumalatha V
    2018-03-19
    https://doi.org/10.14419/ijet.v7i2.8.10348
  • WSN, Security Metrics, Shortest Path, Number of Paths, Mean Path Length, Matlab.
  • This paper analyzes the possible security threats in the wireless sensor network (WSN) through the path based metrics. Since the routing in WSN focuses towards the energy optimizing by which an optimal path is selected which consumes less energy. However security is also very important in WSN which won’t considers in the optimal path selection. This paper analyzes the possible security threats based on the characteristics of paths. A simple comparative analysis is carried out in this paper between different topologies of network through the path based metrics. Since there exists number of path metrics, some metrics are categorized as decisive and some are assistive and based on the obtained count, one network topology is finalized as more secure. Matlab is used for the Realization of this methodology.

  • References

    1. [1] F. Akyildiz, Weilian Su, Y. Sankarasubramaniam, and E. Cayirci, “A survey on sensor networksâ€, IEEE Communications Magazine, Vol. 40, No. 8, pp. 102-114, August 2002. https://doi.org/10.1109/MCOM.2002.1024422.

      [2] Yanli Yu, Keqiu Li, Wanlei Zhou, and Ping Li, “Trust mechanisms in wireless sensor networks: Attack analysis and countermeasuresâ€, Journal of Network and Computer Applications, Vol. 35, No. 3, pp. 867-880, May 2012.https://doi.org/10.1016/j.jnca.2011.03.005.

      [3] NwokediIdika and Bharat Bhargava, “Extending Attack Graph-Based Security Metrics and Aggregating Their Applicationâ€, IEEE Transactions on Dependable and Secure Computing, Vol. 9, No. 1, pp.75-85, February 2012. https://doi.org/10.1109/TDSC.2010.61.

      [4] Richard Lippmann, Kyle Ingols, Chris Scott, Keith Piwowarski, Kendra Kratkiewicz, Mike Artz, and Robert Cunningham, “Validating and Restoring Defense in Depth Using Attack Graphs,†In: Proc. of Conf. on Military Communications, Washington, DC, USA, pp.1-10, October 2006.https://doi.org/10.1109/MILCOM.2006.302434.

      [5] Joseph Pamula, Sushil Jajodia, Paul Ammann, and Vipin Swarup, “A Weakest-Adversary Security Metric for Network Configuration Security Analysisâ€, In: Proc. of Second ACM Workshop on Quality of Protection, Alexandria, Virginia, USA, pp. 31-38, October 2006.https://doi.org/10.1145/1179494.1179502.

      [6] S. Jha, O. Sheyner, and J. Wing, “Two Formal Analyses of Attack Graphsâ€, In Proc. of 15th IEEE Computer Security Foundations Workshop, Cape Breton, NS, Canada, pp.49 June 2002.https://doi.org/10.1109/CSFW.2002.1021806.

      [7] Ram Dantu and Prakash Kolan, “Risk Management Using Behavior Based Bayesian Networksâ€, In: Proc. of Conf. on Intelligence and Security Informatics, University of nor Texas, pp. 115-126, 2005.https://doi.org/10.1007/11427995_10.

      [8] Lingyu Wang, Tania Islam, Tao Long, Anup Singhal, and Sushil Jajodia, “An Attack Graph-Based Probabilistic Security Metricâ€, In: Proc. of Conf. on Data and Applications Security and Privacy (DAS ’08), London, UK, pp. 283-296, 2008.https://doi.org/10.1007/978-3-540-70567-3_22.

      [9] Cynthia Phillips and Laura PaintonSwiler, “A Graph-Based System for Network-Vulnerability Analysisâ€, In: Proc. of the 1998 workshop on New security paradigms, Charlottesville, Virginia, USA, pp. 71-79, 1998.https://doi.org/10.1145/310889.310919.

      [10] R. Ortalo, Y. Deswarte, and M. Kaaniche, “Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security,†IEEE Transactions on Software Engineering, Vol. 25, Issue 5, pp. 633-650, September 1999.https://doi.org/10.1109/32.815323.

      [11] Wei Li and Rayford Vaughn, “Cluster Security Research Involving the Modeling of Network Exploitations Using Exploitation Graphsâ€, In: Proc. of Sixth IEEE International Symposium on Cluster Computing and Grid, Singapore, pp.1-11, May 2006.https://doi.org/10.1109/CCGRID.2006.1630921.

      [12] Lingyu Wang, Anoop Singhal, and Sushil Jajodia, “Measuring Overall Security of Network Configurations Using Attack Graphsâ€, In: Proc. of Conf. on Data and Applications Security, Redondo Beach, CA, USA, pp. 98-112, August 2007.https://doi.org/10.1007/978-3-540-73538-0_9.

      [13] Kyle Ingols, Richard Lippmann, and Keith Piwowarski, “Practical Attack Graph Generation for Network Defenseâ€, In: Proc. of Conf. on Computer Security Applications, Miami Beach, FL, USA, pp. 121-130, December 2006.

      [14] S. Noel, M. Jacobs, Pramod Kalapa, and Sushil Jajodia, “Multiple Coordinated Views for Network Attack Graphsâ€, In: Proc. of IEEE Workshop on Visualization for Computer Security, Minneapolis, MN, USA, pp. 99-106, November 2005.

      [15] Dr. Seetaiah Kilaru, Hari Kishore K, Sravani T, Anvesh Chowdary L, Balaji T “Review and Analysis of Promising Technologies with Respect to fifth Generation Networksâ€, 2014 First International Conference on Networks & Soft Computing, ISSN:978-1-4799-3486-7/14,pp.270-273,August2014.

      [16] Meka Bharadwaj, Hari Kishore "Enhanced Launch-Off-Capture Testing Using BIST Designs†Journal of Engineering and Applied Sciences, ISSN No: 1816-949X, Vol No.12, Issue No.3, page: 636-643, April 2017.

      [17] P Bala Gopal, K Hari Kishore, B.PraveenKittu“An FPGA Implementation of On Chip UART Testing with BIST Techniquesâ€, International Journal of Applied Engineering Research, ISSN 0973-4562, Volume 10, Number 14 , pp. 34047-34051, August 2015.

      [18] A Murali, K Hari Kishore, D Venkat Reddy "Integrating FPGAs with Trigger Circuitry Core System Insertions for Observability in Debugging Process†Journal of Engineering and Applied Sciences, ISSN No: 1816-949X, Vol No.11, Issue No.12, page: 2643-2650, December 2016.

      [19] Mahesh Mudavath, K Hari Kishore, D Venkat Reddy "Design of CMOS RF Front-End of Low Noise Amplifier for LTE System Applications Integrating FPGAs†Asian Journal of Information Technology, ISSN No: 1682-3915, Vol No.15, Issue No.20, page: 4040-4047, December 2016.

      [20] N Bala Dastagiri, K Hari Kishore "Novel Design of Low Power Latch Comparator in 45nm for Cardiac Signal Monitoringâ€, International Journal of Control Theory and Applications, ISSN No: 0974-5572, Vol No.9, Issue No.49, page: 117-123, May 2016.

      [21] N Bala Gopal, Kakarla Hari Kishore "Reduction of Kickback Noise in Latched Comparators for Cardiac IMDs†Indian Journal of Science and Technology, ISSN No: 0974-6846, Vol No.9, Issue No.43, Page: 1-6, November 2016.

      [22] S Nazeer Hussain, K Hari Kishore "Computational Optimization of Placement and Routing using Genetic Algorithm†Indian Journal of Science and Technology, ISSN No: 0974-6846, Vol No.9, Issue No.47, page: 1-4, December 2016.

      [23] N.Prathima, K.Hari Kishore, “Design of a Low Power and High Performance Digital Multiplier Using a Novel 8T Adderâ€, International Journal of Engineering Research and Applications, ISSN: 2248-9622, Vol. 3, Issue.1, Jan-Feb., 2013.

      [24] S Nazeer Hussain, K Hari Kishore "Computational Optimization of Placement and Routing using Genetic Algorithm†Indian Journal of Science and Technology, ISSN No: 0974-6846, Vol No.9, Issue No.47, page: 1-4, December 2016.

      [25] S.V.Manikanthan and T.Padmapriya “Recent Trends In M2m Communications In 4g Networks And Evolution Towards 5gâ€, International Journal of Pure and Applied Mathematics, ISSN NO: 1314-3395, Vol-115, Issue -8, Sep 2017.

      [26] T. Padmapriya and V. Saminadan, “Priority based fair resource allocation and Admission Control Technique for Multi-user Multi-class downlink Traffic in LTE-Advanced Networksâ€, International Journal of Advanced Research, vol.5, no.1, pp.1633-1641, January 2017.https://doi.org/10.21474/IJAR01/2929.

  • Downloads

  • How to Cite

    Kumar Pattem, S., K, J., & V, S. (2018). Probabilistic security analysis through path-based metric evaluation in wireless sensor networks. International Journal of Engineering & Technology, 7(2.8), 149-155. https://doi.org/10.14419/ijet.v7i2.8.10348