Attack Graph Based Intrusion Tolerance Method in Software-Defined Networks

Author(s):  
Hyejin Kim ◽  
Seunghyun Yoon ◽  
Sunghwan Kim ◽  
Hyuk Lim
2015 ◽  
Vol 2015 ◽  
pp. 1-9 ◽  
Author(s):  
Yu Jiang ◽  
Jie Huang

Wireless sensor network is vulnerable to malicious attacks because of the broadcast nature of wireless signal. In order to overcome the shortcomings of existing methods, this paper presents an intrusion tolerance method against malicious nodes. Different from the traditional intrusion tolerance methods based on encryption, authentication, and multirouting, the proposed method uses active protection to achieve intrusion tolerance. Small power consumption of many normal nodes is exchanged for large power consumption of relatively small number of malicious nodes to decrease the lifetime of malicious nodes. Theoretical analysis and test results show that the proposed methods not only prolong the lifetime of the sensor network but also achieve the effective protection against malicious nodes. The active protection method provides new ideas for the security in WSN.


2020 ◽  
Vol 17 (3) ◽  
pp. 1653-1668
Author(s):  
Seunghyun Yoon ◽  
Jin-Hee Cho ◽  
Dong Seong Kim ◽  
Terrence J. Moore ◽  
Frederica Free-Nelson ◽  
...  

Author(s):  
Yanli Feng ◽  
Gongliang Sun ◽  
Zhiyao Liu ◽  
Chenrui Wu ◽  
Xiaoyang Zhu ◽  
...  

Author(s):  
Ian Vilar Bastos ◽  
Vinicius Correa Ferreira ◽  
Debora Christina Muchaluat-Saade ◽  
Celio Vinicius Neves de Albuquerque ◽  
Igor Monteiro Moraes

Sign in / Sign up

Export Citation Format

Share Document