×

Trace malicious source to guarantee cyber security for mass monitor critical infrastructure. (English) Zbl 1400.68039

Summary: The proposed traceback scheme does not take into account the trust of node which leads to the low effectiveness. A trust-aware probability marking (TAPM) traceback scheme is proposed to locate malicious source quickly. In TAPM scheme, the node is marked with difference marking probability according to its trust which is deduced by trust evaluation. The high marking probability for low trust node can locate malicious source quickly, and the low marking probability for high trust node can reduce the number of marking to improve the network lifetime, so the security and the network lifetime can be improved in TAPM scheme.

MSC:

68M10 Network design and communication in computer systems

References:

[1] Jang-Jaccard, J.; Nepal, S., A survey of emerging threats in cybersecurity, J. Comput. Syst. Sci., 80, 5, 973-993, (2014) · Zbl 1310.68031
[2] Bul’ajoul, W.; James, A.; Pannu, M., Improving network intrusion detection system performance through quality of service configuration and parallel technology, J. Comput. Syst. Sci., 81, 6, 981-999, (2015)
[3] Ray, B. R.; Abawajy, J.; Chowdhury, M., Scalable RFID security framework and protocol supporting Internet of things, Comput. Netw., 67, 89-103, (2014)
[4] Hamid, I. R.A.; Abawajy, J. H., An approach for profiling phishing activities, Comput. Secur., 45, 27-41, (2014)
[5] Borgman, B.; Mubarak, S.; Choo, K. K.R., Cyber security readiness in the south Australian government, Comput. Stand. Interfaces, 37, 1-8, (2015)
[6] Junghyun, N. A.M.; Choo, K. K.R.; Juryon, P.; Dongho, W., An offline dictionary attack against abdalla and Pointcheval’s key exchange in the password-only three-party setting, IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 98, 1, 424-427, (2015)
[7] Hu, Y.; Liu, A., Improvement the quality of mobile target detection through portion of node with fully duty cycle in WSNs, Comput. Syst. Sci. Eng., 31, 1, 5-17, (2016), 2016
[8] Liu, Y.; Dong, M.; Ota, K.; Liu, A., Activetrust: secure and trustable routing in wireless sensor networks, IEEE Trans. Inf. Forensics Secur., 11, 9, 2013-2027, (2016), 2016
[9] Alam, S. M.; Fahmy, S., A practical approach for provenance transmission in wireless sensor networks, Ad Hoc Netw., 16, 28-45, (2014)
[10] Cheng, B. C.; Chen, H.; Li, Y. J., A packet marking with fair probability distribution function for minimizing the convergence time in wireless sensor networks, Comput. Commun., 31, 18, 4352-4359, (2008)
[11] Siddiqui, M. S.; Obaid Amin, S.; Hong, C. S., Hop-by-hop traceback in wireless sensor networks, IEEE Commun. Lett., 16, 2, 242-245, (2012)
[12] Xu, J.; Zhou, X.; Yang, F., Traceback in wireless sensor networks with packet marking and logging, Front. Comput. Sci. China, 5, 3, 308-315, (2011)
[13] Hu, Y.; Mian, X.; Ota, K.; Liu, A.; Guo, M., Mobile target detection in wireless sensor networks with adjustable sensing frequency, IEEE Syst. J., (2014)
[14] Wong, T. Y.; Law, K. T.; Lui, J. C.S., An efficient distributed algorithm to identify and traceback ddos traffic, Comput. J., 49, 4, 418-442, (2006)
[15] Osanaiye, O.; Choo, K. K.R.; Dlodlo, M., Distributed denial of service (ddos) resilience in cloud: review and conceptual cloud ddos mitigation framework, J. Netw. Comput. Appl., 67, 147-165, (2016)
[16] Nam, J.; Choo, K. K.R.; Han, S.; Kim, M.; Paik, J.; Won, D., Efficient and anonymous two-factor user authentication in wireless sensor networks: achieving user anonymity with lightweight sensor computation, PLoS ONE, (2015)
[17] Jeong, E. H.; Lee, B. K., An IP traceback protocol using a compressed hash table, a sinkhole router and data mining based on network forensics against network attacks, Future Gener. Comput. Syst., 33, 42-52, (2014)
[18] Saurabh, S.; Sairam, A. S., ICMP based IP traceback with negligible overhead for highly distributed reflector attack using Bloom filters, Comput. Commun., 42, 60-69, (2014)
[19] Lu, N.; Wang, Y.; Su, S., A novel path-based approach for single-packet IP traceback, Secur. Commun. Netw., 7, 2, 309-321, (2014)
[20] Ge, M.; Choo, K. K.R., A novel hybrid key revocation scheme for wireless sensor networks, (Proceedings of 8th International Conference on Network and System Security, (2014)), 462-475
[21] Ge, M.; Choo, K. K.R.; Wu, H.; Yu, Y., Survey on key revocation mechanisms in wireless sensor networks, J. Netw. Comput. Appl., 63, 24-38, (2016)
[22] Tseng, Y.; Chen, H.; Hsieh, W., Probabilistic packet marking with non-preemptive compensation, IEEE Commun. Lett., 8, 6, 359-361, (2004)
[23] Yang, L.; Cao, J.; Zhu, W., Accurate and efficient object tracking based on passive RFID, IEEE Trans. Mob. Comput., 14, 11, 2188-2200, (2015)
[24] Liu, X.; Ota, K.; Liu, A.; Chen, Z., An incentive game based evolutionary model for crowd sensing networks, Peer-to-Peer Netw. Appl., 9, 4, 692-711, (2016)
[25] Liu, X.; Dong, M.; Ota, K.; Hung, P.; Liu, A., Service pricing decision in cyber-physical systems: insights from game theory, IEEE Trans. Serv. Comput., 9, 2, 186-198, (2016)
[26] Dai, H.; Chen, G.; Wang, C., Quality of energy provisioning for wireless power transfer, IEEE Trans. Parallel Distrib. Syst., 26, 2, 527-537, (2015)
[27] Dong, M.; Ota, K.; Yang, L. T., LSCD: a low storage clone detecting protocol for cyber-physical systems, IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst., 35, 5, 712-723, (2016)
[28] Aburumman, A.; Seo, W.j.; Islam, R.; Khan, M.k.; Choo, K. K.R., A secure cross-domain SIP solution for mobile ad hoc network using dynamic clustering, (Proceedings of 11th International Conference on Security and Privacy in Communication Networks, (2015)), 649-664
[29] Aburumman, A.; Choo, K. K.R., A domain-based multi-cluster SIP solution for mobile ad hoc network, (Proceedings of 10th International ICST Conference on Security and Privacy in Communication Networks, (2015)), 267-281
[30] Waldo, D. R.; Smith, L. W.; Cox, E. L., Logarithmic normal distribution for description of sieved forage materials, J. Dairy Sci., 54, 10, 1465-1469, (1971)
[31] Han, G.; Jiang, J.; Shu, L.; Niu, J.; Chao, H. C., Management and applications of trust in wireless sensor networks: a survey, J. Comput. Syst. Sci., 80, 3, 602-617, (2014) · Zbl 1311.68061
[32] Liu, A.; Liu, X.; Liu, Y., A comprehensive analysis for fair probability marking based traceback approach in WSNs, Secur. Commun. Netw., (2016)
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.