TY - GEN
T1 - Overlapped detection via approximate entropy estimation against flooding attack in mobile sensor networks
AU - Kim, Mihui
AU - Chae, Kijoon
PY - 2006
Y1 - 2006
N2 - To achieve security in sensor networks, it is important to be able to defend against flooding attack recently considered as an extremely threatening attack. In this paper, we propose a flooding attack detection method as the first defense step, through approximate entropy estimation reflecting resource constraints of sensors. Each detector performs both basic estimation for its own region and overlapped estimation for its own and neighbor regions, against the mobility of attack node. Also, in order to enhance the accuracy of detection even in the various deployments of attack agents, we deploy hierarchically detectors according to network topology. This detector by entropy estimation is simplified by only multiplication calculation instead of logarithm, in addition to providing higher estimation precision of entropy compared to the conventional entropy estimation. Our simulation results indicate that this hierarchical defense is a feasible method, being especially promising for accurate decision through overlapped detection even in frequent handoffs of mobile attack agents.
AB - To achieve security in sensor networks, it is important to be able to defend against flooding attack recently considered as an extremely threatening attack. In this paper, we propose a flooding attack detection method as the first defense step, through approximate entropy estimation reflecting resource constraints of sensors. Each detector performs both basic estimation for its own region and overlapped estimation for its own and neighbor regions, against the mobility of attack node. Also, in order to enhance the accuracy of detection even in the various deployments of attack agents, we deploy hierarchically detectors according to network topology. This detector by entropy estimation is simplified by only multiplication calculation instead of logarithm, in addition to providing higher estimation precision of entropy compared to the conventional entropy estimation. Our simulation results indicate that this hierarchical defense is a feasible method, being especially promising for accurate decision through overlapped detection even in frequent handoffs of mobile attack agents.
UR - http://www.scopus.com/inward/record.url?scp=33746586089&partnerID=8YFLogxK
U2 - 10.1007/11758525_136
DO - 10.1007/11758525_136
M3 - Conference contribution
AN - SCOPUS:33746586089
SN - 3540343814
SN - 9783540343813
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 1024
EP - 1032
BT - Computational Science - ICCS 2006
PB - Springer Verlag
T2 - ICCS 2006: 6th International Conference on Computational Science
Y2 - 28 May 2006 through 31 May 2006
ER -