Indian researcher's improved anti-hacking system for wireless networks



Washington, September 4: Computer scientists at Florida Atlantic University, including an Indian-origin researcher, have devised a new anti-hacking system to protect wireless sensor networks (WSN).


Feng Li, Avinash Srinivasan, and Jie Wu say that the Probabilistic Voting-based Filtering Scheme (PVFS) they have devised can help improve the viability of WSNs, which are used for detecting and reporting events like hurricanes, earthquakes and forest fires, as well as for military surveillance and antiterrorist activities.

In the International Journal of Security and Networks, the researcher point out that there are two types of cyber-sabotage that might occur on a WSN.

The first is the fabricated report with false votes attack in which phony data is sent to the base station with forged validation, presenting the authorities monitoring a WSN for impending disaster with a quandary: if the data arriving from the network is validated but false, they cannot detect it.

The second kind of attack adds false validation votes to genuine incoming data. The problem facing those monitoring the WSN now is if genuine data is being labelled as false, how to trust any data arriving from the WSN.

Most existing WSN systems have built-in software on the network that can ward off the first kind of attack so that false data usually cannot be given valid credentials, and those monitoring the system will be able to spot subterfuge easily.

However, WSNs are not usually protected against the second kind of attack, so that a genuine impending disaster cannot be verified remotely, which defeats the purpose of a WSN.

Li and colleagues say that the PVFS can deal with both of these attacks simultaneously.

The researchers used a general en-route filtering scheme that can achieve strong protection against hackers while maintaining normal filtering to make the WSN viable.

According to them, the scheme breaks WSNs into clusters, and locks each cluster to a particular data encryption key. As data reaches headquarters from the WSN clusters, the main cluster-heads along the path checks the report together with the votes, acting as the verification nodes in PVFS.

The verification node is set up so that it will not drop a report immediately it finds a false vote, instead it will simply record the result. Only when the number of verified false votes reaches a designed threshold will a report be dropped.

This way, should a saboteur compromise one or more sensors on any given WSN to launch an attack, the PVFS will apply probability rules to determine the likelihood that this has happened. It will do so based on data arriving from other sensors in different clusters before reporting incoming data as false.

The researchers are of the view that the detection of compromised sensors in a WSN in such a way may be of vital important to homeland security as well as successfully tracking natural events with the potential to devastate cities because by countering sabotage, false alarms that waste response efforts could be minimized in times of impending crisis.


Copyright Asian News International/DailyIndia.com