{"@context":"http://iiif.io/api/presentation/2/context.json","@id":"https://repo.library.stonybrook.edu/cantaloupe/iiif/2/manifest.json","@type":"sc:Manifest","label":"A Resilient Actuation Attack on Wireless Sensor Networks","metadata":[{"label":"dc.description.sponsorship","value":"This work is sponsored by the Stony Brook University Graduate School in compliance with the requirements for completion of degree."},{"label":"dc.format","value":"Monograph"},{"label":"dc.format.medium","value":"Electronic Resource"},{"label":"dc.identifier.uri","value":"http://hdl.handle.net/11401/70945"},{"label":"dc.language.iso","value":"en_US"},{"label":"dc.publisher","value":"The Graduate School, Stony Brook University: Stony Brook, NY."},{"label":"dcterms.abstract","value":"Wireless sensor networks are built using tiny wireless sensor devices which have limited computational power and energy resources, as a result of which they can be subjected to various security compromises, including denial-of-service attacks. A particularly detrimental active denial-of-service attack that damages the sensing fidelity of wireless sensor networks is known as the Actuation attack, where hostile actuator (or actor) nodes belonging to a foreign network directly perturb or distort the environmental conditions being monitored. In this thesis we explore the loss of availability and reliability of wireless sensor networks ensuing from a proposed resilient Actuation attack which uses randomness and discontinuity to remain imperceptible. We demonstrate how the attack is designed to collect intelligence, without compromising any nodes or data packets, and to exercise caution to evade detection. We show how various factors, such as the frequency of actuation, topology of sensor network, forwarding scheme used by the network, and density of hostile nodes impact the efficacy of the attack. We discuss several possible techniques to defend against the proposed Actuation attack, and analyze their effectiveness. Finally, we conclude that it is increasingly difficult to control or detect an attack of this form owing to its random and asymmetric nature."},{"label":"dcterms.available","value":"2015-04-24T14:45:12Z"},{"label":"dcterms.contributor","value":"Jie Gao."},{"label":"dcterms.creator","value":"Bhattacharyya, Aneeta"},{"label":"dcterms.dateAccepted","value":"2015-04-24T14:45:12Z"},{"label":"dcterms.dateSubmitted","value":"2015-04-24T14:45:12Z"},{"label":"dcterms.description","value":"Department of Computer Science"},{"label":"dcterms.format","value":"Monograph"},{"label":"dcterms.identifier","value":"http://hdl.handle.net/1951/55370"},{"label":"dcterms.issued","value":"2010-05-01"},{"label":"dcterms.language","value":"en_US"},{"label":"dcterms.provenance","value":"Made available in DSpace on 2015-04-24T14:45:12Z (GMT). No. of bitstreams: 3\nBhattacharyya_grad.sunysb_0771M_10022.pdf.jpg: 1894 bytes, checksum: a6009c46e6ec8251b348085684cba80d (MD5)\nBhattacharyya_grad.sunysb_0771M_10022.pdf.txt: 91247 bytes, checksum: 393ef88e6be1288bd7bbb5ffeee56032 (MD5)\nBhattacharyya_grad.sunysb_0771M_10022.pdf: 3970391 bytes, checksum: f524b1ceb0ca2670ae5c9012ec5ee71b (MD5)\n Previous issue date: 1"},{"label":"dcterms.publisher","value":"The Graduate School, Stony Brook University: Stony Brook, NY."},{"label":"dcterms.subject","value":"Actuation Attack, Denial of Service, Hostile Actuator, Reliability, Security, Wireless Sensor Network"},{"label":"dcterms.title","value":"A Resilient Actuation Attack on Wireless Sensor Networks"},{"label":"dcterms.type","value":"Thesis"},{"label":"dc.type","value":"Thesis"}],"description":"This manifest was generated dynamically","viewingDirection":"left-to-right","sequences":[{"@type":"sc:Sequence","canvases":[{"@id":"https://repo.library.stonybrook.edu/cantaloupe/iiif/2/canvas/page-1.json","@type":"sc:Canvas","label":"Page 1","height":1650,"width":1275,"images":[{"@type":"oa:Annotation","motivation":"sc:painting","resource":{"@id":"https://repo.library.stonybrook.edu/cantaloupe/iiif/2/10%2F46%2F53%2F10465323641361112345967729715057609982/full/full/0/default.jpg","@type":"dctypes:Image","format":"image/jpeg","height":1650,"width":1275,"service":{"@context":"http://iiif.io/api/image/2/context.json","@id":"https://repo.library.stonybrook.edu/cantaloupe/iiif/2/10%2F46%2F53%2F10465323641361112345967729715057609982","profile":"http://iiif.io/api/image/2/level2.json"}},"on":"https://repo.library.stonybrook.edu/cantaloupe/iiif/2/canvas/page-1.json"}]}]}]}