On the vulnerabilities of the virtual force approach to mobile sensor deployment

Novella Bartolini, Giancarlo Bongiovanni, Thomas F. La Porta, Simone Silvestri

Research output: Contribution to journalArticle

11 Citations (Scopus)

Abstract

The virtual force approach is at the basis of many solutions proposed for deploying mobile sensors. In this paper we study the vulnerabilities of this approach. We show that by compromising a few mobile sensors, an attacker can influence the movement of other sensors and prevent the achievement of the network coverage goals. We introduce an attack, called opportunistic movement, and give an analytical study of its efficacy. We show that in a typical scenario this attack can reduce coverage by more than 50 percent, by only compromising a 7 percent of the nodes. We propose two algorithms to counteract the above mentioned attack, DRM and SecureVF. DRM is a light-weight algorithm which randomly repositions sensors from overcrowded areas. SecureVF requires a more complex coordination among sensors but, unlike DRM, it enables detection and identification of malicious sensors. We investigate the performance of DRM and SecureVF through simulations. We show that DRM can significantly reduce the effects of the attack, at the expense of an increase in the energy consumption due to additional movements. By contrast, SecureVF completely neutralizes the attack and allows the achievement of the coverage goals of the network even in the presence of localization inaccuracies.

Original languageEnglish (US)
Pages (from-to)2592-2605
Number of pages14
JournalIEEE Transactions on Mobile Computing
Volume13
Issue number11
DOIs
StatePublished - Nov 1 2014

Fingerprint

Sensors
Energy utilization

All Science Journal Classification (ASJC) codes

  • Software
  • Computer Networks and Communications
  • Electrical and Electronic Engineering

Cite this

Bartolini, Novella ; Bongiovanni, Giancarlo ; La Porta, Thomas F. ; Silvestri, Simone. / On the vulnerabilities of the virtual force approach to mobile sensor deployment. In: IEEE Transactions on Mobile Computing. 2014 ; Vol. 13, No. 11. pp. 2592-2605.
@article{5705e376ad7e4233af2951c160b6968b,
title = "On the vulnerabilities of the virtual force approach to mobile sensor deployment",
abstract = "The virtual force approach is at the basis of many solutions proposed for deploying mobile sensors. In this paper we study the vulnerabilities of this approach. We show that by compromising a few mobile sensors, an attacker can influence the movement of other sensors and prevent the achievement of the network coverage goals. We introduce an attack, called opportunistic movement, and give an analytical study of its efficacy. We show that in a typical scenario this attack can reduce coverage by more than 50 percent, by only compromising a 7 percent of the nodes. We propose two algorithms to counteract the above mentioned attack, DRM and SecureVF. DRM is a light-weight algorithm which randomly repositions sensors from overcrowded areas. SecureVF requires a more complex coordination among sensors but, unlike DRM, it enables detection and identification of malicious sensors. We investigate the performance of DRM and SecureVF through simulations. We show that DRM can significantly reduce the effects of the attack, at the expense of an increase in the energy consumption due to additional movements. By contrast, SecureVF completely neutralizes the attack and allows the achievement of the coverage goals of the network even in the presence of localization inaccuracies.",
author = "Novella Bartolini and Giancarlo Bongiovanni and {La Porta}, {Thomas F.} and Simone Silvestri",
year = "2014",
month = "11",
day = "1",
doi = "10.1109/TMC.2014.2308209",
language = "English (US)",
volume = "13",
pages = "2592--2605",
journal = "IEEE Transactions on Mobile Computing",
issn = "1536-1233",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
number = "11",

}

On the vulnerabilities of the virtual force approach to mobile sensor deployment. / Bartolini, Novella; Bongiovanni, Giancarlo; La Porta, Thomas F.; Silvestri, Simone.

In: IEEE Transactions on Mobile Computing, Vol. 13, No. 11, 01.11.2014, p. 2592-2605.

Research output: Contribution to journalArticle

TY - JOUR

T1 - On the vulnerabilities of the virtual force approach to mobile sensor deployment

AU - Bartolini, Novella

AU - Bongiovanni, Giancarlo

AU - La Porta, Thomas F.

AU - Silvestri, Simone

PY - 2014/11/1

Y1 - 2014/11/1

N2 - The virtual force approach is at the basis of many solutions proposed for deploying mobile sensors. In this paper we study the vulnerabilities of this approach. We show that by compromising a few mobile sensors, an attacker can influence the movement of other sensors and prevent the achievement of the network coverage goals. We introduce an attack, called opportunistic movement, and give an analytical study of its efficacy. We show that in a typical scenario this attack can reduce coverage by more than 50 percent, by only compromising a 7 percent of the nodes. We propose two algorithms to counteract the above mentioned attack, DRM and SecureVF. DRM is a light-weight algorithm which randomly repositions sensors from overcrowded areas. SecureVF requires a more complex coordination among sensors but, unlike DRM, it enables detection and identification of malicious sensors. We investigate the performance of DRM and SecureVF through simulations. We show that DRM can significantly reduce the effects of the attack, at the expense of an increase in the energy consumption due to additional movements. By contrast, SecureVF completely neutralizes the attack and allows the achievement of the coverage goals of the network even in the presence of localization inaccuracies.

AB - The virtual force approach is at the basis of many solutions proposed for deploying mobile sensors. In this paper we study the vulnerabilities of this approach. We show that by compromising a few mobile sensors, an attacker can influence the movement of other sensors and prevent the achievement of the network coverage goals. We introduce an attack, called opportunistic movement, and give an analytical study of its efficacy. We show that in a typical scenario this attack can reduce coverage by more than 50 percent, by only compromising a 7 percent of the nodes. We propose two algorithms to counteract the above mentioned attack, DRM and SecureVF. DRM is a light-weight algorithm which randomly repositions sensors from overcrowded areas. SecureVF requires a more complex coordination among sensors but, unlike DRM, it enables detection and identification of malicious sensors. We investigate the performance of DRM and SecureVF through simulations. We show that DRM can significantly reduce the effects of the attack, at the expense of an increase in the energy consumption due to additional movements. By contrast, SecureVF completely neutralizes the attack and allows the achievement of the coverage goals of the network even in the presence of localization inaccuracies.

UR - http://www.scopus.com/inward/record.url?scp=84907833402&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84907833402&partnerID=8YFLogxK

U2 - 10.1109/TMC.2014.2308209

DO - 10.1109/TMC.2014.2308209

M3 - Article

AN - SCOPUS:84907833402

VL - 13

SP - 2592

EP - 2605

JO - IEEE Transactions on Mobile Computing

JF - IEEE Transactions on Mobile Computing

SN - 1536-1233

IS - 11

ER -