Abstract

Sensor network usually refers to a wireless distributed self-configuring network that consists of sensors and execution units and is designed for machine-to-machine communication, automation, machine diagnostics, telemetry task solving. Sensor networks differ from other networks by the ease of use and deployment, low maintenance requirements, fault tolerance, and reliability. Every year, sensor networks, which are usually used in industrial systems, are increasingly exposed to malicious attacks. Although some sensor network communication protocols support encrypted connections, the nature of node data exchange allows attackers to identify key nodes and possible attack vectors. In this paper we present a method of hiding the architecture and configuration of the sensor network, which allows to protect against compromise not only the nodes involved in data exchange, but also the transmitted data. This method does not interfere with the attacker’s actions, but significantly complicates network traffic analysis, so that the intruder cannot carry out an attack because of the lack of data on network structure and configuration.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.