Ubiquitous and pervasive applications, where the Wireless Sensor Networks are
typically deployed, lead to the susceptibility to many kinds of security
attacks. Sensors used for real time response capability also make it difficult
to devise the resource intensive security protocols because of their limited
battery, power, memory and processing capabilities. One of potent form of
Denial of Service attacks is Wormhole attack that affects on the network layer.
In this paper, the techniques dealing with wormhole attack are investigated and
an approach for wormhole prevention is proposed. Our approach is based on the
analysis of the two-hop neighbors forwarding Route Reply packet. To check the
validity of the sender, a unique key between the individual sensor node and the
base station is required to be generated by suitable scheme.Comment: 14 pages; International Journal of Network Security & Its
Applications Year: 2011 Vol: 3 Issue:
The efficient utilization of hardware and software resources plays a vital role in a high-performance computing environment. Where on the one side, a shared pool of resources facilitates faster processing with limited resources, this mechanism also widens the scope of many kinds of security attacks on the other side. Side-channel attack (SCA) is one such attack where methods to monitor the activity of exploited shared resource is carried out to extract the private key. One such SCA, branch prediction analysis attack, launched with time-driven attack (TDA) method is considered in this paper. With the consideration of the virtualization environment, proposal of an algorithm Trinetra, to detect the presence of cross-VM TDA, is the primary focus of our paper. We have tested the performance of Trinetra with experimental analysis in addition to the attack simulation. Performance evaluation has found the Trinetra very effective with negligible performance overhead. Keywords Side-channel attack • Branch prediction analysis attack • Time-driven attack • Virtualization
Growing scope of cloud computing has made cloud security a challenging parameter. Among all the security parameters, virtualization security requires primary focus as it hides internal resource sharing details of the system. Side Channel Attack (SCA) is an attack that exploits the shared resource for extracting the private key of a cryptographic algorithm. Considering the significance of virtualization security, we need to analyze the SCA in a virtualization environment. In this paper, we target the Branch Prediction Analysis (BPA)Attack, one type of SCA. We have carried out an analysis to verify the scope of various BPA attack launching methods in virtualization environment along with the simulation. We have also analyzed the scope of existing solutions handling BPA attack.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.