Outlier detection and countermeasure for hierarchical wireless sensor networks

被引:26
|
作者
Zhang, Y-Y [1 ]
Chao, H. -C. [2 ]
Chen, M. [3 ]
Shu, L. [4 ,6 ]
Park, C. -H. [5 ]
Park, M. -S. [5 ]
机构
[1] Shenyang Inst Engn, Dept Informat & Engn, Shenyang, Peoples R China
[2] Natl Ilan Univ, Coll Elect Engn & Comp Sci, Ilan, Taiwan
[3] Seoul Natl Univ, Seoul, South Korea
[4] Natl Univ Ireland, Digital Enterprise Res Inst, Galway, Ireland
[5] Korea Univ, Dept Comp Sci & Engn, Seoul 136701, South Korea
[6] Osaka Univ, Dept Multimedia Engn, Suita, Osaka 565, Japan
基金
爱尔兰科学基金会;
关键词
SECURITY; KEY;
D O I
10.1049/iet-ifs.2009.0192
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Outliers in wireless sensor networks (WSNs) are sensor nodes that issue attacks by abnormal behaviours and fake message dissemination. However, existing cryptographic techniques are hard to detect these inside attacks, which cause outlier recognition a critical and challenging issue for reliable and secure data dissemination in WSNs. To efficiently identify and isolate outliers, this study presents a novel outlier detection and countermeasure scheme (ODCS), which consists of three mechanisms: (i) abnormal event observation mechanism for network surveillance; (ii) exceptional message supervision mechanism for distinguishing fake messages by exploiting spatiotemporal correlation and consistency and (iii) abnormal behaviour supervision mechanism for the evaluation of node behaviour. The ODCS provides a heuristic methodology and does not need the knowledge about normal or malicious sensors in advance. This property makes the ODCS not only to distinguish and deal with various dynamic attacks automatically without advance learning, but also to reduce the requirement of capability for constrained nodes. In the ODCS, the communication is limited in a local range, such as one-hop or a cluster, which can reduce the communication frequency and circumscribe the session range further. Moreover, the ODCS provides countermeasures for different types of attacks, such as the rerouting scheme and the rekey security scheme, which can separate outliers from normal sensors and enhance the robustness of network, even when some nodes are compromised by adversary. Simulation results indicate that our approach can effectively detect and defend the outlier attack.
引用
收藏
页码:361 / 373
页数:13
相关论文
共 50 条
  • [11] A Secure Group-Based Blackhole Node Detection Scheme for Hierarchical Wireless Sensor Networks
    Mohammad Wazid
    Ashok Kumar Das
    Wireless Personal Communications, 2017, 94 : 1165 - 1191
  • [12] A Secure Group-Based Blackhole Node Detection Scheme for Hierarchical Wireless Sensor Networks
    Wazid, Mohammad
    Das, Ashok Kumar
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 94 (03) : 1165 - 1191
  • [13] An Evolutionary Game-Based Secure Clustering Protocol With Fuzzy Trust Evaluation and Outlier Detection for Wireless Sensor Networks
    Yang, Liu
    Lu, Yinzhi
    Yang, Simon X.
    Zhong, Yuanchang
    Guo, Tan
    Liang, Zhifang
    IEEE SENSORS JOURNAL, 2021, 21 (12) : 13935 - 13947
  • [14] HIKES: Hierarchical key establishment scheme for wireless sensor networks
    Ibriq, J.
    Mahgoub, I.
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (10) : 1825 - 1856
  • [15] An Efficient Key Management Scheme in Hierarchical Wireless Sensor Networks
    Zhang, Xinyang
    Wang, Jidong
    2015 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND SECURITY (ICCCS), 2015,
  • [16] A Secure and Scalable Rekeying Mechanism for Hierarchical Wireless Sensor Networks
    Guo, Song
    Shen, An-Ni
    Guo, Minyi
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2010, E93D (03): : 421 - 429
  • [17] Cooperative Intrusion Detection in Wireless Sensor Networks
    Krontiris, Ioannis
    Benenson, Zinaida
    Giannetsos, Thanassis
    Freiling, Felix C.
    Dimitriou, Tassos
    WIRELESS SENSOR NETWORKS, PROCEEDINGS, 2009, 5432 : 263 - +
  • [18] An intrusion detection system for wireless sensor networks
    Onat, I
    Miri, A
    WIMOB 2005: IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS, VOL 3, PROCEEDINGS, 2005, : 253 - 259
  • [19] Wormhole Attack Detection in Wireless Sensor Networks
    Bendjima, Mostefa
    Feham, Mohammed
    PROCEEDINGS OF THE 2016 SAI COMPUTING CONFERENCE (SAI), 2016, : 1319 - 1326
  • [20] An Intrusion Detection System for Wireless Sensor Networks
    Ioannou, Christiana
    Vassiliou, Vasos
    Sergiou, Charalampos
    PROCEEDINGS OF THE 24TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (ICT 2017), 2017,