Outlier detection and countermeasure for hierarchical wireless sensor networks

被引:26
|
作者
Zhang, Y-Y [1 ]
Chao, H. -C. [2 ]
Chen, M. [3 ]
Shu, L. [4 ,6 ]
Park, C. -H. [5 ]
Park, M. -S. [5 ]
机构
[1] Shenyang Inst Engn, Dept Informat & Engn, Shenyang, Peoples R China
[2] Natl Ilan Univ, Coll Elect Engn & Comp Sci, Ilan, Taiwan
[3] Seoul Natl Univ, Seoul, South Korea
[4] Natl Univ Ireland, Digital Enterprise Res Inst, Galway, Ireland
[5] Korea Univ, Dept Comp Sci & Engn, Seoul 136701, South Korea
[6] Osaka Univ, Dept Multimedia Engn, Suita, Osaka 565, Japan
基金
爱尔兰科学基金会;
关键词
SECURITY; KEY;
D O I
10.1049/iet-ifs.2009.0192
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Outliers in wireless sensor networks (WSNs) are sensor nodes that issue attacks by abnormal behaviours and fake message dissemination. However, existing cryptographic techniques are hard to detect these inside attacks, which cause outlier recognition a critical and challenging issue for reliable and secure data dissemination in WSNs. To efficiently identify and isolate outliers, this study presents a novel outlier detection and countermeasure scheme (ODCS), which consists of three mechanisms: (i) abnormal event observation mechanism for network surveillance; (ii) exceptional message supervision mechanism for distinguishing fake messages by exploiting spatiotemporal correlation and consistency and (iii) abnormal behaviour supervision mechanism for the evaluation of node behaviour. The ODCS provides a heuristic methodology and does not need the knowledge about normal or malicious sensors in advance. This property makes the ODCS not only to distinguish and deal with various dynamic attacks automatically without advance learning, but also to reduce the requirement of capability for constrained nodes. In the ODCS, the communication is limited in a local range, such as one-hop or a cluster, which can reduce the communication frequency and circumscribe the session range further. Moreover, the ODCS provides countermeasures for different types of attacks, such as the rerouting scheme and the rekey security scheme, which can separate outliers from normal sensors and enhance the robustness of network, even when some nodes are compromised by adversary. Simulation results indicate that our approach can effectively detect and defend the outlier attack.
引用
收藏
页码:361 / 373
页数:13
相关论文
共 50 条
  • [21] Anomaly detection in medical wireless sensor networks
    Salem, Osman
    Liu, Yaning
    Mehaoua, Ahmed
    Journal of Computing Science and Engineering, 2013, 7 (04) : 272 - 284
  • [22] A hierarchical key management and authentication method for wireless sensor networks
    Alimoradi, Pourya
    Barati, Ali
    Barati, Hamid
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2022, 35 (06)
  • [23] Geographic Wormhole Detection in Wireless Sensor Networks
    Sookhak, Mehdi
    Akhundzada, Adnan
    Sookhak, Alireza
    Eslaminejad, Mohammadreza
    Gani, Abdullah
    Khan, Muhammad Khurram
    Li, Xiong
    Wang, Xiaomin
    PLOS ONE, 2015, 10 (01):
  • [24] A Danger Theory Inspired Protection Approach for Hierarchical Wireless Sensor Networks
    Xiao, Xin
    Zhang, Ruirui
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2019, 13 (05): : 2732 - 2753
  • [25] Analysis of Wormhole Detection Features in Wireless Sensor Networks
    Patel, Manish
    Aggarwal, Akshai
    Chaubey, Nirbhay
    4TH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS AND CONNECTED TECHNOLOGIES (ICIOTCT), 2019: INTERNET OF THINGS AND CONNECTED TECHNOLOGIES, 2020, 1122 : 22 - 29
  • [26] A Survey of Intrusion Detection Systems in Wireless Sensor Networks
    Butun, Ismail
    Morgera, Salvatore D.
    Sankar, Ravi
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (01) : 266 - 282
  • [27] Distributed Detection of Wormhole Attacks in Wireless Sensor Networks
    de Graaf, Rennie
    Hegazy, Islam
    Horton, Jeffrey
    Safavi-Naini, Reihaneh
    AD HOC NETWORKS, 2010, 28 : 208 - +
  • [28] Distributed monitoring for misbehaviour detection in wireless sensor networks
    Benahmed, Khelifa
    Merabti, Madjid
    Haffaf, Hafid
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (04) : 388 - 400
  • [29] Patrol Detection for Replica Attacks on Wireless Sensor Networks
    Wang, Liang-Min
    Shi, Yang
    SENSORS, 2011, 11 (03) : 2496 - 2504
  • [30] Cut Detection and Secure Routing in Wireless Sensor Networks
    Wagh, Pradnya
    Mahamuni, Pratik
    Rajeshirke, Kaustubh
    PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING AND INFORMATICS (IC3I), 2016, : 143 - 148