Outlier detection and countermeasure for hierarchical wireless sensor networks

被引:26
作者
Zhang, Y-Y [1 ]
Chao, H. -C. [2 ]
Chen, M. [3 ]
Shu, L. [4 ,6 ]
Park, C. -H. [5 ]
Park, M. -S. [5 ]
机构
[1] Shenyang Inst Engn, Dept Informat & Engn, Shenyang, Peoples R China
[2] Natl Ilan Univ, Coll Elect Engn & Comp Sci, Ilan, Taiwan
[3] Seoul Natl Univ, Seoul, South Korea
[4] Natl Univ Ireland, Digital Enterprise Res Inst, Galway, Ireland
[5] Korea Univ, Dept Comp Sci & Engn, Seoul 136701, South Korea
[6] Osaka Univ, Dept Multimedia Engn, Suita, Osaka 565, Japan
基金
爱尔兰科学基金会;
关键词
SECURITY; KEY;
D O I
10.1049/iet-ifs.2009.0192
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Outliers in wireless sensor networks (WSNs) are sensor nodes that issue attacks by abnormal behaviours and fake message dissemination. However, existing cryptographic techniques are hard to detect these inside attacks, which cause outlier recognition a critical and challenging issue for reliable and secure data dissemination in WSNs. To efficiently identify and isolate outliers, this study presents a novel outlier detection and countermeasure scheme (ODCS), which consists of three mechanisms: (i) abnormal event observation mechanism for network surveillance; (ii) exceptional message supervision mechanism for distinguishing fake messages by exploiting spatiotemporal correlation and consistency and (iii) abnormal behaviour supervision mechanism for the evaluation of node behaviour. The ODCS provides a heuristic methodology and does not need the knowledge about normal or malicious sensors in advance. This property makes the ODCS not only to distinguish and deal with various dynamic attacks automatically without advance learning, but also to reduce the requirement of capability for constrained nodes. In the ODCS, the communication is limited in a local range, such as one-hop or a cluster, which can reduce the communication frequency and circumscribe the session range further. Moreover, the ODCS provides countermeasures for different types of attacks, such as the rerouting scheme and the rekey security scheme, which can separate outliers from normal sensors and enhance the robustness of network, even when some nodes are compromised by adversary. Simulation results indicate that our approach can effectively detect and defend the outlier attack.
引用
收藏
页码:361 / 373
页数:13
相关论文
共 50 条
  • [31] A lightweight intrusion detection framework for wireless sensor networks
    Hai, Tran Hoang
    Huh, Eui-Nam
    Jo, Minho
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2010, 10 (04) : 559 - 572
  • [32] Wireless Sensor Networks (WSNs) The Shortcomings of Wireless Sensor Networks
    Pinar, Yasaroglu
    Zuhair, Abduljabbar
    Hamad, Alotaibi
    Resit, Akcam
    Shiva, Kadavarthi
    Omar, Abuzaghleh
    2016 IEEE LONG ISLAND SYSTEMS, APPLICATIONS AND TECHNOLOGY CONFERENCE (LISAT), 2016,
  • [33] Detection of Masked Replication Attack in Wireless Sensor Networks
    Khan, Wazir Zada
    Aalsalem, Mohammed Y.
    Saad, Mohamad Naufal Mohamad
    PROCEEDINGS OF THE 2013 8TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI 2013), 2013,
  • [34] Hybrid intrusion detection system for wireless sensor networks
    Hai, Tran Hoang
    Khan, Faraz
    Huh, Eui-Nam
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2007, PT 2, PROCEEDINGS, 2007, 4706 : 383 - 396
  • [35] Efficient monitoring for intrusion detection in wireless sensor networks
    Abdellatif, Takoua
    Mosbah, Mohamed
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (15)
  • [36] Lightweight anomaly intrusion detection in wireless sensor networks
    Chen, Haiguang
    Han, Peng
    Zhou, Xi
    Gao, Chuanshan
    INTELLIGENCE AND SECURITY INFORMATICS, 2007, 4430 : 105 - +
  • [37] An Intrusion Detection Scheme for Home Wireless Sensor Networks
    Wei, Min
    Rim, Keewook
    Kim, Keecheon
    FRONTIERS OF MANUFACTURING AND DESIGN SCIENCE II, PTS 1-6, 2012, 121-126 : 3799 - +
  • [38] An Efficient Intrusion Detection Scheme for Wireless Sensor Networks
    Rong, Chunming
    Eggen, Skjalg
    Cheng, Hongbing
    SECURE AND TRUST COMPUTING, DATA MANAGEMENT, AND APPLICATIONS, 2011, 187 : 116 - +
  • [39] LAD: Localization anomaly detection for wireless sensor networks
    Du, Wenliang
    Fang, Lei
    Peng, Ning
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2006, 66 (07) : 874 - 886
  • [40] An Efficient and Scalable Key Distribution Mechanism for Hierarchical Wireless Sensor Networks
    Shen, An-Ni
    Guo, Song
    Chien, Hung-Yu
    2009 IEEE SARNOFF SYMPOSIUM, CONFERENCE PROCEEDINGS, 2009, : 35 - +