Outlier detection and countermeasure for hierarchical wireless sensor networks

被引:26
作者
Zhang, Y-Y [1 ]
Chao, H. -C. [2 ]
Chen, M. [3 ]
Shu, L. [4 ,6 ]
Park, C. -H. [5 ]
Park, M. -S. [5 ]
机构
[1] Shenyang Inst Engn, Dept Informat & Engn, Shenyang, Peoples R China
[2] Natl Ilan Univ, Coll Elect Engn & Comp Sci, Ilan, Taiwan
[3] Seoul Natl Univ, Seoul, South Korea
[4] Natl Univ Ireland, Digital Enterprise Res Inst, Galway, Ireland
[5] Korea Univ, Dept Comp Sci & Engn, Seoul 136701, South Korea
[6] Osaka Univ, Dept Multimedia Engn, Suita, Osaka 565, Japan
基金
爱尔兰科学基金会;
关键词
SECURITY; KEY;
D O I
10.1049/iet-ifs.2009.0192
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Outliers in wireless sensor networks (WSNs) are sensor nodes that issue attacks by abnormal behaviours and fake message dissemination. However, existing cryptographic techniques are hard to detect these inside attacks, which cause outlier recognition a critical and challenging issue for reliable and secure data dissemination in WSNs. To efficiently identify and isolate outliers, this study presents a novel outlier detection and countermeasure scheme (ODCS), which consists of three mechanisms: (i) abnormal event observation mechanism for network surveillance; (ii) exceptional message supervision mechanism for distinguishing fake messages by exploiting spatiotemporal correlation and consistency and (iii) abnormal behaviour supervision mechanism for the evaluation of node behaviour. The ODCS provides a heuristic methodology and does not need the knowledge about normal or malicious sensors in advance. This property makes the ODCS not only to distinguish and deal with various dynamic attacks automatically without advance learning, but also to reduce the requirement of capability for constrained nodes. In the ODCS, the communication is limited in a local range, such as one-hop or a cluster, which can reduce the communication frequency and circumscribe the session range further. Moreover, the ODCS provides countermeasures for different types of attacks, such as the rerouting scheme and the rekey security scheme, which can separate outliers from normal sensors and enhance the robustness of network, even when some nodes are compromised by adversary. Simulation results indicate that our approach can effectively detect and defend the outlier attack.
引用
收藏
页码:361 / 373
页数:13
相关论文
共 50 条
  • [41] Study on Intrusion Detection Policy for Wireless Sensor Networks
    Xu, Jiang
    Wang, Jin
    Xie, Shengdong
    Chen, Wenliang
    Kim, Jeong-Uk
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (01): : 1 - 6
  • [42] Detection and mitigation of sinkhole attacks in wireless sensor networks
    Shafiei, H.
    Khonsari, A.
    Derakhshi, H.
    Mousavi, P.
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2014, 80 (03) : 644 - 653
  • [43] Hierarchical Abnormal-node Detection using Fuzzy Logic for ECA Rule-based Wireless Sensor Networks
    Berjab, Nesrine
    Hieu Hanh Le
    Yu, Chia-Mu
    Kuo, Sy-Yen
    Yokota, Haruo
    2018 IEEE 23RD PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC), 2018, : 289 - 298
  • [44] Applying Time-Bound Hierarchical Key Assignment in Wireless Sensor Networks
    Zhu, Wen Tao
    Deng, Robert H.
    Zhou, Jianying
    Bao, Feng
    INFORMATION AND COMMUNICATIONS SECURITY, 2011, 7043 : 306 - +
  • [45] MSCR: multidimensional secure clustered routing scheme in hierarchical wireless sensor networks
    Fang, Weidong
    Zhang, Wuxiong
    Chen, Wei
    Liu, Jin
    Ni, Yepeng
    Yang, Yinxuan
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2021, 2021 (01)
  • [46] Security Mechanisms for Wireless Sensor Networks
    Ren, Xiuli
    Yul, Haibin
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (3B): : 155 - 161
  • [47] Analysis of Security Mechanism Using Threshold Cryptography for Hierarchical Wireless Sensor Networks
    Hamsha, K.
    Nagaraja, G. S.
    2017 INTERNATIONAL CONFERENCE ON COMMUNICATION AND SIGNAL PROCESSING (ICCSP), 2017, : 1938 - 1941
  • [48] Security methods for wireless sensor networks
    Ren, Xiuli
    IEEE ICMA 2006: Proceeding of the 2006 IEEE International Conference on Mechatronics and Automation, Vols 1-3, Proceedings, 2006, : 1925 - 1930
  • [49] Secure Data Aggregation and Intrusion Detection in Wireless Sensor Networks
    Vamsi, P. Raghu
    Kant, Krishna
    2015 INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION (ICSC), 2015, : 127 - 131
  • [50] MSCR: multidimensional secure clustered routing scheme in hierarchical wireless sensor networks
    Weidong Fang
    Wuxiong Zhang
    Wei Chen
    Jin Liu
    Yepeng Ni
    Yinxuan Yang
    EURASIP Journal on Wireless Communications and Networking, 2021