Information security assessment of wireless sensor networks based on Bayesian attack graphs

被引:7
作者
Chen, You Ying [1 ]
Xu, Bing [2 ]
Long, Jun [3 ]
机构
[1] Guangdong Ocean Univ, Sch Math & Comp Sci, Zhanjiang, Guangdong, Peoples R China
[2] Guangdong Univ Petrochem Technol, Sch Comp Sci, Maoming 525000, Guangdong, Peoples R China
[3] Yulin Normal Univ, Sch Comp Sci & Engn, Yulin, Guangxi, Peoples R China
关键词
Information security; wireless sensor networks; fuzzy comprehensive evaluation; dynamic security risk assessment; Bayesian network; attack graph;
D O I
10.3233/JIFS-189711
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Network security issues have become increasingly prominent, and information security risk assessment is an important part of network security protection. Security risk assessment based on methods such as attack trees, attack graphs, neural networks, and fuzzy logic has problems such as difficulty in data collection during the assessment process, excessive reliance on expert experience, failure to consider the actual network environment, or ineffective joint application. The qualitative and quantitative information security fuzzy comprehensive evaluation method uses the theory of fuzzy mathematics to better solve the above problems, so that the evaluation method is scientific, comprehensive and operable. To improve the accuracy of information security risk assessment in wireless sensor networks, we propose a fuzzy comprehensive evaluation method based on Bayesian attack graphs. This considers the impact of environmental factors of the assessed system on security risk and the spread of the effects on the Bayesian network. Therefore, this model can reflect possible situations due to network attacks in the wireless sensor network system. The results show that this quantitative evaluation method is applicable to assessing risk in wireless sensor network systems, and the results are more objective and accurate.
引用
收藏
页码:4511 / 4517
页数:7
相关论文
共 50 条
  • [21] Research on Security of Wireless Sensor Networks
    Li, Hongli
    Sun, Huiqin
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTERNET TECHNOLOGY AND SECURITY (ITS 2010), 2010, : 109 - 114
  • [22] Security perspective of wireless sensor networks
    Gutierrez-Portela, Fernando
    Almenarez-Mendoza, Florina
    Calderon-Benavides, Liliana
    Romero-Riano, Efren
    UIS INGENIERIAS, 2021, 20 (03): : 189 - 201
  • [23] Quantum security in wireless sensor networks
    Nagy, Naya
    Nagy, Marius
    Akl, Selim G.
    NATURAL COMPUTING, 2010, 9 (04) : 819 - 830
  • [24] Security for Wireless Sensor Networks: A Review
    Healy, Michael
    Newe, Thomas
    Lewis, Elfed
    SAS 2009 - IEEE SENSORS APPLICATIONS SYMPOSIUM, PROCEEDINGS, 2009, : 80 - 85
  • [25] A group-based security scheme for wireless sensor networks
    Hamid, Md. Abdul
    Sarkar, A. M. Jehad
    ANNALS OF TELECOMMUNICATIONS, 2012, 67 (9-10) : 455 - 469
  • [26] Intrusion detection based security architecture for wireless sensor networks
    Xiao, DB
    Chen, C
    Chen, GL
    INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES 2005, VOLS 1 AND 2, PROCEEDINGS, 2005, : 1365 - 1368
  • [27] A security protocol for Wireless Sensor Networks
    Zhang, Chang N.
    Yu, Qian
    Huang, Xun
    Yang, Cungang
    WIRELESS SENSOR AND ACTOR NETWORKS II, 2008, 264 : 113 - +
  • [28] Quantum security in wireless sensor networks
    Naya Nagy
    Marius Nagy
    Selim G. Akl
    Natural Computing, 2010, 9 : 819 - 830
  • [29] THE SECURITY PROBLEM IN WIRELESS SENSOR NETWORKS
    Zhao, Xiaoye
    2012 IEEE 2nd International Conference on Cloud Computing and Intelligent Systems (CCIS) Vols 1-3, 2012, : 1079 - 1082
  • [30] SECURITY INFRASTRUCTURE FOR WIRELESS SENSOR NETWORKS
    Gheorghe, Laura
    Rughinis, Razvan
    Tapus, Nicolae
    UNIVERSITY POLITEHNICA OF BUCHAREST SCIENTIFIC BULLETIN SERIES C-ELECTRICAL ENGINEERING AND COMPUTER SCIENCE, 2011, 73 (02): : 103 - 116