Information security assessment of wireless sensor networks based on Bayesian attack graphs

被引:9
作者
Chen, You Ying [1 ]
Xu, Bing [2 ]
Long, Jun [3 ]
机构
[1] Guangdong Ocean Univ, Sch Math & Comp Sci, Zhanjiang, Guangdong, Peoples R China
[2] Guangdong Univ Petrochem Technol, Sch Comp Sci, Maoming 525000, Guangdong, Peoples R China
[3] Yulin Normal Univ, Sch Comp Sci & Engn, Yulin, Guangxi, Peoples R China
关键词
Information security; wireless sensor networks; fuzzy comprehensive evaluation; dynamic security risk assessment; Bayesian network; attack graph;
D O I
10.3233/JIFS-189711
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Network security issues have become increasingly prominent, and information security risk assessment is an important part of network security protection. Security risk assessment based on methods such as attack trees, attack graphs, neural networks, and fuzzy logic has problems such as difficulty in data collection during the assessment process, excessive reliance on expert experience, failure to consider the actual network environment, or ineffective joint application. The qualitative and quantitative information security fuzzy comprehensive evaluation method uses the theory of fuzzy mathematics to better solve the above problems, so that the evaluation method is scientific, comprehensive and operable. To improve the accuracy of information security risk assessment in wireless sensor networks, we propose a fuzzy comprehensive evaluation method based on Bayesian attack graphs. This considers the impact of environmental factors of the assessed system on security risk and the spread of the effects on the Bayesian network. Therefore, this model can reflect possible situations due to network attacks in the wireless sensor network system. The results show that this quantitative evaluation method is applicable to assessing risk in wireless sensor network systems, and the results are more objective and accurate.
引用
收藏
页码:4511 / 4517
页数:7
相关论文
共 50 条
[21]   Security perspective of wireless sensor networks [J].
Gutierrez-Portela, Fernando ;
Almenarez-Mendoza, Florina ;
Calderon-Benavides, Liliana ;
Romero-Riano, Efren .
UIS INGENIERIAS, 2021, 20 (03) :189-201
[22]   Quantum security in wireless sensor networks [J].
Nagy, Naya ;
Nagy, Marius ;
Akl, Selim G. .
NATURAL COMPUTING, 2010, 9 (04) :819-830
[23]   Security for Wireless Sensor Networks: A Review [J].
Healy, Michael ;
Newe, Thomas ;
Lewis, Elfed .
SAS 2009 - IEEE SENSORS APPLICATIONS SYMPOSIUM, PROCEEDINGS, 2009, :80-85
[24]   Research on Security of Wireless Sensor Networks [J].
Li, Hongli ;
Sun, Huiqin .
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTERNET TECHNOLOGY AND SECURITY (ITS 2010), 2010, :109-114
[25]   A security protocol for Wireless Sensor Networks [J].
Zhang, Chang N. ;
Yu, Qian ;
Huang, Xun ;
Yang, Cungang .
WIRELESS SENSOR AND ACTOR NETWORKS II, 2008, 264 :113-+
[26]   Quantum security in wireless sensor networks [J].
Naya Nagy ;
Marius Nagy ;
Selim G. Akl .
Natural Computing, 2010, 9 :819-830
[27]   THE SECURITY PROBLEM IN WIRELESS SENSOR NETWORKS [J].
Zhao, Xiaoye .
2012 IEEE 2nd International Conference on Cloud Computing and Intelligent Systems (CCIS) Vols 1-3, 2012, :1079-1082
[28]   Security Mechanisms for Wireless Sensor Networks [J].
Ren, Xiuli ;
Yul, Haibin .
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (3B) :155-161
[29]   SECURITY INFRASTRUCTURE FOR WIRELESS SENSOR NETWORKS [J].
Gheorghe, Laura ;
Rughinis, Razvan ;
Tapus, Nicolae .
UNIVERSITY POLITEHNICA OF BUCHAREST SCIENTIFIC BULLETIN SERIES C-ELECTRICAL ENGINEERING AND COMPUTER SCIENCE, 2011, 73 (02) :103-116
[30]   A group-based security scheme for wireless sensor networks [J].
Md. Abdul Hamid ;
A. M. Jehad Sarkar .
annals of telecommunications - annales des télécommunications, 2012, 67 :455-469