Information security assessment of wireless sensor networks based on Bayesian attack graphs

被引:7
作者
Chen, You Ying [1 ]
Xu, Bing [2 ]
Long, Jun [3 ]
机构
[1] Guangdong Ocean Univ, Sch Math & Comp Sci, Zhanjiang, Guangdong, Peoples R China
[2] Guangdong Univ Petrochem Technol, Sch Comp Sci, Maoming 525000, Guangdong, Peoples R China
[3] Yulin Normal Univ, Sch Comp Sci & Engn, Yulin, Guangxi, Peoples R China
关键词
Information security; wireless sensor networks; fuzzy comprehensive evaluation; dynamic security risk assessment; Bayesian network; attack graph;
D O I
10.3233/JIFS-189711
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Network security issues have become increasingly prominent, and information security risk assessment is an important part of network security protection. Security risk assessment based on methods such as attack trees, attack graphs, neural networks, and fuzzy logic has problems such as difficulty in data collection during the assessment process, excessive reliance on expert experience, failure to consider the actual network environment, or ineffective joint application. The qualitative and quantitative information security fuzzy comprehensive evaluation method uses the theory of fuzzy mathematics to better solve the above problems, so that the evaluation method is scientific, comprehensive and operable. To improve the accuracy of information security risk assessment in wireless sensor networks, we propose a fuzzy comprehensive evaluation method based on Bayesian attack graphs. This considers the impact of environmental factors of the assessed system on security risk and the spread of the effects on the Bayesian network. Therefore, this model can reflect possible situations due to network attacks in the wireless sensor network system. The results show that this quantitative evaluation method is applicable to assessing risk in wireless sensor network systems, and the results are more objective and accurate.
引用
收藏
页码:4511 / 4517
页数:7
相关论文
共 50 条
[31]   Security Mechanisms for Wireless Sensor Networks [J].
Ren, Xiuli ;
Yul, Haibin .
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (3B) :155-161
[32]   Security methods for wireless sensor networks [J].
Ren, Xiuli .
IEEE ICMA 2006: Proceeding of the 2006 IEEE International Conference on Mechatronics and Automation, Vols 1-3, Proceedings, 2006, :1925-1930
[33]   Sinkhole attack detection based on redundancy mechanism in wireless sensor networks [J].
Zhang, Fang-Jiao ;
Zhai, Li-Dong ;
Yang, Jin-Cui ;
Cui, Xiang .
2ND INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND QUANTITATIVE MANAGEMENT, ITQM 2014, 2014, 31 :711-720
[34]   Detection of Sinkhole Attack in Wireless Sensor Networks [J].
Salehi, Ahmad S. ;
Razzaque, M. A. ;
Naraei, Parisa ;
Farrokhtala, Ali .
2013 IEEE INTERNATIONAL CONFERENCE ON SPACE SCIENCE AND COMMUNICATION (ICONSPACE), 2013, :361-365
[35]   Localization for Jamming Attack in Wireless Sensor Networks [J].
Zhang, Jing ;
Xu, Li ;
Shen, Qun ;
Ji, Xiaorong .
INTELLIGENT DATA ANALYSIS AND APPLICATIONS, 2015, 370 :361-369
[36]   A Low-Energy Security Algorithm for Exchanging Information in Wireless Sensor Networks [J].
Al-Rousan, Mohammad ;
Rjoub, A. ;
Baset, Ahmad .
JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2009, 4 (01) :48-59
[37]   Implementation of security policy for clinical information systems over wireless sensor networks [J].
Misic, Jelena ;
Misic, Vojislav B. .
AD HOC NETWORKS, 2007, 5 (01) :134-144
[38]   On extracting consistent graphs in wireless sensor networks [J].
Jadliwala, Murtuza ;
Duan, Qi ;
Xu, Jinhui ;
Upadhyaya, Shambhu .
International Journal of Sensor Networks, 2007, 2 (3-4) :149-162
[39]   Deterministic deployment based on information coverage in wireless sensor networks [J].
Zheng, Jianying ;
Huang, Yan ;
Wang, Yiming ;
Xiao, Yang .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2014, 14 (18) :1657-1671
[40]   Information flow based routing algorithms for wireless sensor networks [J].
Zhang, YL ;
Ramkumar, M ;
Memon, N .
GLOBECOM '04: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6, 2004, :742-747