Information security assessment of wireless sensor networks based on Bayesian attack graphs

被引:9
作者
Chen, You Ying [1 ]
Xu, Bing [2 ]
Long, Jun [3 ]
机构
[1] Guangdong Ocean Univ, Sch Math & Comp Sci, Zhanjiang, Guangdong, Peoples R China
[2] Guangdong Univ Petrochem Technol, Sch Comp Sci, Maoming 525000, Guangdong, Peoples R China
[3] Yulin Normal Univ, Sch Comp Sci & Engn, Yulin, Guangxi, Peoples R China
关键词
Information security; wireless sensor networks; fuzzy comprehensive evaluation; dynamic security risk assessment; Bayesian network; attack graph;
D O I
10.3233/JIFS-189711
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Network security issues have become increasingly prominent, and information security risk assessment is an important part of network security protection. Security risk assessment based on methods such as attack trees, attack graphs, neural networks, and fuzzy logic has problems such as difficulty in data collection during the assessment process, excessive reliance on expert experience, failure to consider the actual network environment, or ineffective joint application. The qualitative and quantitative information security fuzzy comprehensive evaluation method uses the theory of fuzzy mathematics to better solve the above problems, so that the evaluation method is scientific, comprehensive and operable. To improve the accuracy of information security risk assessment in wireless sensor networks, we propose a fuzzy comprehensive evaluation method based on Bayesian attack graphs. This considers the impact of environmental factors of the assessed system on security risk and the spread of the effects on the Bayesian network. Therefore, this model can reflect possible situations due to network attacks in the wireless sensor network system. The results show that this quantitative evaluation method is applicable to assessing risk in wireless sensor network systems, and the results are more objective and accurate.
引用
收藏
页码:4511 / 4517
页数:7
相关论文
共 50 条
[41]   Information flow based routing algorithms for wireless sensor networks [J].
Zhang, YL ;
Ramkumar, M ;
Memon, N .
GLOBECOM '04: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6, 2004, :742-747
[42]   Inference in Wireless Sensor Networks Based on Information Structure Optimization [J].
Zhao, Wei ;
Liang, Yao .
37TH ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2012), 2012, :551-558
[43]   Agent Based Approach to Information Fusion in Wireless Sensor Networks [J].
Sutagundar, A. V. ;
Manvi, S. S. .
2008 IEEE REGION 10 CONFERENCE: TENCON 2008, VOLS 1-4, 2008, :1441-+
[44]   An Overview of Healthcare Perspective based Security Issues in Wireless Sensor Networks [J].
Mamta ;
Prakash, Shiva .
PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, :870-875
[45]   Light Weight Security Architecture for Cluster Based Wireless Sensor Networks [J].
Kishore, R. ;
Pappa, Aswin Chidambaram ;
Varshini, Iswarya S. .
2015 IEEE INTERNATIONAL CONFERENCE ON UBIQUITOUS WIRELESS BROADBAND (ICUWB), 2015,
[46]   Trust-based security for wireless ad hoc and sensor networks [J].
Boukerch, A. ;
Xu, L. ;
El-Khatib, K. .
COMPUTER COMMUNICATIONS, 2007, 30 (11-12) :2413-2427
[47]   Towards Trust-based Security Mechanism for Wireless Sensor Networks [J].
Gao, Jianqiao ;
Pan, Julong ;
Xu, Zhanyi ;
Li, Ziyin .
2011 7TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2011,
[48]   A Method for Information Security Risk Assessment Based on the Dynamic Bayesian Network [J].
Wang, Jiao ;
Fan, Kefeng ;
Mo, Wei ;
Xu, Dongyang .
PROCEEDINGS 2016 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS NANA 2016, 2016, :279-283
[49]   Evaluation of security mechanisms in wireless sensor networks [J].
Guimaraes, G ;
Souto, E ;
Sadok, D ;
Kelner, J .
2005 SYSTEMS COMMUNICATIONS, PROCEEDINGS: ICW 2005, WIRELESS TECHNOLOGIES; ICHSN 2005, HIGH SPEED NETWORKS; ICMCS 2005, MULTIMEDIA COMMUNICATIONS SYSTEMS; SENET 2005, SENSOR NETWORKS, 2005, :428-433
[50]   Security Attacks in Wireless Sensor Networks: A Survey [J].
Patel, Manish M. ;
Aggarwal, Akshai .
2013 INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND SIGNAL PROCESSING (ISSP), 2013, :329-333