A Hierarchical Security Framework for Defending Against Sophisticated Attacks on Wireless Sensor Networks in Smart Cities

被引:92
作者
Wu, Jun [1 ]
Ota, Kaoru [2 ]
Dong, Mianxiong [2 ]
Li, Chunxiao [3 ]
机构
[1] Shanghai Jiao Tong Univ, Sch Elect Informat & Elect Engn, Shanghai 200240, Peoples R China
[2] Muroran Inst Technol, Dept Informat & Elect Engn, Muroran, Hokkaido 0508585, Japan
[3] Yangzhou Univ, Sch Informat Engn, Yangzhou 225009, Jiangsu, Peoples R China
基金
中国国家自然科学基金; 日本学术振兴会;
关键词
Smart city; wireless sensor networks (WSNs); chance discovery; attack detection; software defined networking; ACCESS-CONTROL;
D O I
10.1109/ACCESS.2016.2517321
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In smart cities, wireless sensor networks (WSNs) act as a type of core infrastructure that collects data from the city to implement smart services. The security of WSNs is one of the key issues of smart cities. In resource-restrained WSNs, dynamic ongoing or unknown attacks usually steer clear of isolated defense components. Therefore, to resolve this problem, we propose a hierarchical framework based on chance discovery and usage control (UCON) technologies to improve the security of WSNs while still taking the low-complexity and high security requirements of WSNs into account. The features of continuous decision and dynamic attributes in UCON can address ongoing attacks using advanced persistent threat detection. In addition, we use a dynamic adaptive chance discovery mechanism to detect unknown attacks. To design and implement a system using the mechanism described above, a unified framework is proposed in which low-level attack detection with simple rules is performed in sensors, and high-level attack detection with complex rules is performed in sinks and at the base station. Moreover, software-defined networking and network function virtualization technologies are used to perform attack mitigation when either low-level or high-level attacks are detected. An experiment was performed to acquire an attack data set for evaluation. Then, a simulation was created to evaluate the resource consumption and attack detection rate. The results demonstrate the feasibility and efficiency of the proposed scheme.
引用
收藏
页码:416 / 424
页数:9
相关论文
共 33 条
[1]   Distributed Detection in Mobile Access Wireless Sensor Networks under Byzantine Attacks [J].
Abdelhakim, Mai ;
Lightfoot, Leonard E. ;
Ren, Jian ;
Li, Tongtong .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (04) :950-959
[2]   Understanding the real behavior of Mote and 802.11 ad hoc networks: an experimental approach [J].
Anastasi, Giuseppe ;
Borgia, Eleonora ;
Conti, Marco ;
Gregori, Enrico ;
Passarella, Andrea .
PERVASIVE AND MOBILE COMPUTING, 2005, 1 (02) :237-256
[3]  
[Anonymous], P WORKSH WORLD SENS
[4]  
[Anonymous], ACM T INF SYST SECUR
[5]  
[Anonymous], 1999, 80211 IEEE WG 11
[6]  
[Anonymous], P INT MULTICONF ENG
[7]  
[Anonymous], 2010, P 2010 IEEE 72 VEH T
[8]  
[Anonymous], 1996, 101813 ISOIEC, P10181
[9]   The final nail in WEP's coffin [J].
Bittau, Andrea ;
Handley, Mark ;
Lackey, Joshua .
2006 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2006, :386-+
[10]   A Game Theoretical Framework on Intrusion Detection in Heterogeneous Networks [J].
Chen, Lin ;
Leneutre, Jean .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2009, 4 (02) :165-178