TITLE

Detecting Unknown Attacks in Wireless Sensor Networks That Contain Mobile Nodes

AUTHOR(S)
Banković, Zorana; Fraga, David; Moya, José M.; Vallejo, Juan Carlos
PUB. DATE
August 2012
SOURCE
Sensors (14248220);2012, Vol. 12 Issue 8, p10834
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
As wireless sensor networks are usually deployed in unattended areas, security policies cannot be updated in a timely fashion upon identification of new attacks. This gives enough time for attackers to cause significant damage. Thus, it is of great importance to provide protection from unknown attacks. However, existing solutions are mostly concentrated on known attacks. On the other hand, mobility can make the sensor network more resilient to failures, reactive to events, and able to support disparate missions with a common set of sensors, yet the problem of security becomes more complicated. In order to address the issue of security in networks with mobile nodes, we propose a machine learning solution for anomaly detection along with the feature extraction process that tries to detect temporal and spatial inconsistencies in the sequences of sensed values and the routing paths used to forward these values to the base station. We also propose a special way to treat mobile nodes, which is the main novelty of this work. The data produced in the presence of an attacker are treated as outliers, and detected using clustering techniques. These techniques are further coupled with a reputation system, in this way isolating compromised nodes in timely fashion. The proposal exhibits good performances at detecting and confining previously unseen attacks, including the cases when mobile nodes are compromised.
ACCESSION #
79445208

 

Related Articles

  • Secure authentication and integrity techniques for randomized secured routing in WSN. Senthil kumaran, U.; Ilango, P. // Wireless Networks (10220038);Feb2015, Vol. 21 Issue 2, p443 

    As wireless sensor network is resource-constrained, reliability and security of broadcasted data become major issue in these types of network. In order to overcome security and integrity issues, a secure authentication and integrity technique is proposed. In this technique, shared keys are used...

  • Secure and Energy-Efficient Data Collection in Wireless Sensor Networks. Anfeng Liu; Laurence T. Yang; Motoki Sakai; Mianxiong Dong // International Journal of Distributed Sensor Networks;2013, p1 

    No abstract available.

  • A new Approach for Averting Jamming Invasion with Packet Hiding Methods. Ramabai, M.; Komalavalli, E. // International Journal of Advanced Computer Research;Dec2013, Vol. 3 Issue 13, p294 

    Wireless networks dependent on the active nodes which are reciprocally connected to uninterrupted availability of the wireless environment. Any person with a device which transmits and receives radio signals can secretly read those transmitted lines on wireless transmissions and put some bogus...

  • A Review of Secure Data Collection in WSN. Jyoti; Chillar, Anil // International Journal of Computer Science & Management Studies;Jun2014, Vol. 14 Issue 6, p12 

    There are various possible security threats that may be experienced by a wireless sensor network (WSN). Compromised-node and denial-of-service are two key attacks in wireless sensor networks (WSNs). Both of these attacks generate black holes. In this paper we study routing mechanisms that...

  • DESIGN AND VALIDATION OF SPECIFICATION BASED IDS FOR POWER ENHANCEMENT RELATED VULNERABILITIES IN AODV1. Dutta, Chaitali Biswas; Biswas, Utpal // International Journal of Network Security & Its Applications;Sep2012, Vol. 4 Issue 5, p57 

    Wireless sensor network (WSN) is basically a wireless network, comprised of a large number of sensor nodes which are densely deployed, small in size, lightweight and portable. AODV is a well known, standardized routing protocol used in WSNs. AODV is subject to several attacks like black hole,...

  • System of One to Three Umpire Security System for Wireless Mobile Ad hoc Network. Rajabhushanam, C.; Kathirvel, A. // Journal of Computer Science;2011, Vol. 7 Issue 12, p1854 

    Problem statement: A Mobile Ad Hoc Network (MANET) is a self-created self-organized and self-administering set of nodes connected via wireless links without the aid of any fixed infrastructure or centralized administrator. Protecting the network layer from malicious attacks is an important and...

  • An Intrusion Tolerance Method Based on Energy Attack for Wireless Sensor Network. Jiang, Yu; Huang, Jie // International Journal of Distributed Sensor Networks;10/5/2015, Vol. 2015, p1 

    Wireless sensor network is vulnerable to malicious attacks because of the broadcast nature of wireless signal. In order to overcome the shortcomings of existing methods, this paper presents an intrusion tolerance method against malicious nodes. Different from the traditional intrusion tolerance...

  • Trust Factor based LEACH-C protocol for Wireless Sensor Networks. V., Geetha; Chandrasekaran, K. // International Journal of Computer Applications;Nov2014, Vol. 105 Issue 1-18, p43 

    Trust in wireless sensor network is an essential feature to detect various kind of attacks in the network. Wireless sensor nodes are more prone to attacks as nodes are deployed in an open environment. In case of centralized low energy adaptive cluster head protocol cluster heads in each round...

  • A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS. Ahmed, Muhammad; Xu Huang; Hongyan Cui // International Journal of Computer Networks & Communications;Jan2013, Vol. 5 Issue 1, p97 

    Wireless sensor networks (WSNs) consists of small nodes with constrain capabilities. It enables numerous applications with distributed network infrastructure. With its nature and application scenario, security of WSN had drawn a great attention. In malicious environments for a functional WSN,...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics