Cargando…

Detecting Unknown Attacks in Wireless Sensor Networks That Contain Mobile Nodes

As wireless sensor networks are usually deployed in unattended areas, security policies cannot be updated in a timely fashion upon identification of new attacks. This gives enough time for attackers to cause significant damage. Thus, it is of great importance to provide protection from unknown attac...

Descripción completa

Detalles Bibliográficos
Autores principales: Banković, Zorana, Fraga, David, Moya, José M., Vallejo, Juan Carlos
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Molecular Diversity Preservation International (MDPI) 2012
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3472860/
https://www.ncbi.nlm.nih.gov/pubmed/23112632
http://dx.doi.org/10.3390/s120810834
_version_ 1782246676214317056
author Banković, Zorana
Fraga, David
Moya, José M.
Vallejo, Juan Carlos
author_facet Banković, Zorana
Fraga, David
Moya, José M.
Vallejo, Juan Carlos
author_sort Banković, Zorana
collection PubMed
description As wireless sensor networks are usually deployed in unattended areas, security policies cannot be updated in a timely fashion upon identification of new attacks. This gives enough time for attackers to cause significant damage. Thus, it is of great importance to provide protection from unknown attacks. However, existing solutions are mostly concentrated on known attacks. On the other hand, mobility can make the sensor network more resilient to failures, reactive to events, and able to support disparate missions with a common set of sensors, yet the problem of security becomes more complicated. In order to address the issue of security in networks with mobile nodes, we propose a machine learning solution for anomaly detection along with the feature extraction process that tries to detect temporal and spatial inconsistencies in the sequences of sensed values and the routing paths used to forward these values to the base station. We also propose a special way to treat mobile nodes, which is the main novelty of this work. The data produced in the presence of an attacker are treated as outliers, and detected using clustering techniques. These techniques are further coupled with a reputation system, in this way isolating compromised nodes in timely fashion. The proposal exhibits good performances at detecting and confining previously unseen attacks, including the cases when mobile nodes are compromised.
format Online
Article
Text
id pubmed-3472860
institution National Center for Biotechnology Information
language English
publishDate 2012
publisher Molecular Diversity Preservation International (MDPI)
record_format MEDLINE/PubMed
spelling pubmed-34728602012-10-30 Detecting Unknown Attacks in Wireless Sensor Networks That Contain Mobile Nodes Banković, Zorana Fraga, David Moya, José M. Vallejo, Juan Carlos Sensors (Basel) Article As wireless sensor networks are usually deployed in unattended areas, security policies cannot be updated in a timely fashion upon identification of new attacks. This gives enough time for attackers to cause significant damage. Thus, it is of great importance to provide protection from unknown attacks. However, existing solutions are mostly concentrated on known attacks. On the other hand, mobility can make the sensor network more resilient to failures, reactive to events, and able to support disparate missions with a common set of sensors, yet the problem of security becomes more complicated. In order to address the issue of security in networks with mobile nodes, we propose a machine learning solution for anomaly detection along with the feature extraction process that tries to detect temporal and spatial inconsistencies in the sequences of sensed values and the routing paths used to forward these values to the base station. We also propose a special way to treat mobile nodes, which is the main novelty of this work. The data produced in the presence of an attacker are treated as outliers, and detected using clustering techniques. These techniques are further coupled with a reputation system, in this way isolating compromised nodes in timely fashion. The proposal exhibits good performances at detecting and confining previously unseen attacks, including the cases when mobile nodes are compromised. Molecular Diversity Preservation International (MDPI) 2012-08-07 /pmc/articles/PMC3472860/ /pubmed/23112632 http://dx.doi.org/10.3390/s120810834 Text en © 2012 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/3.0/).
spellingShingle Article
Banković, Zorana
Fraga, David
Moya, José M.
Vallejo, Juan Carlos
Detecting Unknown Attacks in Wireless Sensor Networks That Contain Mobile Nodes
title Detecting Unknown Attacks in Wireless Sensor Networks That Contain Mobile Nodes
title_full Detecting Unknown Attacks in Wireless Sensor Networks That Contain Mobile Nodes
title_fullStr Detecting Unknown Attacks in Wireless Sensor Networks That Contain Mobile Nodes
title_full_unstemmed Detecting Unknown Attacks in Wireless Sensor Networks That Contain Mobile Nodes
title_short Detecting Unknown Attacks in Wireless Sensor Networks That Contain Mobile Nodes
title_sort detecting unknown attacks in wireless sensor networks that contain mobile nodes
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3472860/
https://www.ncbi.nlm.nih.gov/pubmed/23112632
http://dx.doi.org/10.3390/s120810834
work_keys_str_mv AT bankoviczorana detectingunknownattacksinwirelesssensornetworksthatcontainmobilenodes
AT fragadavid detectingunknownattacksinwirelesssensornetworksthatcontainmobilenodes
AT moyajosem detectingunknownattacksinwirelesssensornetworksthatcontainmobilenodes
AT vallejojuancarlos detectingunknownattacksinwirelesssensornetworksthatcontainmobilenodes