Cargando…

Two-Hop Monitoring Mechanism Based on Relaxed Flow Conservation Constraints against Selective Routing Attacks in Wireless Sensor Networks

In this paper, we investigate the problem of selective routing attack in wireless sensor networks by considering a novel threat, named the upstream-node effect, which limits the accuracy of the monitoring functions in deciding whether a monitored node is legitimate or malicious. To address this limi...

Descripción completa

Detalles Bibliográficos
Autores principales: Derhab, Abdelouahid, Bouras, Abdelghani, Belaoued, Mohamed, Maglaras, Leandros, Khan, Farrukh Aslam
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2020
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7662264/
https://www.ncbi.nlm.nih.gov/pubmed/33121033
http://dx.doi.org/10.3390/s20216106
_version_ 1783609359562964992
author Derhab, Abdelouahid
Bouras, Abdelghani
Belaoued, Mohamed
Maglaras, Leandros
Khan, Farrukh Aslam
author_facet Derhab, Abdelouahid
Bouras, Abdelghani
Belaoued, Mohamed
Maglaras, Leandros
Khan, Farrukh Aslam
author_sort Derhab, Abdelouahid
collection PubMed
description In this paper, we investigate the problem of selective routing attack in wireless sensor networks by considering a novel threat, named the upstream-node effect, which limits the accuracy of the monitoring functions in deciding whether a monitored node is legitimate or malicious. To address this limitation, we propose a one-dimensional one-class classifier, named relaxed flow conservation constraint, as an intrusion detection scheme to counter the upstream node attack. Each node uses four types of relaxed flow conservation constraints to monitor all of its neighbors. Three constraints are applied by using one-hop knowledge, and the fourth one is calculated by monitoring two-hop information. The latter is obtained by proposing two-hop energy-efficient and secure reporting scheme. We theoretically analyze the security and performance of the proposed intrusion detection method. We also show the superiority of relaxed flow conservation constraint in defending against upstream node attack compared to other schemes. The simulation results show that the proposed intrusion detection system achieves good results in terms of detection effectiveness.
format Online
Article
Text
id pubmed-7662264
institution National Center for Biotechnology Information
language English
publishDate 2020
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-76622642020-11-14 Two-Hop Monitoring Mechanism Based on Relaxed Flow Conservation Constraints against Selective Routing Attacks in Wireless Sensor Networks Derhab, Abdelouahid Bouras, Abdelghani Belaoued, Mohamed Maglaras, Leandros Khan, Farrukh Aslam Sensors (Basel) Article In this paper, we investigate the problem of selective routing attack in wireless sensor networks by considering a novel threat, named the upstream-node effect, which limits the accuracy of the monitoring functions in deciding whether a monitored node is legitimate or malicious. To address this limitation, we propose a one-dimensional one-class classifier, named relaxed flow conservation constraint, as an intrusion detection scheme to counter the upstream node attack. Each node uses four types of relaxed flow conservation constraints to monitor all of its neighbors. Three constraints are applied by using one-hop knowledge, and the fourth one is calculated by monitoring two-hop information. The latter is obtained by proposing two-hop energy-efficient and secure reporting scheme. We theoretically analyze the security and performance of the proposed intrusion detection method. We also show the superiority of relaxed flow conservation constraint in defending against upstream node attack compared to other schemes. The simulation results show that the proposed intrusion detection system achieves good results in terms of detection effectiveness. MDPI 2020-10-27 /pmc/articles/PMC7662264/ /pubmed/33121033 http://dx.doi.org/10.3390/s20216106 Text en © 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Derhab, Abdelouahid
Bouras, Abdelghani
Belaoued, Mohamed
Maglaras, Leandros
Khan, Farrukh Aslam
Two-Hop Monitoring Mechanism Based on Relaxed Flow Conservation Constraints against Selective Routing Attacks in Wireless Sensor Networks
title Two-Hop Monitoring Mechanism Based on Relaxed Flow Conservation Constraints against Selective Routing Attacks in Wireless Sensor Networks
title_full Two-Hop Monitoring Mechanism Based on Relaxed Flow Conservation Constraints against Selective Routing Attacks in Wireless Sensor Networks
title_fullStr Two-Hop Monitoring Mechanism Based on Relaxed Flow Conservation Constraints against Selective Routing Attacks in Wireless Sensor Networks
title_full_unstemmed Two-Hop Monitoring Mechanism Based on Relaxed Flow Conservation Constraints against Selective Routing Attacks in Wireless Sensor Networks
title_short Two-Hop Monitoring Mechanism Based on Relaxed Flow Conservation Constraints against Selective Routing Attacks in Wireless Sensor Networks
title_sort two-hop monitoring mechanism based on relaxed flow conservation constraints against selective routing attacks in wireless sensor networks
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7662264/
https://www.ncbi.nlm.nih.gov/pubmed/33121033
http://dx.doi.org/10.3390/s20216106
work_keys_str_mv AT derhababdelouahid twohopmonitoringmechanismbasedonrelaxedflowconservationconstraintsagainstselectiveroutingattacksinwirelesssensornetworks
AT bourasabdelghani twohopmonitoringmechanismbasedonrelaxedflowconservationconstraintsagainstselectiveroutingattacksinwirelesssensornetworks
AT belaouedmohamed twohopmonitoringmechanismbasedonrelaxedflowconservationconstraintsagainstselectiveroutingattacksinwirelesssensornetworks
AT maglarasleandros twohopmonitoringmechanismbasedonrelaxedflowconservationconstraintsagainstselectiveroutingattacksinwirelesssensornetworks
AT khanfarrukhaslam twohopmonitoringmechanismbasedonrelaxedflowconservationconstraintsagainstselectiveroutingattacksinwirelesssensornetworks