Detecting Unknown Attacks in Wireless Sensor Networks Using Clustering Techniques

被引:0
|
作者
Bankovic, Z. [1 ]
Moya, J. M. [1 ]
Vallejo, J. C. [1 ]
Fraga, D. [1 ]
机构
[1] Univ Politecn Madrid, Dep Ingn Elect, E-28040 Madrid, Spain
关键词
wireless sensor networks; unknown attacks; clustering; reputation system; INTRUSION DETECTION SYSTEM; SECURITY;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Wireless sensor networks are usually deployed in unattended environments. This is the main reason why the update of security policies upon identifying new attacks cannot be done in a timely fashion, which gives enough time to attackers to make significant damage. Thus, it is of great importance to provide protection from unknown attacks. However, existing solutions are mostly concentrated on known attacks. In order to tackle this issue, we propose a machine learning solution for anomaly detection along with the feature extraction process that tries to detect temporal and spatial inconsistencies in the sequences of sensed values and the routing paths used to forward these values to the base station. The data produced in the presence of an attacker are treated as outliers, and detected using clustering techniques. The techniques are coupled with a reputation system, isolating in this way the compromised nodes. The proposal exhibits good performances in detecting and confining previously unseen attacks.
引用
收藏
页码:214 / 221
页数:8
相关论文
共 50 条
  • [1] Detecting Unknown Attacks in Wireless Sensor Networks That Contain Mobile Nodes
    Bankovic, Zorana
    Fraga, David
    Moya, Jose M.
    Carlos Vallejo, Juan
    SENSORS, 2012, 12 (08) : 10834 - 10850
  • [2] Localization in wireless sensor networks and wireless multimedia sensor networks using clustering techniques
    Dipak W. Wajgi
    Jitendra V. Tembhurne
    Multimedia Tools and Applications, 2024, 83 : 6829 - 6879
  • [3] Detecting wormhole attacks in wireless sensor networks
    Xu, Yurong
    Chen, Guanling
    Ford, James
    Makedon, Fillia
    CRITICAL INFRASTRUCTURE PROTE CTION, 2008, 253 : 267 - +
  • [4] Correction: Localization in wireless sensor networks and wireless multimedia sensor networks using clustering techniques
    Dipak W. Wajgi
    Jitendra V. Tembhurne
    Multimedia Tools and Applications, 2024, 83 : 6881 - 6881
  • [5] Clustering Techniques in Wireless Sensor Networks
    Naruephiphat, Wibhada
    Charnsripinyo, Chalermpol
    2009 INTERNATIONAL CONFERENCE ON NEW TRENDS IN INFORMATION AND SERVICE SCIENCE (NISS 2009), VOLS 1 AND 2, 2009, : 1273 - 1278
  • [6] Detecting Sybil attacks in Wireless Sensor Networks using neighboring information
    Ssu, Kuo-Feng
    Wang, Wei-Tong
    Chang, Wen-Chung
    COMPUTER NETWORKS, 2009, 53 (18) : 3042 - 3056
  • [7] DETECTING SYBIL ATTACKS IN WIRELESS SENSOR NETWORKS USING SEQUENTIAL ANALYSIS
    Vamsi, P. Raghu
    Kant, Krishna
    INTERNATIONAL JOURNAL ON SMART SENSING AND INTELLIGENT SYSTEMS, 2016, 9 (02): : 651 - 680
  • [8] Detecting Sybil Attacks in Wireless and Sensor Networks Using Cluster Analysis
    Yang, Jie
    Chen, Yingying
    Trappe, Wade
    2008 FIFTH IEEE INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR SYSTEMS, VOLS 1 AND 2, 2008, : 834 - +
  • [9] Optimization of Energy in Wireless Sensor Networks using Clustering Techniques
    Devi, L. Nirmala
    Rao, A. Nageswar
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMMUNICATION AND ELECTRONICS SYSTEMS (ICCES), 2016, : 188 - 191
  • [10] Detecting and preventing Sybil attacks in wireless sensor networks
    Wadii, Jlassi
    Rim, Haddad
    Ridha, Bouallegue
    2019 IEEE 19TH MEDITERRANEAN MICROWAVE SYMPOSIUM (MMS 2019), 2019,