Detecting Unknown Attacks in Wireless Sensor Networks Using Clustering Techniques

被引:0
|
作者
Bankovic, Z. [1 ]
Moya, J. M. [1 ]
Vallejo, J. C. [1 ]
Fraga, D. [1 ]
机构
[1] Univ Politecn Madrid, Dep Ingn Elect, E-28040 Madrid, Spain
关键词
wireless sensor networks; unknown attacks; clustering; reputation system; INTRUSION DETECTION SYSTEM; SECURITY;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Wireless sensor networks are usually deployed in unattended environments. This is the main reason why the update of security policies upon identifying new attacks cannot be done in a timely fashion, which gives enough time to attackers to make significant damage. Thus, it is of great importance to provide protection from unknown attacks. However, existing solutions are mostly concentrated on known attacks. In order to tackle this issue, we propose a machine learning solution for anomaly detection along with the feature extraction process that tries to detect temporal and spatial inconsistencies in the sequences of sensed values and the routing paths used to forward these values to the base station. The data produced in the presence of an attacker are treated as outliers, and detected using clustering techniques. The techniques are coupled with a reputation system, isolating in this way the compromised nodes. The proposal exhibits good performances in detecting and confining previously unseen attacks.
引用
收藏
页码:214 / 221
页数:8
相关论文
共 50 条
  • [21] Detecting Location-Based Attacks in Wireless Sensor Networks Using Sequential Analysis
    Potukuchi, Raghu Vamsi
    Kant, Krishna
    IETE JOURNAL OF RESEARCH, 2015, 61 (05) : 541 - 551
  • [22] Sensor wars: Detecting and defending against spam attacks in wireless sensor networks
    Sancak, S
    Cayirci, E
    Coskun, V
    Levi, A
    2004 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-7, 2004, : 3668 - 3672
  • [23] Novel Clustering Techniques in Wireless Sensor Networks - A Survey
    Priya, T. C. Swetha
    Sridevi, R.
    INTERNATIONAL JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING SYSTEMS, 2023, 14 (07) : 733 - 742
  • [24] Optimization of Clustering in Wireless Sensor Networks: Techniques and Protocols
    Jubair, Ahmed Mahdi
    Hassan, Rosilah
    Aman, Azana Hafizah Mohd
    Sallehudin, Hasimi
    Al-Mekhlafi, Zeyad Ghaleb
    Mohammed, Badiea Abdulkarem
    Alsaffar, Mohammad Salih
    APPLIED SCIENCES-BASEL, 2021, 11 (23):
  • [25] Detecting node compromise in hybrid wireless sensor networks using attestation techniques
    Krauss, Christoph
    Stumpf, Frederic
    Eckert, Claudia
    SECURITY AND PRIVACY IN AD-HOC AND SENSOR NETWORKS, 2007, 4572 : 203 - +
  • [26] Review of the Techniques Against the Wormhole Attacks on Wireless Sensor Networks
    Farjamnia, Ghasem
    Gasimov, Yusif
    Kazimov, Cavanshir
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 105 (04) : 1561 - 1584
  • [27] Review of the Techniques Against the Wormhole Attacks on Wireless Sensor Networks
    Ghasem Farjamnia
    Yusif Gasimov
    Cavanshir Kazimov
    Wireless Personal Communications, 2019, 105 : 1561 - 1584
  • [28] Classification techniques for sensor data and clustering architecture for wireless sensor networks
    Akojwar, Sudhir G.
    Patrikar, Rajendra. M.
    IMECS 2007: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2007, : 1246 - +
  • [29] Dynamic Solution for Detecting Denial of Service Attacks in Wireless Sensor Networks
    Guechari, Malek
    Mokdad, Lynda
    Tan, Sovanna
    2012 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2012,
  • [30] A Machine Learning Approach for Detecting Spoofing Attacks in Wireless Sensor Networks
    de Lima Pinto, Eliel Marlon
    Lachowski, Rosana
    Pellenz, Marcelo E.
    Penna, Manoel C.
    Souza, Richard D.
    PROCEEDINGS 2018 IEEE 32ND INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2018, : 752 - 758