Detecting Unknown Attacks in Wireless Sensor Networks Using Clustering Techniques

被引:0
|
作者
Bankovic, Z. [1 ]
Moya, J. M. [1 ]
Vallejo, J. C. [1 ]
Fraga, D. [1 ]
机构
[1] Univ Politecn Madrid, Dep Ingn Elect, E-28040 Madrid, Spain
关键词
wireless sensor networks; unknown attacks; clustering; reputation system; INTRUSION DETECTION SYSTEM; SECURITY;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Wireless sensor networks are usually deployed in unattended environments. This is the main reason why the update of security policies upon identifying new attacks cannot be done in a timely fashion, which gives enough time to attackers to make significant damage. Thus, it is of great importance to provide protection from unknown attacks. However, existing solutions are mostly concentrated on known attacks. In order to tackle this issue, we propose a machine learning solution for anomaly detection along with the feature extraction process that tries to detect temporal and spatial inconsistencies in the sequences of sensed values and the routing paths used to forward these values to the base station. The data produced in the presence of an attacker are treated as outliers, and detected using clustering techniques. The techniques are coupled with a reputation system, isolating in this way the compromised nodes. The proposal exhibits good performances in detecting and confining previously unseen attacks.
引用
收藏
页码:214 / 221
页数:8
相关论文
共 50 条
  • [31] AN ONLINE ENSEMBLE LEARNING MODEL FOR DETECTING ATTACKS IN WIRELESS SENSOR NETWORKS
    Tabbaa, Hiba
    Ifzarne, Samir
    Hafidi, Imad
    COMPUTING AND INFORMATICS, 2023, 42 (04) : 1013 - 1036
  • [32] Mechanisms for Detecting and Preventing Denial of Sleep Attacks on Wireless Sensor Networks
    Manju, V. C.
    Lekha, Senthil S. L.
    Kumar, Sasi M.
    2013 IEEE CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES (ICT 2013), 2013, : 74 - 77
  • [33] Centralized Routing Protocol for Detecting Wormhole Attacks in Wireless Sensor Networks
    Ahutu, Ohida Rufai
    El-Ocla, Hosam
    IEEE ACCESS, 2020, 8 (08): : 63270 - 63282
  • [34] Detecting and Localizing Identity-Based Attacks in Wireless and Sensor Networks
    Chen, Yingying
    Yang, Jie
    Trappe, Wade
    Martin, Richard P.
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2010, 59 (05) : 2418 - 2434
  • [35] Clustering-based Mitigation of Anonymity Attacks in Wireless Sensor Networks
    Alsemairi, Sami
    Younis, Mohamed
    2015 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2015,
  • [36] Detecting Sybil attacks in wireless sensor networks using UWB ranging-based information
    Sarigiannidis, Panagiotis
    Karapistoli, Eirini
    Economides, Anastasios A.
    EXPERT SYSTEMS WITH APPLICATIONS, 2015, 42 (21) : 7560 - 7572
  • [37] Distributed Clustering Using Wireless Sensor Networks
    Forero, Pedro A.
    Cano, Alfonso
    Giannakis, Georgios B.
    IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING, 2011, 5 (04) : 707 - 724
  • [38] ENERGY EFFICIENT CLUSTERING TECHNIQUES IN HETEROGENEOUS WIRELESS SENSOR NETWORKS
    Muhklif, Mohammed M.
    Ismail, Mahamod
    Altahrawi, Mohammed A.
    Mansor, Mohd Fais
    AbuFoul, Mohammed K.
    2018 IEEE 4TH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATION TECHNOLOGIES (ISTT), 2018,
  • [39] A Survey on Mobility Driven Clustering Techniques for Wireless Sensor Networks
    Jadhav, Ashay
    Sirsikar, Sumedha
    INTERNATIONAL CONFERENCE ON INTELLIGENT DATA COMMUNICATION TECHNOLOGIES AND INTERNET OF THINGS, ICICI 2018, 2019, 26 : 1521 - 1528
  • [40] Objective detecting model based on self-organization clustering using wireless sensor networks
    Jin, Xiangyang
    Liu, Yixiang
    Yu, Guangbin
    Sun, Lixin
    Zhendong Ceshi Yu Zhenduan/Journal of Vibration, Measurement and Diagnosis, 2006, 26 (SUPPL.): : 38 - 41