Detecting Unknown Attacks in Wireless Sensor Networks Using Clustering Techniques

被引:0
|
作者
Bankovic, Z. [1 ]
Moya, J. M. [1 ]
Vallejo, J. C. [1 ]
Fraga, D. [1 ]
机构
[1] Univ Politecn Madrid, Dep Ingn Elect, E-28040 Madrid, Spain
关键词
wireless sensor networks; unknown attacks; clustering; reputation system; INTRUSION DETECTION SYSTEM; SECURITY;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Wireless sensor networks are usually deployed in unattended environments. This is the main reason why the update of security policies upon identifying new attacks cannot be done in a timely fashion, which gives enough time to attackers to make significant damage. Thus, it is of great importance to provide protection from unknown attacks. However, existing solutions are mostly concentrated on known attacks. In order to tackle this issue, we propose a machine learning solution for anomaly detection along with the feature extraction process that tries to detect temporal and spatial inconsistencies in the sequences of sensed values and the routing paths used to forward these values to the base station. The data produced in the presence of an attacker are treated as outliers, and detected using clustering techniques. The techniques are coupled with a reputation system, isolating in this way the compromised nodes. The proposal exhibits good performances in detecting and confining previously unseen attacks.
引用
收藏
页码:214 / 221
页数:8
相关论文
共 50 条
  • [41] Detecting wormhole attacks in wireless networks using connectivity information
    Maheshwari, Ritesh
    Gao, Jie
    Das, Samir R.
    INFOCOM 2007, VOLS 1-5, 2007, : 107 - +
  • [42] Securing Underwater Wireless Sensor Networks: A Review of Attacks and Mitigation Techniques
    Ahmed, Khawaja Masood
    Shams, Rehan
    Khan, Fozia Hanif
    Luque-Nieto, Miguel-Angel
    IEEE ACCESS, 2024, 12 : 161096 - 161133
  • [43] Beeware Routing Scheme for Detecting Network Layer Attacks in Wireless Sensor Networks
    R. S. Raghav
    Kalaipriyan Thirugnansambandam
    Dinesh Kumar Anguraj
    Wireless Personal Communications, 2020, 112 : 2439 - 2459
  • [44] SEC Approach for Detecting Node Replication Attacks in Static Wireless Sensor Networks
    Sujihelen, L.
    Jayakumar, C.
    Senthilsingh, C.
    JOURNAL OF ELECTRICAL ENGINEERING & TECHNOLOGY, 2018, 13 (06) : 2447 - 2455
  • [45] Beeware Routing Scheme for Detecting Network Layer Attacks in Wireless Sensor Networks
    Raghav, R. S.
    Thirugnansambandam, Kalaipriyan
    Anguraj, Dinesh Kumar
    WIRELESS PERSONAL COMMUNICATIONS, 2020, 112 (04) : 2439 - 2459
  • [46] Detecting Sybil Attacks in Mobile Wireless Sensor Networks Based on ID Frequency
    Cheng, Ying-ying
    Huang, He-jiao
    Du, Hong-wei
    INTERNATIONAL CONFERENCE ON COMPUTER, NETWORK SECURITY AND COMMUNICATION ENGINEERING (CNSCE 2014), 2014, : 330 - 334
  • [47] Memory Efficient Protocols for Detecting Node Replication Attacks in Wireless Sensor Networks
    Zhang, Ming
    Khanapure, Vishal
    Chen, Shigang
    Xiao, Xuelian
    2009 17TH IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP 2009), 2009, : 284 - 293
  • [48] Pattern recognition for detecting distributed node exhaustion attacks in wireless sensor networks
    Baig, Z. A.
    COMPUTER COMMUNICATIONS, 2011, 34 (03) : 468 - 484
  • [49] Hop-count monitoring: Detecting sinkhole attacks in wireless sensor networks
    Dallas, Daniel
    Leckie, Christopher
    Ramamohanarao, Kotagiri
    2007 15TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS, 2007, : 132 - 137
  • [50] Detecting denial of service attacks by analysing network traffic in wireless sensor networks
    Ragupathy, R. (cse_raghu@yahoo.com), 1600, International Hellenic University - School of Science (07):