Detecting unknown attacks in wireless sensor networks that contain mobile nodes

Bankovic, Zorana; Fraga Aydillo, David; Moya Fernández, José Manuel y Vallejo López, Juan Carlos (2012). Detecting unknown attacks in wireless sensor networks that contain mobile nodes. "Sensors", v. 12 (n. 8); pp. 10834-10850. ISSN 1424-8220. https://doi.org/10.3390/s120810834.

Descripción

Título: Detecting unknown attacks in wireless sensor networks that contain mobile nodes
Autor/es:
  • Bankovic, Zorana
  • Fraga Aydillo, David
  • Moya Fernández, José Manuel
  • Vallejo López, Juan Carlos
Tipo de Documento: Artículo
Título de Revista/Publicación: Sensors
Fecha: Agosto 2012
Volumen: 12
Materias:
Palabras Clave Informales: wireless sensor networks; mobility; unknown attacks; clustering algorithms; reputation systems
Escuela: E.T.S.I. Telecomunicación (UPM)
Departamento: Ingeniería Electrónica
Licencias Creative Commons: Reconocimiento - Sin obra derivada - No comercial

Texto completo

[img]
Vista Previa
PDF (Document Portable Format) - Se necesita un visor de ficheros PDF, como GSview, Xpdf o Adobe Acrobat Reader
Descargar (907kB) | Vista Previa

Resumen

As wireless sensor networks are usually deployed in unattended areas, security policies cannot be updated in a timely fashion upon identification of new attacks. This gives enough time for attackers to cause significant damage. Thus, it is of great importance to provide protection from unknown attacks. However, existing solutions are mostly concentrated on known attacks. On the other hand, mobility can make the sensor network more resilient to failures, reactive to events, and able to support disparate missions with a common set of sensors, yet the problem of security becomes more complicated. In order to address the issue of security in networks with mobile nodes, we propose a machine learning solution for anomaly detection along with the feature extraction process that tries to detect temporal and spatial inconsistencies in the sequences of sensed values and the routing paths used to forward these values to the base station. We also propose a special way to treat mobile nodes, which is the main novelty of this work. The data produced in the presence of an attacker are treated as outliers, and detected using clustering techniques. These techniques are further coupled with a reputation system, in this way isolating compromised nodes in timely fashion. The proposal exhibits good performances at detecting and confining previously unseen attacks, including the cases when mobile nodes are compromised.

Más información

ID de Registro: 16823
Identificador DC: http://oa.upm.es/16823/
Identificador OAI: oai:oa.upm.es:16823
Identificador DOI: 10.3390/s120810834
URL Oficial: http://www.mdpi.com/1424-8220/12/8/10834
Depositado por: Memoria Investigacion
Depositado el: 07 Ago 2013 15:51
Ultima Modificación: 21 Abr 2016 17:10
  • Open Access
  • Open Access
  • Sherpa-Romeo
    Compruebe si la revista anglosajona en la que ha publicado un artículo permite también su publicación en abierto.
  • Dulcinea
    Compruebe si la revista española en la que ha publicado un artículo permite también su publicación en abierto.
  • Recolecta
  • e-ciencia
  • Observatorio I+D+i UPM
  • OpenCourseWare UPM