Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Outlier detection and countermeasure for hierarchical wireless sensor networks

Authors
Zhang, Y-YChao, H. -C.Chen, M.Shu, L.Park, C. -H.Park, M. -S.
Issue Date
Dec-2010
Publisher
INST ENGINEERING TECHNOLOGY-IET
Citation
IET INFORMATION SECURITY, v.4, no.4, pp.361 - 373
Indexed
SCIE
SCOPUS
Journal Title
IET INFORMATION SECURITY
Volume
4
Number
4
Start Page
361
End Page
373
URI
https://scholar.korea.ac.kr/handle/2021.sw.korea/115240
DOI
10.1049/iet-ifs.2009.0192
ISSN
1751-8709
Abstract
Outliers in wireless sensor networks (WSNs) are sensor nodes that issue attacks by abnormal behaviours and fake message dissemination. However, existing cryptographic techniques are hard to detect these inside attacks, which cause outlier recognition a critical and challenging issue for reliable and secure data dissemination in WSNs. To efficiently identify and isolate outliers, this study presents a novel outlier detection and countermeasure scheme (ODCS), which consists of three mechanisms: (i) abnormal event observation mechanism for network surveillance; (ii) exceptional message supervision mechanism for distinguishing fake messages by exploiting spatiotemporal correlation and consistency and (iii) abnormal behaviour supervision mechanism for the evaluation of node behaviour. The ODCS provides a heuristic methodology and does not need the knowledge about normal or malicious sensors in advance. This property makes the ODCS not only to distinguish and deal with various dynamic attacks automatically without advance learning, but also to reduce the requirement of capability for constrained nodes. In the ODCS, the communication is limited in a local range, such as one-hop or a cluster, which can reduce the communication frequency and circumscribe the session range further. Moreover, the ODCS provides countermeasures for different types of attacks, such as the rerouting scheme and the rekey security scheme, which can separate outliers from normal sensors and enhance the robustness of network, even when some nodes are compromised by adversary. Simulation results indicate that our approach can effectively detect and defend the outlier attack.
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Informatics > Department of Computer Science and Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE