Detecting Malicious Sensor Nodes from Learned data Patterns

نویسندگان

  • Partha Mukherjee
  • Sandip Sen
چکیده

Sensor network applications may involve dealing with the remote, distributed monitoring of inaccessible and hostile locations. These networks are vulnerable to security breaches both physically and electronically. The sensor nodes, once compromised, can send erroneous data to the base station ,thereby possibly compromising network effectiveness. The sensor nodes are organized in a hierarchy where the non-leaf nodes serve as the aggregators of the data value sensed at the leaf level and the root node is considered the Base Station. In current researh on sensor networks outlier detection mechanisms are used by a parent node to detect erroneous children nodes among its children as it is assumed that the data reported by the children comes from the same distribution and they are of almost equal values. But outlier detection mechanisms are not applied for networks where sensed data varies widely over the region of deployment. So in such a scenario we have used offline neural network based learning technique to model spatial patterns in sensed data. Then the nets are used to predict the sensed data at any node given the data reported by its neighbors, when they work online. The differences between the value predicted and the corresponding one reported by the node is measured. Each node incrementally updates the reputations of its child nodes based on those calculated differences. We have used robust schemes like Q-learning and Beta reputation based approaches to detect compromised or faulty nodes. We have evaluated the robustness of our detection scheme by varying the members of compromised nodes, error types, patterns in sensed data

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Intrusion Detection in Wireless Sensor Networks using Genetic Algorithm

Wireless sensor networks, due to the characteristics of sensors such as wireless communication channels, the lack of infrastructure and targeted threats, are very vulnerable to the various attacks. Routing attacks on the networks, where a malicious node from sending data to the base station is perceived. In this article, a method that can be used to transfer the data securely to prevent attacks...

متن کامل

IMNTV-Identifying Malicious Nodes using Trust Value in Wireless Sensor Networks

Security is the major area of concern in communication channel. Security is very crucial in wireless sensor networks which are deployed in remote environments. Adversary can disrupt the communication within multi hop sensor networks by launching the attack. The common attacks which disrupt the communication of nodes are packet dropping, packet modification, packet fake routing, badmouthing atta...

متن کامل

Comparing Reputation Schemes for Detecting Malicious Nodes in Sensor Networks

Remotely deployed sensor networks are vulnerable to both physical and electronic security breaches. The sensor nodes, once compromised, can send erroneous data to the base station, thereby possibly compromising network effectiveness. We assume that sensor nodes are organized in a hierarchy and use offline neural network based learning technique to predict the data sensed at any node given the d...

متن کامل

Evaluation of Detecting Malicious Nodes Using Bayesian Model in Wireless Intrusion Detection

Wireless sensor network (WSN) is vulnerable to a wide range of attacks due to its natural environment and inherent unreliable transmission. To protect its security, intrusion detection systems (IDSs) have been widely deployed in such a wireless environment. In addition, trust-based mechanism is a promising method in detecting insider attacks (e.g., malicious nodes) in a WSN. In this paper, we t...

متن کامل

Using Learned Data Patterns to Detect Malicious Nodes in Sensor Networks

As sensor network applications often involve remote, distributed monitoring of inaccessible and hostile locations, they are vulnerable to both physical and electronic security breaches. The sensor nodes, once compromised, can send erroneous data to the base station, thereby possibly compromising network effectiveness. We consider sensor nodes organized in a hierarchy where the non-leaf nodes se...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007