Detecting Malicious Sensor Nodes from Learned data Patterns
نویسندگان
چکیده
Sensor network applications may involve dealing with the remote, distributed monitoring of inaccessible and hostile locations. These networks are vulnerable to security breaches both physically and electronically. The sensor nodes, once compromised, can send erroneous data to the base station ,thereby possibly compromising network effectiveness. The sensor nodes are organized in a hierarchy where the non-leaf nodes serve as the aggregators of the data value sensed at the leaf level and the root node is considered the Base Station. In current researh on sensor networks outlier detection mechanisms are used by a parent node to detect erroneous children nodes among its children as it is assumed that the data reported by the children comes from the same distribution and they are of almost equal values. But outlier detection mechanisms are not applied for networks where sensed data varies widely over the region of deployment. So in such a scenario we have used offline neural network based learning technique to model spatial patterns in sensed data. Then the nets are used to predict the sensed data at any node given the data reported by its neighbors, when they work online. The differences between the value predicted and the corresponding one reported by the node is measured. Each node incrementally updates the reputations of its child nodes based on those calculated differences. We have used robust schemes like Q-learning and Beta reputation based approaches to detect compromised or faulty nodes. We have evaluated the robustness of our detection scheme by varying the members of compromised nodes, error types, patterns in sensed data
منابع مشابه
Intrusion Detection in Wireless Sensor Networks using Genetic Algorithm
Wireless sensor networks, due to the characteristics of sensors such as wireless communication channels, the lack of infrastructure and targeted threats, are very vulnerable to the various attacks. Routing attacks on the networks, where a malicious node from sending data to the base station is perceived. In this article, a method that can be used to transfer the data securely to prevent attacks...
متن کاملIMNTV-Identifying Malicious Nodes using Trust Value in Wireless Sensor Networks
Security is the major area of concern in communication channel. Security is very crucial in wireless sensor networks which are deployed in remote environments. Adversary can disrupt the communication within multi hop sensor networks by launching the attack. The common attacks which disrupt the communication of nodes are packet dropping, packet modification, packet fake routing, badmouthing atta...
متن کاملComparing Reputation Schemes for Detecting Malicious Nodes in Sensor Networks
Remotely deployed sensor networks are vulnerable to both physical and electronic security breaches. The sensor nodes, once compromised, can send erroneous data to the base station, thereby possibly compromising network effectiveness. We assume that sensor nodes are organized in a hierarchy and use offline neural network based learning technique to predict the data sensed at any node given the d...
متن کاملEvaluation of Detecting Malicious Nodes Using Bayesian Model in Wireless Intrusion Detection
Wireless sensor network (WSN) is vulnerable to a wide range of attacks due to its natural environment and inherent unreliable transmission. To protect its security, intrusion detection systems (IDSs) have been widely deployed in such a wireless environment. In addition, trust-based mechanism is a promising method in detecting insider attacks (e.g., malicious nodes) in a WSN. In this paper, we t...
متن کاملUsing Learned Data Patterns to Detect Malicious Nodes in Sensor Networks
As sensor network applications often involve remote, distributed monitoring of inaccessible and hostile locations, they are vulnerable to both physical and electronic security breaches. The sensor nodes, once compromised, can send erroneous data to the base station, thereby possibly compromising network effectiveness. We consider sensor nodes organized in a hierarchy where the non-leaf nodes se...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007