A Hybrid Threat Detection and Security Adaptation System for Industrial Wireless Sensor Networks

作者: Alexis Olivereau , Aymen Boudguiga , Mohammed Bahria

DOI: 10.1007/978-3-642-54140-7_15

关键词: The InternetWireless sensor networkAdaptation (computer science)Security information and event managementComputer networkResilience (organizational)Cloud computing securityComputer scienceComputer security

摘要: Wireless Sensor Networks (WSNs) led the way to new forms of communications, which extend today Internet paradigm unforeseen boundaries. The legacy industry, however, is slower adopt this technology, mainly for security reasons. Self-managed systems allowing a quicker detection and better resilience attacks, may counterbalance reluctance. We propose in paper hybrid threat adaptation system, designed run on top industrial WSNs. explain why system suitable architectures composed constrained or sleeping devices, while being able achieve fair level autonomous security.

参考文章(12)
Jianqing Ma, Shiyong Zhang, Yiping Zhong, Xiaowen Tong, SAID: a self-adaptive intrusion detection system in wireless sensor networks workshop on information security applications. pp. 60- 73 ,(2006) , 10.1007/978-3-540-71093-6_5
Marc Lacoste, Gilles Privat, Fano Ramparany, Evaluating confidence in context for context-aware security ambient intelligence. pp. 211- 229 ,(2007) , 10.1007/978-3-540-76652-0_13
A.S. Wander, N. Gura, H. Eberle, V. Gupta, Sheueling Chang Shantz, Energy analysis of public-key cryptography for wireless sensor networks ieee international conference on pervasive computing and communications. pp. 324- 328 ,(2005) , 10.1109/PERCOM.2005.18
A V Taddeo, L Micconi, A Ferrante, Gradual adaptation of security for sensor networks 2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM). pp. 1- 9 ,(2010) , 10.1109/WOWMOM.2010.5534903
Meng-Yen Hsieh, Yueh-Min Huang, Han-Chieh Chao, Adaptive security design with malicious node detection in cluster-based sensor networks Computer Communications. ,vol. 30, pp. 2385- 2400 ,(2007) , 10.1016/J.COMCOM.2007.04.008
Yi-an Huang, Wenke Lee, A cooperative intrusion detection system for ad hoc networks Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks - SASN '03. pp. 135- 147 ,(2003) , 10.1145/986858.986877
Hervé Debar, Yohann Thomas, Frédéric Cuppens, Nora Cuppens-Boulahia, Enabling automated threat response through the use of a dynamic security policy Journal in Computer Virology. ,vol. 3, pp. 195- 210 ,(2007) , 10.1007/S11416-007-0039-Z
Mohamed Younis, Nick Krajewski, Osama Farrag, Adaptive security provision for increased energy efficiency in Wireless Sensor Networks local computer networks. pp. 999- 1005 ,(2009) , 10.1109/LCN.2009.5355022
R. Roman, Jianying Zhou, J. Lopez, Applying intrusion detection systems to wireless sensor networks consumer communications and networking conference. ,vol. 1, pp. 640- 644 ,(2006) , 10.1109/CCNC.2006.1593102