Detecting Malicious Data Injections in Event Detection Wireless Sensor Networks

作者: Vittorio P. Illiano , Emil C. Lupu

DOI: 10.1109/TNSM.2015.2448656

关键词: Computer scienceEvent (computing)Computer networkApplication ContextData modelingWireless sensor networkNoise (video)

摘要: Wireless sensor networks (WSNs) are vulnerable and can be maliciously compromised, either physically or remotely, with potentially devastating effects. When used to detect the occurrence of events such as fires, intruders, heart attacks, malicious data injected create fake events, thus trigger an undesired response, mask actual events. We propose a novel algorithm identify injections build measurement estimates that resistant several compromised sensors even when they collude in attack. also methodology apply this different application contexts evaluate its results on three datasets drawn from distinct WSN deployments. This leads us tradeoffs design algorithms how influenced by context.

参考文章(45)
Daniel T Larose, Daniel T Larose, Data Mining Methods and Models ,(2006)
Christopher M. Bishop, Pattern Recognition and Machine Learning ,(2006)
Saurabh Ganeriwal, Mani B. Srivastava, Reputation-based framework for high integrity sensor networks security of ad hoc and sensor networks. pp. 66- 77 ,(2004) , 10.1145/1029102.1029115
Sutharshan Rajasegarar, James C. Bezdek, Christopher Leckie, Marimuthu Palaniswami, Elliptical anomalies in wireless sensor networks ACM Transactions on Sensor Networks. ,vol. 6, pp. 7- ,(2010) , 10.1145/1653760.1653767
Osman Salem, Yaning Liu, Ahmed Mehaoua, Raouf Boutaba, Online Anomaly Detection in Wireless Body Area Networks for Reliable Healthcare Monitoring IEEE Journal of Biomedical and Health Informatics. ,vol. 18, pp. 1541- 1551 ,(2014) , 10.1109/JBHI.2014.2312214
Mohsen Rezvani, Aleksandar Ignjatovic, Elisa Bertino, Sanjay Jha, A robust iterative filtering technique for wireless sensor networks in the presence of malicious attacks international conference on embedded networked sensor systems. pp. 30- ,(2013) , 10.1145/2517351.2517394
Wenliang Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney, Jonathan Katz, Aram Khalili, A pairwise key predistribution scheme for wireless sensor networks ACM Transactions on Information and System Security. ,vol. 8, pp. 228- 258 ,(2005) , 10.1145/1065545.1065548
Geoff Werner-Allen, Konrad Lorincz, Jeff Johnson, Jonathan Lees, Matt Welsh, None, Fidelity and yield in a volcano monitoring sensor network operating systems design and implementation. pp. 381- 396 ,(2006) , 10.5555/1298455.1298491