Skip to main content

On the Detectability of Weak DoS Attacks in Wireless Sensor Networks

  • Conference paper
Data Privacy Management and Autonomous Spontaneous Security (DPM 2012, SETOP 2012)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7731))

  • 1193 Accesses

Abstract

Anomaly detection can be used to detect malicious attacks in wireless sensor networks. Because of the autonomous nature of many sensor network scenarios, it is desirable to use an auto-configuring anomaly detector. To accomodate the indeterministic wireless environment, the anomaly detection must also be able to adapt to changing conditions. This work presents a dynamic learning extension for a pre-exisiting, auto-configuring anomaly detection system for WSNs. Adaptability always results in possibilities for an attacker to exploit the adapting system; however, no quantitative analysis of this has been yet performed in a WSN scenario. This paper explores the trade-off between adaptability and exploitability of the system. The paper also shows that adaptability does not guarantee better false positive error rates for all attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Dudek, D.: DoS detection with markov chains. In: 9th European Conference on Wireless Sensor Networks (EWSN), Poster and Demo Proceedings (2012)

    Google Scholar 

  2. Dudek, D.: Collaborative detection of traffic anomalies using first order markov chains. In: 2012 Ninth International Conference on Networked Sensing Systems (INSS), pp. 1–4 (June 2012)

    Google Scholar 

  3. Krontiris, I., Giannetsos, T., Dimitriou, T.: Lidea: a distributed lightweight intrusion detection architecture for sensor networks. In: Proceedings of the 4th Int. Conf. on Security and Privacy in Communication Netowrks, SecureComm 2008, 20:1–20:10. ACM, New York (2008)

    Google Scholar 

  4. Su, W.T., Chang, K.M., Kuo, Y.H.: ehip: An energy-efficient hybrid intrusion prohibition system for cluster-based wireless sensor networks. Computer Networks 51(4), 1151–1168 (2007)

    Article  MATH  Google Scholar 

  5. Dudek, D., Haas, C., Kuntz, A., Zitterbart, M., Krüger, D., Rothenpieler, P., Pfisterer, D., Fischer, S.: A wireless sensor network for border surveillance. In: Proceedings of the 7th ACM Conference on Embedded Networked Sensor Systems, SenSys 2009, pp. 303–304. ACM, New York (2009)

    Chapter  Google Scholar 

  6. Wang, R., Du, W., Ning, P.: Containing denial-of-service attacks in broadcast authentication in sensor networks. In: Proceedings of the 8th ACM Int. Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2007, pp. 71–79. ACM, New York (2007)

    Chapter  Google Scholar 

  7. Ye, N., Zhang, Y., Borror, C.: Robustness of the markov-chain model for cyber-attack detection. IEEE Transactions on Reliability 53(1), 116–123 (2004)

    Article  Google Scholar 

  8. Paschalidis, I.C., Chen, Y.: Statistical anomaly detection with sensor networks. ACM Trans. Sen. Netw. 7, 17:1–17:23 (2010)

    Google Scholar 

  9. Gao, Y., Chen, C., Bu, J., Dong, W., He, D.: Icad: Indirect correlation based anomaly detection in dynamic wsns. In: Proceedings of the Wireless Communications and Networking Conference (IEEE WCNC 2011), pp. 647–652 (March 2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Dudek, D. (2013). On the Detectability of Weak DoS Attacks in Wireless Sensor Networks. In: Di Pietro, R., Herranz, J., Damiani, E., State, R. (eds) Data Privacy Management and Autonomous Spontaneous Security. DPM SETOP 2012 2012. Lecture Notes in Computer Science, vol 7731. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35890-6_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35890-6_18

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35889-0

  • Online ISBN: 978-3-642-35890-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics