Detecting Unknown Attacks in Wireless Sensor Networks Using Clustering Techniques
Wireless sensor networks are usually deployed in unattended environments. This is the main reason why the update of security policies upon identifying new attacks cannot be done in a timely fashion, which gives enough time to attackers to make significant damage. Thus, it is of great importance to provide protection from unknown attacks. However, existing solutions are mostly concentrated on known attacks. In order to tackle this issue, we propose a machine learning solution for anomaly detection along with the feature extraction process that tries to detect temporal and spatial inconsistencies in the sequences of sensed values and the routing paths used to forward these values to the base station. The data produced in the presence of an attacker are treated as outliers, and detected using clustering techniques. The techniques are coupled with a reputation system, isolating in this way the compromised nodes. The proposal exhibits good performances in detecting and confining previously unseen attacks.
Keywordswireless sensor networks unknown attacks clustering reputation system
Unable to display preview. Download preview PDF.
- 3.Krontiris, I., Giannetsos, T., Dimitriou, T.: LIDeA: A Distributed Lightweight Intrusion Detection Architecture for Sensor Networks. In: 4th International Conference on Security and Privacy for Communication Networks. ACM, New York (2008)Google Scholar
- 5.Onat, I., Miri, A.: A Real-Time Node-Based Traffic Anomaly Detection Algorithm for Wireless Sensor Networks. In: Systems Communications, pp. 422–427. IEEE Press, Los Alamitos (2005)Google Scholar
- 7.Kaplantzis, S., Shilton, A., Mani, N., Sekercioglu, Y.A.: Detecting Selective Forwarding Attacks in WSNs using Support Vector Machines. In: Int. Sensors, Sensor Networks and Inf. Proc. Conf., pp. 335–340. IEEE Press, Los Alamitos (2007)Google Scholar
- 10.Banković, Z., Moya, J.M., Araujo, A., Fraga, D., Vallejo, J.C., de Goyeneche, J.M.: Distributed Intrusion Detection System for WSNs based on a Reputation System coupled with Kernel Self-Organizing Maps. Int. Comp. Aided Design 17(2), 87–102 (2010)Google Scholar
- 13.Roosta, T.G.: Attacks and Defenses on Ubiquitous Sensor Networks, Ph. D. Dissertation, University of California at Berkeley (2008)Google Scholar