Skip to main content

Approach to Detection of Denial-of-Sleep Attacks in Wireless Sensor Networks on the Base of Machine Learning

  • Conference paper
  • First Online:

Part of the book series: Studies in Computational Intelligence ((SCI,volume 868))

Abstract

The paper analyzes possible types of attacks in the areas of information security of cyber-physical systems and surveys available literature in the field. We address a problem of the vulnerability of Internet of Things devices in wireless networks, assuming attacks aimed at depleting energy resources. In the paper we regarded several types of traffic and conducted an analysis of normal and attacking traffic. An approach to detection of energy depletion attacks in cyber-physical systems based on machine learning methods is proposed. The feasibility of the proposed solution is confirmed by an example of the attacking traffic by using the Python language and Anaconda pack.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   279.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   279.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Desnitsky, V., Chechulin, A., Kotenko, I., Levshun, D., Kolomeec, M.: Combined design technique for secure embedded devices exemplified by a perimeter protection system. In: SPIIRAS Proceedings, no. 48, pp. 5–31 (2016)

    Article  Google Scholar 

  2. Kaur, S., Ataullah, Md, Garg, M.: Security from denial of sleep attack in wireless sensor network. Int. J. Comput. Technol. 4(2), 419–425 (2013)

    Google Scholar 

  3. Wainis, M., Kabalan, K., Dandeh, R.: Denial of sleep detection and mitigation. Latest Trends Commun. 3(2), 195–200 (2014)

    Google Scholar 

  4. Kaur, S., Ataullah, Md.: Securing wireless sensor network from denial of sleep attack by isolating nodes. Int. J. Comput. Appl. Technol. 103(1), 29–33 (2014)

    Google Scholar 

  5. Raymond, D.R.: Denial-of-Sleep Vulnerabilities and Defenses in Wireless Sensor Network MAC Protocols. Dissertation submitted to the Faculty of the Virginia Polytechnic Institute and State University in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy in Computer Engineering (2008)

    Google Scholar 

  6. Desnitsky, V.A., Kotenko, I.V., Rudavin, N.N.: Protection mechanisms against energy depletion attacks in cyber-physical systems. In: Proceedings of the 2019 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus 2019), pp. 214–219 (2019). https://doi.org/10.1109/EIConRus.2019.8656795

Download references

Acknowledgement

The work was financially supported by the Russian Foundation of Basic Research, project No. 19-07-00953.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vasily Desnitsky .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Balueva, A., Desnitsky, V., Ushakov, I. (2020). Approach to Detection of Denial-of-Sleep Attacks in Wireless Sensor Networks on the Base of Machine Learning. In: Kotenko, I., Badica, C., Desnitsky, V., El Baz, D., Ivanovic, M. (eds) Intelligent Distributed Computing XIII. IDC 2019. Studies in Computational Intelligence, vol 868. Springer, Cham. https://doi.org/10.1007/978-3-030-32258-8_41

Download citation

Publish with us

Policies and ethics