Skip to main content

Detecting Unknown Attacks in Wireless Sensor Networks Using Clustering Techniques

  • Conference paper
Hybrid Artificial Intelligent Systems (HAIS 2011)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 6678))

Included in the following conference series:

  • 1824 Accesses

Abstract

Wireless sensor networks are usually deployed in unattended environments. This is the main reason why the update of security policies upon identifying new attacks cannot be done in a timely fashion, which gives enough time to attackers to make significant damage. Thus, it is of great importance to provide protection from unknown attacks. However, existing solutions are mostly concentrated on known attacks. In order to tackle this issue, we propose a machine learning solution for anomaly detection along with the feature extraction process that tries to detect temporal and spatial inconsistencies in the sequences of sensed values and the routing paths used to forward these values to the base station. The data produced in the presence of an attacker are treated as outliers, and detected using clustering techniques. The techniques are coupled with a reputation system, isolating in this way the compromised nodes. The proposal exhibits good performances in detecting and confining previously unseen attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Corral, G., Armengol, E., Fornells, A., Golobardes, E.: Explanations of unsupervised learning clustering applied to data security analysis. Neurocomputing 72(13-15), 2754–2762 (2009)

    Article  Google Scholar 

  2. Herrero, A., Corchado, E., Pellicer, M.A., Abraham, A.: MOVIH-IDS: A mobile-visualization hybrid intrusion detection system. Neurocomputing 72(13-15), 2775–2784 (2009)

    Article  Google Scholar 

  3. Krontiris, I., Giannetsos, T., Dimitriou, T.: LIDeA: A Distributed Lightweight Intrusion Detection Architecture for Sensor Networks. In: 4th International Conference on Security and Privacy for Communication Networks. ACM, New York (2008)

    Google Scholar 

  4. Hai, T.H., Khan, F., Huh, E.-n.: Hybrid Intrusion Detection System for Wireless Sensor Networks. In: Gervasi, O., Gavrilova, M.L. (eds.) ICCSA 2007, Part II. LNCS, vol. 4706, pp. 383–396. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  5. Onat, I., Miri, A.: A Real-Time Node-Based Traffic Anomaly Detection Algorithm for Wireless Sensor Networks. In: Systems Communications, pp. 422–427. IEEE Press, Los Alamitos (2005)

    Google Scholar 

  6. Wallenta, C., Kim, J., Bentley, P.J., Hailes, S.: Detecting Interest Cache Poisoning in Sensor Networks using an Artificial Immune Algorithm. Appl. Intell. 32, 1–26 (2010)

    Article  Google Scholar 

  7. Kaplantzis, S., Shilton, A., Mani, N., Sekercioglu, Y.A.: Detecting Selective Forwarding Attacks in WSNs using Support Vector Machines. In: Int. Sensors, Sensor Networks and Inf. Proc. Conf., pp. 335–340. IEEE Press, Los Alamitos (2007)

    Google Scholar 

  8. Loo, C.E., Ng, M.Y., Leckie, C., Palaniswami, M.: Intrusion Detection for Routing Attacks in Sensor Networks. Int. J. of Dist. Sens. Net. 2(4), 313–332 (2006)

    Article  Google Scholar 

  9. Moya, J.M., Araujo, A., Bankovic, Z., de Goyeneche, J.M., Vallejo, J.C., Malagon, P., Villanueva, D., Fraga, D., Romero, E., Blesa, J.: Improving Security for SCADA Sensor Networks with Reputation Systems and SOMs. Sensors 9, 9380–9397 (2009)

    Article  Google Scholar 

  10. Banković, Z., Moya, J.M., Araujo, A., Fraga, D., Vallejo, J.C., de Goyeneche, J.M.: Distributed Intrusion Detection System for WSNs based on a Reputation System coupled with Kernel Self-Organizing Maps. Int. Comp. Aided Design 17(2), 87–102 (2010)

    Google Scholar 

  11. Rieck, K., Laskov, P.: Linear Time Computation of Similarity for Sequential Data. J. Mach. Learn. Res. 9, 23–48 (2008)

    MATH  Google Scholar 

  12. Muñoz, A., Muruzábal, J.: Self-Organizing Maps for Outlier Detection. Neurocomputing 18(1-3), 33–60 (1998)

    Article  Google Scholar 

  13. Roosta, T.G.: Attacks and Defenses on Ubiquitous Sensor Networks, Ph. D. Dissertation, University of California at Berkeley (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Banković, Z., Moya, J.M., Vallejo, J.C., Fraga, D. (2011). Detecting Unknown Attacks in Wireless Sensor Networks Using Clustering Techniques. In: Corchado, E., Kurzyński, M., Woźniak, M. (eds) Hybrid Artificial Intelligent Systems. HAIS 2011. Lecture Notes in Computer Science(), vol 6678. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-21219-2_28

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-21219-2_28

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-21218-5

  • Online ISBN: 978-3-642-21219-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics