skip to main content
10.1145/1866423.1866426acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Eliminating routing protocol anomalies in wireless sensor networks using AI techniques

Published: 08 October 2010 Publication History

Abstract

The specific nature of routing in sensor networks has made possible new sorts of attacks that can have closer insight and effect on the networks packets, the most important being the packet tampering. Routing attacks on the network level are the first step in tampering with the packets. In this work we propose a solution for detecting and eliminating these attacks that couples reputation systems with clustering techniques, namely unsupervised genetic algorithm and self-organizing maps, trained for detecting outliers in data. The algorithms use the feature space based on sequences of routing hops that provides ability of detecting wide range of attacks. We further present a flexible way of integrating the solution into targeted sensor network that can easily adapt its computational requirements to the existing network resources. The solution offers many benefits: scalable solution, fast response to adversarial activities, ability to detect unknown attacks, high adaptability, flexible integration, and high ability in detecting and confining attacks.

References

[1]
}}Moya, J. M.; Araujo, A.; Bankovic, Z.; de Goyeneche, J. M.; Vallejo, J. C.; Malagon, P.; Villanueva, D.; Fraga, D.; Romero, E.; Blesa, J. Improving Security for SCADA Sensor Networks with Reputation Systems and Self-Organizing Maps. Sensors 2009, 9, 9380--9397.
[2]
}}Roosta, T. G. Attacks and Defenses on Ubiquitous Sensor Networks, Ph. D. Dissertation, University of California at Berkeley, 2008
[3]
}}Rieck, K.; Laskov, P. Linear Time Computation of Similarity for Sequential Data. J. Mach. Learn. Res. 2008, 9, 23--48.
[4]
}}Karlof, C.; Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Networks 1(2--3): 293--315 (2003)
[5]
}}Vogt, H.: Exploring Message Authentication in Sensor Networks. In Proc. of European Workshop on Security of Ad Hoc and Sensor Networks (ESAS), LNCS 3313, 2005, pp. 19--30
[6]
}}Wood, A. D.; Fang, L.; Stankovic, J. A; He, T.: SIGF: a family of configurable, secure routing protocols for wireless sensor networks. In Proc. of the Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks SASN 2006: 35--48
[7]
}}Deng, J.; Han, R.; Mishra, S.: INSENS: Intrusion-tolerant routing for wireless sensor networks. Comp. Comm. 29(2): 216--230 (2006).
[8]
}}Hartung, C.; Balasalle, J.; Han, R.: Node compromise in sensor networks: the need for secure systems. Technical report CUCS-990-05. University of Colorado; January 2005.
[9]
}}Bar El, H. Introduction to Side Channel Attacks. White Paper, Discretix Technologies Ltd., 2003.
[10]
}}Kazi, A, W.; Xu, J.; Widak, K. Secure Routing in Wireless Sensor Neworks. Stony Brook University, Final Report, 2009
[11]
}}Xu, Y.; Wu, X.; Teng, D. : Secure Routing in WSNs and VANETs: Security Improved Geographic Routing and Implicit Geographic Routing, http://web2.uwindsor.ca/courses/cs/aggarwal/cs60564/Survey/564_Wu_Xu_Teng_Survey.doc.
[12]
}}Tanachaiwiwat, S.; Dave, P.; Bhindwale, R.; Helmy, A.: Poster abstract secure locations: routing on trust and isolating compromised sensors in location aware sensor networks. In Proc. of the 1st int. Conf. on Embedded networked sensor systems, pp. 324--325. ACM Press, 2003.
[13]
}}Banković, Z.; Moya, J. M.; Araujo, A.; Fraga, D.; Vallejo, J. C.; de Goyeneche, J. M. Distributed Intrusion Detection System for Wireless Sensor Networks based on a Reputation System coupled with Kernel Self-Organizing Maps. To be published in: Int. Comp. Aided Design
[14]
}}Banković, Z.; Moya, J. M.; Araujo, A.; de Goyeneche, J. M.: Intrusion Detection in Sensor Networks Using Clustering and Immune Systems. IDEAL 2009, LNCS 5788, pp.408--415
[15]
}}Muñoz, A.; Muruzábal. J. Self-Organizing Maps for Outlier Detection. Neurocomputing 18(1-3), 1998, 33--60

Cited By

View all
  • (2023)Artificial Intelligence in Mobile and Modern Wireless NetworksAI and Its Convergence With Communication Technologies10.4018/978-1-6684-7702-1.ch003(43-96)Online publication date: 25-Aug-2023
  • (2018)BackgroundMobile Agent-Based Anomaly Detection and Verification System for Smart Home Sensor Networks10.1007/978-981-10-7467-7_2(9-43)Online publication date: 2-Feb-2018
  • (2014)Anomaly Detection in Wireless Sensor NetworksSecurity for Multihop Wireless Networks10.1201/b16754-14(273-304)Online publication date: 25-Mar-2014
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
AISec '10: Proceedings of the 3rd ACM workshop on Artificial intelligence and security
October 2010
78 pages
ISBN:9781450300889
DOI:10.1145/1866423
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 08 October 2010

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. outlier detection
  2. reputation system
  3. routing protocols
  4. wireless sensor networks

Qualifiers

  • Research-article

Conference

CCS '10
Sponsor:

Acceptance Rates

AISec '10 Paper Acceptance Rate 10 of 15 submissions, 67%;
Overall Acceptance Rate 94 of 231 submissions, 41%

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2023)Artificial Intelligence in Mobile and Modern Wireless NetworksAI and Its Convergence With Communication Technologies10.4018/978-1-6684-7702-1.ch003(43-96)Online publication date: 25-Aug-2023
  • (2018)BackgroundMobile Agent-Based Anomaly Detection and Verification System for Smart Home Sensor Networks10.1007/978-981-10-7467-7_2(9-43)Online publication date: 2-Feb-2018
  • (2014)Anomaly Detection in Wireless Sensor NetworksSecurity for Multihop Wireless Networks10.1201/b16754-14(273-304)Online publication date: 25-Mar-2014
  • (2012)Protecting the WSN zones of a critical infrastructure via enhanced SIEM technologyProceedings of the 2012 international conference on Computer Safety, Reliability, and Security10.1007/978-3-642-33675-1_20(222-234)Online publication date: 25-Sep-2012
  • (2011)Improving Social Odometry Robot Networks with Distributed Reputation Systems for Collaborative PurposesSensors10.3390/s11121137211:12(11372-11389)Online publication date: 30-Nov-2011
  • (2011)Holistic Solution for Confining Insider Attacks in Wireless Sensor Networks Using Reputation Systems Coupled with Clustering TechniquesProceedings of the 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications10.1109/TrustCom.2011.12(61-72)Online publication date: 16-Nov-2011

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media