Outlier detection and countermeasure for hierarchical wireless sensor networks

Y. Y. Zhang, H. C. Chao, M. Chen, L. Shu, C. H. Park, Myong Soon Park

Research output: Contribution to journalArticle

24 Citations (Scopus)

Abstract

Outliers in wireless sensor networks (WSNs) are sensor nodes that issue attacks by abnormal behaviours and fake message dissemination. However, existing cryptographic techniques are hard to detect these inside attacks, which cause outlier recognition a critical and challenging issue for reliable and secure data dissemination in WSNs. To efficiently identify and isolate outliers, this study presents a novel outlier detection and countermeasure scheme (ODCS), which consists of three mechanisms: (i) abnormal event observation mechanism for network surveillance; (ii) exceptional message supervision mechanism for distinguishing fake messages by exploiting spatiotemporal correlation and consistency and (iii) abnormal behaviour supervision mechanism for the evaluation of node behaviour. The ODCS provides a heuristic methodology and does not need the knowledge about normal or malicious sensors in advance. This property makes the ODCS not only to distinguish and deal with various dynamic attacks automatically without advance learning, but also to reduce the requirement of capability for constrained nodes. In the ODCS, the communication is limited in a local range, such as one-hop or a cluster, which can reduce the communication frequency and circumscribe the session range further. Moreover, the ODCS provides countermeasures for different types of attacks, such as the rerouting scheme and the rekey security scheme, which can separate outliers from normal sensors and enhance the robustness of network, even when some nodes are compromised by adversary. Simulation results indicate that our approach can effectively detect and defend the outlier attack.

Original languageEnglish
Pages (from-to)361-373
Number of pages13
JournalIET Information Security
Volume4
Issue number4
DOIs
Publication statusPublished - 2010 Dec 1

Fingerprint

Wireless sensor networks
Communication
Sensors
Sensor nodes

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Information Systems
  • Software

Cite this

Outlier detection and countermeasure for hierarchical wireless sensor networks. / Zhang, Y. Y.; Chao, H. C.; Chen, M.; Shu, L.; Park, C. H.; Park, Myong Soon.

In: IET Information Security, Vol. 4, No. 4, 01.12.2010, p. 361-373.

Research output: Contribution to journalArticle

Zhang, Y. Y. ; Chao, H. C. ; Chen, M. ; Shu, L. ; Park, C. H. ; Park, Myong Soon. / Outlier detection and countermeasure for hierarchical wireless sensor networks. In: IET Information Security. 2010 ; Vol. 4, No. 4. pp. 361-373.
@article{82409b1e6e9f443d8ace50b317c0de3c,
title = "Outlier detection and countermeasure for hierarchical wireless sensor networks",
abstract = "Outliers in wireless sensor networks (WSNs) are sensor nodes that issue attacks by abnormal behaviours and fake message dissemination. However, existing cryptographic techniques are hard to detect these inside attacks, which cause outlier recognition a critical and challenging issue for reliable and secure data dissemination in WSNs. To efficiently identify and isolate outliers, this study presents a novel outlier detection and countermeasure scheme (ODCS), which consists of three mechanisms: (i) abnormal event observation mechanism for network surveillance; (ii) exceptional message supervision mechanism for distinguishing fake messages by exploiting spatiotemporal correlation and consistency and (iii) abnormal behaviour supervision mechanism for the evaluation of node behaviour. The ODCS provides a heuristic methodology and does not need the knowledge about normal or malicious sensors in advance. This property makes the ODCS not only to distinguish and deal with various dynamic attacks automatically without advance learning, but also to reduce the requirement of capability for constrained nodes. In the ODCS, the communication is limited in a local range, such as one-hop or a cluster, which can reduce the communication frequency and circumscribe the session range further. Moreover, the ODCS provides countermeasures for different types of attacks, such as the rerouting scheme and the rekey security scheme, which can separate outliers from normal sensors and enhance the robustness of network, even when some nodes are compromised by adversary. Simulation results indicate that our approach can effectively detect and defend the outlier attack.",
author = "Zhang, {Y. Y.} and Chao, {H. C.} and M. Chen and L. Shu and Park, {C. H.} and Park, {Myong Soon}",
year = "2010",
month = "12",
day = "1",
doi = "10.1049/iet-ifs.2009.0192",
language = "English",
volume = "4",
pages = "361--373",
journal = "IET Information Security",
issn = "1751-8709",
publisher = "Institution of Engineering and Technology",
number = "4",

}

TY - JOUR

T1 - Outlier detection and countermeasure for hierarchical wireless sensor networks

AU - Zhang, Y. Y.

AU - Chao, H. C.

AU - Chen, M.

AU - Shu, L.

AU - Park, C. H.

AU - Park, Myong Soon

PY - 2010/12/1

Y1 - 2010/12/1

N2 - Outliers in wireless sensor networks (WSNs) are sensor nodes that issue attacks by abnormal behaviours and fake message dissemination. However, existing cryptographic techniques are hard to detect these inside attacks, which cause outlier recognition a critical and challenging issue for reliable and secure data dissemination in WSNs. To efficiently identify and isolate outliers, this study presents a novel outlier detection and countermeasure scheme (ODCS), which consists of three mechanisms: (i) abnormal event observation mechanism for network surveillance; (ii) exceptional message supervision mechanism for distinguishing fake messages by exploiting spatiotemporal correlation and consistency and (iii) abnormal behaviour supervision mechanism for the evaluation of node behaviour. The ODCS provides a heuristic methodology and does not need the knowledge about normal or malicious sensors in advance. This property makes the ODCS not only to distinguish and deal with various dynamic attacks automatically without advance learning, but also to reduce the requirement of capability for constrained nodes. In the ODCS, the communication is limited in a local range, such as one-hop or a cluster, which can reduce the communication frequency and circumscribe the session range further. Moreover, the ODCS provides countermeasures for different types of attacks, such as the rerouting scheme and the rekey security scheme, which can separate outliers from normal sensors and enhance the robustness of network, even when some nodes are compromised by adversary. Simulation results indicate that our approach can effectively detect and defend the outlier attack.

AB - Outliers in wireless sensor networks (WSNs) are sensor nodes that issue attacks by abnormal behaviours and fake message dissemination. However, existing cryptographic techniques are hard to detect these inside attacks, which cause outlier recognition a critical and challenging issue for reliable and secure data dissemination in WSNs. To efficiently identify and isolate outliers, this study presents a novel outlier detection and countermeasure scheme (ODCS), which consists of three mechanisms: (i) abnormal event observation mechanism for network surveillance; (ii) exceptional message supervision mechanism for distinguishing fake messages by exploiting spatiotemporal correlation and consistency and (iii) abnormal behaviour supervision mechanism for the evaluation of node behaviour. The ODCS provides a heuristic methodology and does not need the knowledge about normal or malicious sensors in advance. This property makes the ODCS not only to distinguish and deal with various dynamic attacks automatically without advance learning, but also to reduce the requirement of capability for constrained nodes. In the ODCS, the communication is limited in a local range, such as one-hop or a cluster, which can reduce the communication frequency and circumscribe the session range further. Moreover, the ODCS provides countermeasures for different types of attacks, such as the rerouting scheme and the rekey security scheme, which can separate outliers from normal sensors and enhance the robustness of network, even when some nodes are compromised by adversary. Simulation results indicate that our approach can effectively detect and defend the outlier attack.

UR - http://www.scopus.com/inward/record.url?scp=78650330275&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=78650330275&partnerID=8YFLogxK

U2 - 10.1049/iet-ifs.2009.0192

DO - 10.1049/iet-ifs.2009.0192

M3 - Article

AN - SCOPUS:78650330275

VL - 4

SP - 361

EP - 373

JO - IET Information Security

JF - IET Information Security

SN - 1751-8709

IS - 4

ER -