TECHNIQUE OF ATTACK DETECTION IN SELF-ORGANIZING DECENTRALIZED WIRELESS SENSOR NETWORKS

Author:

Meleshko Alexey1,Desnitsky Vasily1

Affiliation:

1. Saint-Petersburg Federal Research Center of the Russian Academy of Sciences

Abstract

The work is devoted to the development of an attack model and a technique for detecting attacks in self-organizing decentralized wireless sensor networks. The proposed model describes possible types of attacks and their characteristics, taking into account the properties of self-organization and decentralization. The methodology is focused on the protection of wireless sensor networks deployed on the ground, used for emergency response, and describes the stages of the process of building and configuring an attack detection mechanism based on data collection algorithms in wireless sensor networks and the use of machine learning methods. The analysis of possible types of data that need to be collected at the nodes of wireless sensor networks to detect attacks is carried out. The distinctive features of the proposed technique include the sets of features used that characterize specific types of attacking influences and allow detecting attacks with high values of the detection quality indicator. On the fragment of the hardware-software prototype of wireless sensor networks used in the work with an attack detection mechanism built into it, an experiment was conducted to check the quality of attack detection, confirming the correctness of the proposed technique.

Publisher

St. Petersburg University of the State Fire Service of EMERCOM of Russia

Reference25 articles.

1. Grover J., Sharma S. Security issues in wireless sensor network – a review // 5th International Conference on Reliability. Infocom Technologies and Optimization (ICRITO), 2016. P. 397–404., Grover J., Sharma S. Security issues in wireless sensor network – a review // 5th International Conference on Reliability. Infocom Technologies and Optimization (ICRITO), 2016. P. 397–404.

2. Rehman Au., Rehman S.U., Raheem H. Sinkhole attacks in wireless sensor networks: a survey // Wireless Personal Communications. 2019. № 106. P. 2291–2313. DOI: 10.1007/s11277-018-6040-7., Rehman Au., Rehman S.U., Raheem H. Sinkhole attacks in wireless sensor networks: a survey // Wireless Personal Communications. 2019. № 106. P. 2291–2313. DOI: 10.1007/s11277-018-6040-7.

3. Ahutu O.R., El-Ocla H. Centralized routing protocol for detecting wormhole attacks in wireless sensor networks // IEEE Access. 2020. Vol. 8. P. 63270–63282. DOI: 10.1109/ACCESS.2020.2983438., Ahutu O.R., El-Ocla H. Centralized routing protocol for detecting wormhole attacks in wireless sensor networks // IEEE Access. 2020. Vol. 8. P. 63270–63282. DOI: 10.1109/ACCESS.2020.2983438.

4. Ghugar U., Pradhan J. Survey of wormhole attack in wireless sensor networks // Computer Science and Information Technologies. 2021. Vol. 2. № 1. P. 33–42. DOI: 10.11591/csit.v2i1.p33-42., Ghugar U., Pradhan J. Survey of wormhole attack in wireless sensor networks // Computer Science and Information Technologies. 2021. Vol. 2. № 1. P. 33–42. DOI: 10.11591/csit.v2i1.p33-42.

5. Шахов В.В., Юргенсон А.Н., Соколова О.Д. Моделирование воздействия атаки Black Hole на беспроводные сенсорные сети // Программные продукты и системы. 2017. Т. 30. № 1. С. 34–39. DOI: 10.15827/0236-235X.030.1.034-039., Shahov V.V., Yurgenson A.N., Sokolova O.D. Modelirovanie vozdeystviya ataki Black Hole na besprovodnye sensornye seti // Programmnye produkty i sistemy. 2017. T. 30. № 1. S. 34–39. DOI: 10.15827/0236-235X.030.1.034-039.

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3