DOI QR코드

DOI QR Code

Bayesian Rules Based Optimal Defense Strategies for Clustered WSNs

  • Zhou, Weiwei (Zhengzhou Institute of Information Science and Technology) ;
  • Yu, Bin (Zhengzhou Institute of Information Science and Technology)
  • Received : 2017.08.16
  • Accepted : 2018.05.25
  • Published : 2018.12.31

Abstract

Considering the topology of hierarchical tree structure, each cluster in WSNs is faced with various attacks launched by malicious nodes, which include network eavesdropping, channel interference and data tampering. The existing intrusion detection algorithm does not take into consideration the resource constraints of cluster heads and sensor nodes. Due to application requirements, sensor nodes in WSNs are deployed with approximately uncorrelated security weights. In our study, a novel and versatile intrusion detection system (IDS) for the optimal defense strategy is primarily introduced. Given the flexibility that wireless communication provides, it is unreasonable to expect malicious nodes will demonstrate a fixed behavior over time. Instead, malicious nodes can dynamically update the attack strategy in response to the IDS in each game stage. Thus, a multi-stage intrusion detection game (MIDG) based on Bayesian rules is proposed. In order to formulate the solution of MIDG, an in-depth analysis on the Bayesian equilibrium is performed iteratively. Depending on the MIDG theoretical analysis, the optimal behaviors of rational attackers and defenders are derived and calculated accurately. The numerical experimental results validate the effectiveness and robustness of the proposed scheme.

Keywords

References

  1. Y. Xue, X. M. Chang, S. M. Zhong and Y. Zhuang,"An efficient energy hole alleviating algorithm for wireless sensor networks," IEEE Transactions on Consumer Electronics, vol. 60, no. 3, pp. 347-355, Aug. 2014. https://doi.org/10.1109/TCE.2014.6937317
  2. J. Ren, Y. X. Zhang, K. Zhang and X. M. Shen,"Lifetime and energy-hole evolution analysis in data-gathering wireless sensor networks," IEEE Transactions on industrial informatics, vol. 12, no. 2, pp. 788-800, Jan. 2015. https://doi.org/10.1109/TII.2015.2411231
  3. S. Misra and P. D. Thomasinous, "A simple least-time and energy-efficient routing protocol with one-level data aggregation for wireless sensor networks," The Journal of Systems and Software, vol. 83, no. 5, pp. 852-860, May. 2010. https://doi.org/10.1016/j.jss.2009.12.021
  4. J. H. Ho, H. C. Shih, B. Y. Liao and S. C. Chu, "A ladder diffusion algorithm using ant colony optimization for wireless sensor networks," Information Sciences, vol. 192, no. 6, pp. 204-212, Jun. 2012. https://doi.org/10.1016/j.ins.2011.03.013
  5. A. Proano, L. Lazos and M. Krunz, "Traffic decorrelation techniques for countering a global eavesdropper in WSNs," IEEE Transactions on Mobile Computing, vol. 38, no. 7, pp. 1-14, Jan. 2016.
  6. J. Wu, K. Ota and M. Dong, "A hierarchical security framework for defending against sophisticated attacks on wireless sensor networks in smart cities," IEEE Access, vol. 4, no. 4, pp. 416-424, Jan. 2016. https://doi.org/10.1109/ACCESS.2016.2517321
  7. L. Cheng, C. D. Wu and Y. Z. Zhang, "Indoor robot localization based on wireless sensor networks," IEEE Transactions on Consumer Electronics, vol. 57, no. 3, pp. 1099-1104, Aug. 2011. https://doi.org/10.1109/TCE.2011.6018861
  8. O. M. Vazquez, Y. Shmaliy and M. O. Ibarra, "Distributed unbiased FIR filtering with average consensus on measurements for WSNs," IEEE Transactions on Industrial Informatics, vol. 15, no. 6, pp. 1-8, Jan. 2017.
  9. M. K. Watfa, H. Al-Hassanieh and S. Salmen, "A novel solution to the energy hole problem in sensor networks," Journal of Network and Computer Applications, vol. 36, no. 2, pp. 949-958, Mar. 2013. https://doi.org/10.1016/j.jnca.2012.07.011
  10. I. Butun, S. D. Morgera and R. Sankar, "A survey of intrusion detection systems in wireless sensor networks," IEEE Communications Surveys and Tutorials, vol. 16, no. 1, pp. 266-282, Jan. 2014. https://doi.org/10.1109/SURV.2013.050113.00191
  11. K. Lin, T. Xu and J. Song, "Node scheduling for all-directional intrusion detection in SDR-based 3D WSNs," IEEE Sensors Journal, vol. 16, no. 20, pp. 7332-7341, Jan. 2016. https://doi.org/10.1109/JSEN.2016.2558043
  12. Z. M. Cheng, "A differential game between intrusion detection system and attackers for wireless sensor networks," Wireless Personal Communications, vol. 90, no. 3, pp. 1211-1219, Jun. 2016. https://doi.org/10.1007/s11277-016-3386-6
  13. E. Y. Vasserman and N. Hopper, "Vampire attacks: Draining life from wireless Ad Hoc sensor networks," IEEE Transactions on Mobile Computing, vol. 12, no. 2, pp. 318-332, Feb. 2013. https://doi.org/10.1109/TMC.2011.274
  14. L. Guo, J. Wu, Z. Xia and J. Li, "Proposed security mechanism for XMPP-based communications of ISO/IEC/IEEE 21451 sensor networks," IEEE Sensors Journal, vol. 15, no. 5, pp. 2577-2586, Mar. 2015. https://doi.org/10.1109/JSEN.2014.2373388
  15. S. Han, M. Xie and H. H. Chen, "Intrusion detection in cyber-physical systems: Techniques and challenges," IEEE Systems Journal, vol. 8, no. 4, pp. 1052-1062, Nov. 2014. https://doi.org/10.1109/JSYST.2013.2257594
  16. C. Kolias, V. Kolias and G. Kambourakis, "TermID: A distributed swarm intelligence-based approach for wireless intrusion detection," International Journal of Information Security, no. 6, pp. 1-16, Jun. 2016.
  17. Q. Yu, J. Lyu and L. Jiang, "Traffic anomaly detection algorithm for wireless sensor networks based on improved exploitation of the GM (1, 1) model," International Journal of Distributed Sensor Networks, vol. 12, no. 7, pp. 218-227, Jul. 2016.
  18. A. Patel, H. Alhussian and J. M. Pedersen, "A nifty collaborative intrusion detection and prevention architecture for smart grid ecosystems," Computers & Security, vol. 64, no. 1, pp. 92-109, Jan. 2017. https://doi.org/10.1016/j.cose.2016.07.002
  19. G. Kalnoor, J. Agarkhed and S. R. Patil, "Agent-based QoS routing for intrusion detection of sinkhole attack in clustered wireless sensor networks," in Proc. of 6th Int. Conf. on Computational Intelligence and Informatics, pp. 571-583, May 28-30, 2017.
  20. K. Manandhar, X. Cao and F. Hu, "Detection of faults and attacks including false data injection attack in smart grid using kalman filter," IEEE transactions on control of network systems, vol. 1, no. 4, pp. 370-379, Apr. 2014. https://doi.org/10.1109/TCNS.2014.2357531
  21. A. Forootaninia and M. B. Ghaznavi, "An improved watchdog technique based on power-aware hierarchical design for Ids in wireless sensor networks," International Journal of Network Security, vol. 4, no. 4, pp. 161-178, Jul. 2012.
  22. Y. Wang, D. Wang and F. Chen, "Efficient event detection using self-learning threshold for wireless sensor networks," Wireless Networks, vol. 21, no. 6, pp. 1783-1799, Jun. 2015. https://doi.org/10.1007/s11276-014-0885-9
  23. Z. H. Xiao, Z. G. Chen and X. H. Deng, "Anomaly detection based on a multi-class CUSUM Algorithm for WSN," Journal of Computers, vol. 5, no. 2, pp. 306-313, Feb. 2010.
  24. P. Jokarand and V. Leung, "Intrusion detection and prevention for ZigBee-based home area networks in smart grids," IEEE Transaction on Smart Grid, vol. 15, no. 3, pp. 1-12, Apr. 2016.
  25. H. Moosavi and F. M. Bui, "A game-theoretic framework for robust optimal intrusion detection in wireless sensor networks," IEEE Transactions on Information Forensics and Security, vol. 9, no. 9, pp. 1367-1379, Sep. 2014. https://doi.org/10.1109/TIFS.2014.2332816
  26. W. Haider, J. Hu, Y. Xie, X. Yu and Q. Wu, "Detecting anomalous behavior in cloud servers by nested arc hidden SEMI-Markov model with state summarization," IEEE Transactions on Big Data, vol. PP, no. 99, pp. 1-1, August. 2017.