A Hierarchical Security Framework for Defending Against Sophisticated Attacks on Wireless Sensor Networks in Smart Cities

In smart cities, wireless sensor networks (WSNs) act as a type of core infrastructure that collects data from the city to implement smart services. The security of WSNs is one of the key issues of smart cities. In resource-restrained WSNs, dynamic ongoing or unknown attacks usually steer clear of isolated defense components. Therefore, to resolve this problem, we propose a hierarchical framework based on chance discovery and usage control (UCON) technologies to improve the security of WSNs while still taking the low-complexity and high security requirements of WSNs into account. The features of continuous decision and dynamic attributes in UCON can address ongoing attacks using advanced persistent threat detection. In addition, we use a dynamic adaptive chance discovery mechanism to detect unknown attacks. To design and implement a system using the mechanism described above, a unified framework is proposed in which low-level attack detection with simple rules is performed in sensors, and high-level attack detection with complex rules is performed in sinks and at the base station. Moreover, software-defined networking and network function virtualization technologies are used to perform attack mitigation when either low-level or high-level attacks are detected. An experiment was performed to acquire an attack data set for evaluation. Then, a simulation was created to evaluate the resource consumption and attack detection rate. The results demonstrate the feasibility and efficiency of the proposed scheme.

[1]  Yukio Ohsawa,et al.  KeyGraph: automatic indexing by co-occurrence graph based on building construction metaphor , 1998, Proceedings IEEE International Forum on Research and Technology Advances in Digital Libraries -ADL'98-.

[2]  Salvatore J. Stolfo,et al.  A framework for constructing features and models for intrusion detection systems , 2000, TSEC.

[3]  Ravi Sandhu,et al.  The ABC Core Model for Usage Control: Integrating Authorizations, oBligations, and Conditions , 2002 .

[4]  B. Thuraisingham,et al.  Secure sensor information management and mining , 2004, IEEE Signal Processing Magazine.

[5]  J. Ross Quinlan,et al.  Induction of Decision Trees , 1986, Machine Learning.

[6]  Jaehong Park,et al.  Formal model and policy specification of usage control , 2005, TSEC.

[7]  Yukio Ohsawa,et al.  Data crystallization: a project beyond chance discovery for discovering unobservable events , 2005, 2005 IEEE International Conference on Granular Computing.

[8]  Giuseppe Anastasi,et al.  Understanding the real behavior of Mote and 802.11 ad hoc networks: an experimental approach , 2005, Pervasive Mob. Comput..

[9]  Mark Handley,et al.  The final nail in WEP's coffin , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).

[10]  Jian Ma,et al.  Designing Energy-Efficient Wireless Sensor Networks with Mobile Sinks , 2006 .

[11]  Vijay Varadharajan,et al.  A New Security Scheme for Wireless Sensor Networks , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[12]  Ali A. Ghorbani,et al.  Detecting Network Anomalies Using Different Wavelet Basis Functions , 2008, 6th Annual Communication Networks and Services Research Conference (cnsr 2008).

[13]  K. Q. Yan,et al.  A Hybrid Intrusion Detection System of Cluster-based Wireless Sensor Networks , 2009 .

[14]  James Harbin,et al.  Wireless sensor network wormhole avoidance using disturbance-based routing schemes , 2009, 2009 6th International Symposium on Wireless Communication Systems.

[15]  Lin Chen,et al.  A Game Theoretical Framework on Intrusion Detection in Heterogeneous Networks , 2009, IEEE Transactions on Information Forensics and Security.

[16]  Nora Cuppens-Boulahia,et al.  Success Likelihood of Ongoing Attacks for Intrusion Detection and Response Systems , 2009, 2009 International Conference on Computational Science and Engineering.

[17]  Minyi Guo,et al.  Dynamic Itinerary Planning for Mobile Agents with a Content-Specific Approach in Wireless Sensor Networks , 2010, 2010 IEEE 72nd Vehicular Technology Conference - Fall.

[18]  Tae Ho Cho,et al.  A Scheme for Adaptively Countering Application Layer Security Attacks in Wireless Sensor Networks , 2010, IEICE Trans. Commun..

[19]  Mianxiong Dong,et al.  Maelstrom: Receiver-Location Preserving in Wireless Sensor Networks , 2011, WASA.

[20]  Jianhua Li,et al.  Green firewall: An energy-efficient intrusion prevention mechanism in wireless sensor network , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).

[21]  Kui Ren,et al.  Distributed Privacy-Preserving Access Control in Sensor Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.

[22]  Dong Hoon Lee,et al.  PACPs: practical access control protocols for wireless sensor networks , 2012, IEEE Transactions on Consumer Electronics.

[23]  W. Marsden I and J , 2012 .

[24]  Raj Jain,et al.  Network virtualization and software defined networking for cloud computing: a survey , 2013, IEEE Communications Magazine.

[25]  Tongtong Li,et al.  Distributed Detection in Mobile Access Wireless Sensor Networks under Byzantine Attacks , 2014, IEEE Transactions on Parallel and Distributed Systems.

[26]  Laurence T. Yang,et al.  Mobile agent-based energy-aware and user-centric data collection in wireless sensor networks , 2014, Comput. Networks.

[27]  M.Kanchana,et al.  VAMPIRE ATTACKS: DRAINING LIFE FROM WIRELESS AD HOC SENSOR NETWORKS , 2014 .

[28]  Ying Wang,et al.  A novel design for content delivery over software defined mobile social networks , 2015, IEEE Network.

[29]  Jianhua Li,et al.  Proposed Security Mechanism for XMPP-Based Communications of ISO/IEC/IEEE 21451 Sensor Networks , 2015, IEEE Sensors Journal.

[30]  Zhou Su,et al.  Content distribution over content centric mobile social networks in 5G , 2015, IEEE Communications Magazine.

[31]  Song Guo,et al.  A Game Theoretical Incentive Scheme for Relay Selection Services in Mobile Social Networks , 2016, IEEE Transactions on Vehicular Technology.