On Data-Centric Intrusion Detection in Wireless Sensor Networks

Wireless sensor networks (WSN) are increasingly used to support critical applications - especially in enterprise settings. If the sensor data collected through the network is incorrect, such applications cannot run reliably. Thus, detecting the occurrence of abnormal sensor values is crucial. In this paper we develop three decentralized, lightweight data anomaly detection mechanisms that can be run directly on sensor nodes. These algorithms are evaluated with a real dataset to which we added plausible attacks. Further, they are compared to standard centralized anomaly detection mechanisms.

[1]  F. Freiling,et al.  Towards Intrusion Detection in Wireless Sensor Networks , 2007 .

[2]  Haiyun Luo,et al.  Statistical en-route filtering of injected false data in sensor networks , 2005, IEEE J. Sel. Areas Commun..

[3]  Yunhao Liu,et al.  Does Wireless Sensor Network Scale? A Measurement Study on GreenOrbs , 2011, IEEE Transactions on Parallel and Distributed Systems.

[4]  Zhiyong Lu,et al.  Explaining Naive Bayes Classifications , 2003 .

[5]  Jeffrey J. P. Tsai,et al.  A Framework of Machine Learning Based Intrusion Detection for Wireless Sensor Networks , 2008, 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (sutc 2008).

[6]  Georgios B. Giannakis,et al.  Consensus-based distributed linear support vector machines , 2010, IPSN '10.

[7]  Farnam Jahanian,et al.  A comparative study of two network-based anomaly detection methods , 2011, 2011 Proceedings IEEE INFOCOM.

[8]  Antonio Alfredo Ferreira Loureiro,et al.  Decentralized intrusion detection in wireless sensor networks , 2005, Q2SWinet '05.

[9]  Chih-Jen Lin,et al.  A Practical Guide to Support Vector Classication , 2008 .

[10]  Kay Römer,et al.  Distributed Mining of Spatio-Temporal Event Patterns in Sensor Networks , 2007 .

[11]  Haiyun Luo,et al.  Statistical en-route filtering of injected false data in sensor networks , 2004, IEEE INFOCOM 2004.

[12]  Leonid Portnoy,et al.  Intrusion detection with unlabeled data using clustering , 2000 .

[13]  Pierre Baldi,et al.  Assessing the accuracy of prediction algorithms for classification: an overview , 2000, Bioinform..

[14]  อนิรุธ สืบสิงห์,et al.  Data Mining Practical Machine Learning Tools and Techniques , 2014 .

[15]  Fang Liu,et al.  Insider Attacker Detection in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[16]  Aric A. Hagberg,et al.  Separating the Wheat from the Chaff: Practical Anomaly Detection Schemes in Ecological Applications of Distributed Sensor Networks , 2007, DCOSS.

[17]  Ran Wolff,et al.  In-Network Outlier Detection in Wireless Sensor Networks , 2006, ICDCS.