Détection d'attaques dans un système WBAN de surveillance médicale à distance. (Attacks detection in a WBAN system for remote medical monitoring)

L'un des defis majeurs du monde de ces dernieres decennies a ete l'augmentation continue de la population des personnes âgees dans les pays developpes. D’ou la necessite de fournir des soins de qualite a une population en croissance rapide, tout en reduisant les couts des soins de sante. Dans ce contexte, de nombreux travaux de recherche portent sur l’utilisation des reseaux de capteurs sans fil dans les systemes WBAN (Wireless Body Area Network), pour faciliter et ameliorer la qualite du soin et de surveillance medicale a distance. Ces reseaux WBAN soulevent de nouveaux defis technologiques en termes de securite et de protection contre les anomalies et les attaques. Le mode de communication sans fil utilise entre ces capteurs et l’unite de traitement accentue ces vulnerabilites. En effet les vulnerabilites dans un systeme WBAN se decomposent en deux parties principales. La premiere partie se compose des attaques possibles sur le reseau des capteurs medicaux et sur le medium de communications sans fils entre ces capteurs et l’unite de traitement. La deuxieme partie se compose des attaques possibles sur les communications a haut debit entre le systeme WBAN et le serveur medical. L’objectif de cette these est de repondre en partie aux problemes de detection des attaques dans un systeme WBAN de surveillance medicale a distance. Pour atteindre cet objectif, nous avons propose un algorithme pour detecter les attaques de brouillage radio (jamming attack) qui visent le medium de communications sans fils entre les capteurs et l’unite de traitement. Ainsi nous avons propose une methode de mesure de divergence pour detecter les attaques de type flooding qui visent les communications a haut debit entre le systeme WBAN et le serveur medical.

[1]  Rabie A. Ramadan,et al.  Wireless Sensor Networks, A Medical Perspective , 2013 .

[2]  Ahmed Mehaoua,et al.  Flooding attacks detection in backbone traffic using power divergence , 2012, PM2HW2N '12.

[3]  Loukas Lazos,et al.  Selective Jamming Attacks in Wireless Networks , 2010, 2010 IEEE International Conference on Communications.

[4]  Ranjit Singh,et al.  Information Warfare-Worthy Jamming Attack Detection Mechanism for Wireless Sensor Networks Using a Fuzzy Inference System , 2010, Sensors.

[5]  Stephen B. Wicker,et al.  CareNet: an integrated wireless sensor networking environment for remote healthcare , 2008, BODYNETS.

[6]  Choong Seon Hong,et al.  Security in wireless sensor networks: issues and challenges , 2006, 2006 8th International Conference Advanced Communication Technology.

[7]  Bestoon Hussain Jaff,et al.  A Wireless Body Area Network System for Monitoring Physical Activities and Health-Status via the Internet , 2009 .

[8]  Ahmed Mehaoua,et al.  A comparison between divergence measures for network anomaly detection , 2011, 2011 7th International Conference on Network and Service Management.

[9]  Pardeep Kumar,et al.  Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey , 2011, Sensors.

[10]  Ismail Mansour,et al.  Contribution à la sécurité des communications des réseaux de capteurs sans fil , 2013 .

[11]  Kotagiri Ramamohanarao,et al.  Proactively Detecting Distributed Denial of Service Attacks Using Source IP Address Monitoring , 2004, NETWORKING.

[12]  VARUN CHANDOLA,et al.  Anomaly detection: A survey , 2009, CSUR.

[13]  M. Beaumont-Gay,et al.  A Comparison of SYN Flood Detection Algorithms , 2007, Second International Conference on Internet Monitoring and Protection (ICIMP 2007).

[14]  Farrukh Aslam Khan,et al.  A Hybrid Security Mechanism for Intra-WBAN and Inter-WBAN Communications , 2013, Int. J. Distributed Sens. Networks.

[15]  Gil De Sousa,et al.  Etude en vue de la réalisation de logiciels bas niveau dédiés aux réseaux de capteurs sans fil : microsystème de fichiers. (Design of low-level software dedicated to wireless sensor networks: micro-file system) , 2008 .

[16]  Kang G. Shin,et al.  SYN-dog: sniffing SYN flooding sources , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.

[17]  Weisong Shi,et al.  Wireless Sensor Network Security: A Survey , 2006 .

[18]  Ming Li,et al.  BANA: Body Area Network Authentication Exploiting Channel Characteristics , 2013, IEEE J. Sel. Areas Commun..

[19]  Dimitrios Gunopulos,et al.  Distributed deviation detection in sensor networks , 2003, SGMD.

[20]  Ian F. Akyildiz,et al.  A survey on wireless multimedia sensor networks , 2007, Comput. Networks.

[21]  Shahriar Mohammadi,et al.  A Comparison of Link Layer Attacks on Wireless Sensor Networks , 2011, ArXiv.

[22]  Jean-Philippe Babau,et al.  Detecting wormhole attacks in wireless networks using local neighborhood information , 2008, 2008 IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications.

[23]  Young-Koo Lee,et al.  An Anomaly Detection Algorithm for Detecting Attacks in Wireless Sensor Networks , 2006, ISI.

[24]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[25]  Sang Hyuk Son,et al.  JAM: a jammed-area mapping service for sensor networks , 2003, RTSS 2003. 24th IEEE Real-Time Systems Symposium, 2003.

[26]  M. Palaniswami,et al.  Distributed Anomaly Detection in Wireless Sensor Networks , 2006, 2006 10th IEEE Singapore International Conference on Communication Systems.

[27]  Robert L. Winkler,et al.  Scoring Rules, Generalized Entropy, and Utility Maximization , 2008, Oper. Res..

[28]  Mario Gerla,et al.  Bluetooth: an enabler for personal area networking , 2001, IEEE Netw..

[29]  Jan Havrda,et al.  Quantification method of classification processes. Concept of structural a-entropy , 1967, Kybernetika.

[30]  Fan Zhang,et al.  Securing communications between external users and wireless body area networks , 2013, HotWiSec '13.

[31]  Kotagiri Ramamohanarao,et al.  Survey of network-based defense mechanisms countering the DoS and DDoS problems , 2007, CSUR.

[32]  Kyung Sup Kwak,et al.  An overview of IEEE 802.15.6 standard , 2010, 2010 3rd International Symposium on Applied Sciences in Biomedical and Communication Technologies (ISABEL 2010).

[33]  Jalel Ben-Othman,et al.  Detection of Jamming Attacks in Wireless Ad Hoc Networks Using Error Distribution , 2009, 2009 IEEE International Conference on Communications.

[34]  Balachander Krishnamurthy,et al.  Sketch-based change detection: methods, evaluation, and applications , 2003, IMC '03.

[35]  Jim Morrison,et al.  A schema for the selection of network topology for Wireless Body Area Networks , 2011, 2011 IEEE Radio and Wireless Symposium.

[36]  Mark Crovella,et al.  Mining anomalies using traffic feature distributions , 2005, SIGCOMM '05.

[37]  Yong Wang,et al.  A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.

[38]  Saman Taghavi Zargar,et al.  A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks , 2013, IEEE Communications Surveys & Tutorials.

[39]  Youssouf Zatout Conception et évaluation de performances d'un réseau de capteurs sans fil hétérogène pour une application domotique , 2011 .

[40]  David Martins,et al.  État de l'art - Sécurité dans les réseaux de capteurs sans fil , 2008 .

[41]  Antonio Nucci,et al.  Robust and efficient detection of DDoS attacks for large-scale internet , 2007, Comput. Networks.

[42]  Victor C. M. Leung,et al.  Enabling technologies for wireless body area networks: A survey and outlook , 2009, IEEE Communications Magazine.

[43]  Xiuzhen Cheng,et al.  Localized Outlying and Boundary Data Detection in Sensor Networks , 2007 .

[44]  Mohammed Bouhorma,et al.  Analysis of Jamming Effects on IEEE 802.11 Wireless Networks , 2011, 2011 IEEE International Conference on Communications (ICC).

[45]  Jaydip Sen,et al.  A Survey on Wireless Sensor Network Security , 2009, Int. J. Commun. Networks Inf. Secur..

[46]  D. Janakiram,et al.  Outlier Detection in Wireless Sensor Networks using Bayesian Belief Networks , 2006, 2006 1st International Conference on Communication Systems Software & Middleware.

[47]  Matt Welsh,et al.  CodeBlue: An Ad Hoc Sensor Network Infrastructure for Emergency Medical Care , 2004 .

[48]  David J. Edwards,et al.  Ultra wideband: applications, technology and future perspectives , 2005 .

[49]  Alexandros G. Fragkiadakis,et al.  Anomaly-based intrusion detection of jamming attacks, local versus collaborative detection , 2015, Wirel. Commun. Mob. Comput..

[50]  David Evans,et al.  Using Directional Antennas to Prevent Wormhole Attacks , 2004, NDSS.

[51]  Jean-Christophe Lapayre,et al.  Security in Medical Telediagnosis , 2010 .

[52]  Jeff Rose,et al.  MANTIS OS: An Embedded Multithreaded Operating System for Wireless Micro Sensor Platforms , 2005, Mob. Networks Appl..

[53]  Wassim Znaidi Quelques propositions de solutions pour la sécurité des réseaux de capteurs sans fil , 2010 .

[54]  Benton H. Calhoun,et al.  Body Area Sensor Networks: Challenges and Opportunities , 2009, Computer.

[55]  Graham Cormode,et al.  An improved data stream summary: the count-min sketch and its applications , 2004, J. Algorithms.

[56]  Vasilios A. Siris,et al.  Application of anomaly detection algorithms for detecting SYN flooding attacks , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..

[57]  Daihee Park,et al.  Traffic flooding attack detection with SNMP MIB using SVM , 2008, Comput. Commun..

[58]  Georgios Loukas,et al.  Protection Against Denial of Service Attacks: A Survey , 2010, Comput. J..

[59]  Shyamal Patel,et al.  Mercury: a wearable sensor network platform for high-fidelity motion analysis , 2009, SenSys '09.

[60]  Cem Ersoy,et al.  Wireless sensor networks for healthcare: A survey , 2010, Comput. Networks.

[61]  D. Haussler,et al.  MUTUAL INFORMATION, METRIC ENTROPY AND CUMULATIVE RELATIVE ENTROPY RISK , 1997 .

[62]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[63]  Kang G. Shin,et al.  Change-point monitoring for the detection of DoS attacks , 2004, IEEE Transactions on Dependable and Secure Computing.

[64]  Abdulaziz Rashid Alazemi Defending WSNs against jamming attacks , 2013 .

[65]  Stefano Chessa,et al.  Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards , 2007, Comput. Commun..

[66]  Sung-Hyuk Cha Comprehensive Survey on Distance/Similarity Measures between Probability Density Functions , 2007 .

[67]  Xiaofeng Liao,et al.  Body Area Network Security: A Fuzzy Attribute-Based Signcryption Scheme , 2013, IEEE Journal on Selected Areas in Communications.

[68]  Srikanth V. Krishnamurthy,et al.  Denial of Service Attacks in Wireless Networks: The Case of Jammers , 2011, IEEE Communications Surveys & Tutorials.

[69]  Alexandros G. Fragkiadakis,et al.  Physical-layer intrusion detection for wireless networks using compressed sensing , 2012, 2012 IEEE 8th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[70]  Ahmet Turan Özcerit,et al.  Design and evaluation of a query-based jamming detection algorithm for wireless sensor networks , 2011 .

[71]  Hervé Guyennet,et al.  Wireless Sensor Network Attacks and Security Mechanisms: A Short Survey , 2010, 2010 13th International Conference on Network-Based Information Systems.

[72]  Osman Salem,et al.  A Novel Approach for Anomaly Detection over High-Speed Networks , 2008 .

[73]  Shahriar Mohammadi,et al.  A Comparison of Physical Attacks on Wireless Sensor Networks , 2011 .

[74]  Nirvana Meratnia,et al.  Outlier Detection Techniques for Wireless Sensor Networks: A Survey , 2008, IEEE Communications Surveys & Tutorials.

[75]  Guang-Zhong Yang,et al.  Body Sensor Networks: Infrastructure for Life Science Sensing Research , 2006, 2006 IEEE/NLM Life Science Systems and Applications Workshop.

[76]  Alexandros G. Fragkiadakis,et al.  Effective and robust detection of jamming attacks , 2010, 2010 Future Network & Mobile Summit.

[77]  Ingrid Moerman,et al.  A survey on wireless body area networks , 2011, Wirel. Networks.

[78]  Tuomas Aura DOS-Resistant Authentication with Client Puzzles (Transcript of Discussion) , 2000, Security Protocols Workshop.

[79]  Timothy A. Gonsalves,et al.  Detection of Syn Flooding Attacks using Linear Prediction Analysis , 2006, 2006 14th IEEE International Conference on Networks.

[80]  Athanasios V. Vasilakos,et al.  Body Area Networks: A Survey , 2010, Mob. Networks Appl..

[81]  Srdjan Capkun,et al.  SECTOR: secure tracking of node encounters in multi-hop wireless networks , 2003, SASN '03.

[82]  Ali A. Ghorbani,et al.  Network Anomaly Detection Based on Wavelet Analysis , 2009, EURASIP J. Adv. Signal Process..

[83]  Marimuthu Palaniswami,et al.  Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols , 2009, SASN '05.

[84]  Srdjan Capkun,et al.  Detection of Reactive Jamming in Sensor Networks , 2009 .

[85]  Ahmed Mehaoua,et al.  Flooding attacks detection in traffic of backbone networks , 2011, 2011 IEEE 36th Conference on Local Computer Networks.

[86]  Qiang Chen,et al.  Computer intrusion detection through EWMA for autocorrelated and uncorrelated data , 2003, IEEE Trans. Reliab..

[87]  Oliver Obst,et al.  Wireless Sensor Network Anomalies: Diagnosis and Detection Strategies , 2011 .

[88]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[89]  JeongGil Ko,et al.  Wireless Sensor Networks for Healthcare , 2010, Proceedings of the IEEE.

[90]  Garth V. Crosby,et al.  Wireless Body Area Networks for Healthcare: A Survey , 2012 .

[91]  Naima Kaabouch,et al.  Jamming and Lost Link Detection in Wireless Networks with Fuzzy Logic , 2013 .

[92]  Palaniappan Kannappan,et al.  A Directed-Divergence Function of Type β , 1972, Inf. Control..

[93]  David E. Culler,et al.  TinyOS: An Operating System for Sensor Networks , 2005, Ambient Intelligence.

[94]  Thomas Kunz,et al.  Operating Systems for Wireless Sensor Networks: A Survey , 2011, Sensors.

[95]  Charalampos Konstantopoulos,et al.  A survey on jamming attacks and countermeasures in WSNs , 2009, IEEE Communications Surveys & Tutorials.

[96]  Fadila Khadar Contrôle de topologie dans les réseaux de capteurs : de la théorie à la pratique , 2009 .

[97]  Rahim Kacimi Techniques de conservation d'énergie pour les réseaux de capteurs sans fil , 2009 .

[98]  Bo Sheng,et al.  Outlier detection in sensor networks , 2007, MobiHoc '07.

[99]  P. Chainais,et al.  Remote continuous cardiac arrhythmias detection and monitoring. , 2004, Studies in health technology and informatics.

[100]  Adam Dunkels,et al.  Contiki - a lightweight and flexible operating system for tiny networked sensors , 2004, 29th Annual IEEE International Conference on Local Computer Networks.

[101]  Sanjay Jha,et al.  Securing data provenance in body area networks using lightweight wireless link fingerprints , 2013, TrustED '13.

[102]  Marimuthu Palaniswami,et al.  Intrusion Detection for Routing Attacks in Sensor Networks , 2006, Int. J. Distributed Sens. Networks.

[103]  Optimisation d'accès au médium et stockage de données distribuées dans les réseaux de capteurs , 2008 .

[104]  Wenyuan Xu,et al.  The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.

[105]  Mohamed Lehsaini Diffusion et couverture basées sur le clustering dans les réseaux de capteurs : application à la domotique , 2009 .

[106]  Joel J. P. C. Rodrigues,et al.  Application of Wireless Sensor Networks to Healthcare Promotion , 2008 .

[107]  Wenyuan Xu,et al.  Jamming sensor networks: attack and defense strategies , 2006, IEEE Network.

[108]  Supakit Siripanadorn,et al.  Anomaly detection in wireless sensor networks using self-organizing map and wavelets , 2010 .

[109]  Hang Liu,et al.  Error control schemes for networks: An overview , 1997, Mob. Networks Appl..

[110]  Kyung Sup Kwak,et al.  A Study of IEEE 802.15.4 Security Framework for Wireless Body Area Networks , 2011, Sensors.

[111]  Farrukh Aslam Khan,et al.  Energy-efficient cluster-based security mechanism for intra-WBAN and inter-WBAN communications for healthcare applications , 2013, EURASIP J. Wirel. Commun. Netw..

[112]  Elena Deza,et al.  Encyclopedia of Distances , 2014 .

[113]  Gang Zhou,et al.  DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[114]  Dimitri Konstantas,et al.  MobiHealth-Innovative 2.5/3G mobile services and applications for health care , 2002 .