Anomaly detection of data and topology patterns in WSNs

Wireless sensor networks are often distributed which makes detection of cyber-attacks or misconfiguration hard. Topology and data patterns change may result from attacks leading to the compromise of data and service availability or indicate operational problems. Graphs are often used to model topology and data paths to describe and compare state of a system. For anomaly detection, the definition of normal patterns, deviation from normal, and criteria when to declare anomaly are required. In this contribution the process of acquisition of normal patterns (ground truth), and criteria when to declare anomaly based on graph comparison are proposed. The anomaly detection is suitable for deployment at the edge of a network. Finally, the inability to define all security threats is addressed by a custom tree-based classifier which only requires normal patterns for training. A simulated wireless sensor network was used to acquire data and apply the method. Our experiments show that data and topology change can be detected at the edge of a network.

[1]  Anazida Zainal,et al.  An Efficient Distributed Anomaly Detection Model for Wireless Sensor Networks , 2013 .

[2]  Pascal Lorenz,et al.  Security Against Rank Attack in RPL Protocol , 2020, IEEE Network.

[3]  Stefan Bordag,et al.  Out-of-core singular value decomposition , 2019, ArXiv.

[4]  Yu Zhang,et al.  A Survey on Fault Diagnosis in Wireless Sensor Networks , 2018, IEEE Access.

[5]  Zhaojun Bai,et al.  Optimizing Halley's Iteration for Computing the Matrix Polar Decomposition , 2010, SIAM J. Matrix Anal. Appl..

[6]  Sayyed Majid Mazinani,et al.  A Novel Anomaly Detection Algorithm Using DBSCAN and SVM in Wireless Sensor Networks , 2017, Wireless Personal Communications.

[7]  Anant V. Nimkar,et al.  A comparative study on RPL attacks and security solutions , 2017, 2017 International Conference on Intelligent Computing and Control (I2C2).

[8]  Furkan Yusuf Yavuz,et al.  Deep Learning for Detection of Routing Attacks in the Internet of Things , 2018, Int. J. Comput. Intell. Syst..

[9]  Adam Dunkels,et al.  Cross-Level Sensor Network Simulation with COOJA , 2006, Proceedings. 2006 31st IEEE Conference on Local Computer Networks.

[10]  M. M. A. Hashem,et al.  Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches , 2019, Internet Things.

[11]  Sharwari S. Solapure,et al.  Analysis of routing protocol for Low Power and Lossy Networks (RPL) using Cooja simulator , 2017, 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET).

[12]  Amel Bouzeghoub,et al.  Activity recognition for anomalous situation detection , 2017 .

[13]  Ismail Ahmedy,et al.  Compression Header Analyzer Intrusion Detection System (CHA - IDS) for 6LoWPAN Communication Protocol , 2018, IEEE Access.

[14]  Abdennaceur Kachouri,et al.  Outlier detection for wireless sensor networks using density-based clustering approach , 2017, IET Wirel. Sens. Syst..

[15]  Marimuthu Palaniswami,et al.  Centered Hyperspherical and Hyperellipsoidal One-Class Support Vector Machines for Anomaly Detection in Sensor Networks , 2010, IEEE Transactions on Information Forensics and Security.