Channel-Based Sybil Detection in Industrial Wireless Sensor Networks: A Multi-Kernel Approach

Industrial Wireless Sensor Networks (IWSNs) integrate various types of sensors to measure and control industrial production. However, the unattended open environment makes IWSNs vulnerable to malicious attacks, such as Sybil attacks, which may degrade the network performance. In addition, multipath distortion, impulse noise and interference effects in the harsh industrial environment may influence the accuracy of attack detection. In this paper, we propose a Sybil detection scheme based on power gain and delay spread analysis by exploiting the spatial variability from their channel responses. Specifically, we utilize channel-vectors to represent the sensor features based on the power gain and delay spread extracted from channel response. Furthermore, we develop a kernel-oriented method to distinguish Sybil attackers from benign sensors by clustering the channel-vectors. In addition, to alleviate the impact of industrial noise and interference effects, we design a multi-kernel based fuzzy c-means method to map the extracted channel-vectors into a new feature space such that the dispersive effects on the channel-vectors can be reduced. We also propose a parameter selection method to optimize the employed kernels. The simulation results show that the proposed multi-kernel scheme can achieve high accuracy in detecting the packets from Sybil attackers, and tolerate the dispersive attenuation and interference effects in the industrial environments.

[1]  Xiaohui Liang,et al.  Exploiting mobile social behaviors for Sybil detection , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).

[2]  Qi Xiong,et al.  An Energy-Ratio-Based Approach for Detecting Pilot Spoofing Attack in Multiple-Antenna Systems , 2015, IEEE Transactions on Information Forensics and Security.

[3]  Yue Liu,et al.  The Mason Test: A Defense Against Sybil Attacks in Wireless Networks Without Trusted Authorities , 2014, IEEE Transactions on Mobile Computing.

[4]  Ravi Sankar,et al.  A Survey of Intrusion Detection Systems in Wireless Sensor Networks , 2014, IEEE Communications Surveys & Tutorials.

[5]  Xiaohui Liang,et al.  Sybil Attacks and Their Defenses in the Internet of Things , 2014, IEEE Internet of Things Journal.

[6]  Weihua Zhuang,et al.  PHY-Layer Spoofing Detection With Reinforcement Learning in Wireless Networks , 2016, IEEE Transactions on Vehicular Technology.

[7]  Xuemin Shen,et al.  Exploiting dispersive power gain and delay spread for sybil detection in industrial WSNs , 2016, 2016 IEEE/CIC International Conference on Communications in China (ICCC).

[8]  Ivan Stojmenovic,et al.  Pairwise and Triple Key Distribution in Wireless Sensor Networks with Applications , 2013, IEEE Transactions on Computers.

[9]  Yung-Yu Chuang,et al.  Multiple Kernel Fuzzy Clustering , 2012, IEEE Transactions on Fuzzy Systems.

[10]  Richard P. Martin,et al.  Detecting and Localizing Identity-Based Attacks in Wireless and Sensor Networks , 2010, IEEE Transactions on Vehicular Technology.

[11]  Prateek Mittal,et al.  SybilBelief: A Semi-Supervised Learning Approach for Structure-Based Sybil Detection , 2013, IEEE Transactions on Information Forensics and Security.

[12]  Michael Cheffena,et al.  Industrial wireless communications over the millimeter wave spectrum: opportunities and challenges , 2016, IEEE Communications Magazine.

[13]  Lei Li,et al.  Fuzzy C-Means clustering based secure fusion strategy in collaborative spectrum sensing , 2014, 2014 IEEE International Conference on Communications (ICC).

[14]  Larry J. Greenstein,et al.  Channel-Based Detection of Sybil Attacks in Wireless Networks , 2009, IEEE Transactions on Information Forensics and Security.

[15]  Song Guo,et al.  Neighbor Similarity Trust against Sybil Attack in P2P E-Commerce , 2015, IEEE Trans. Parallel Distributed Syst..

[16]  Nello Cristianini,et al.  Kernel Methods for Pattern Analysis , 2004 .

[17]  C. L. Philip Chen,et al.  A Multiple-Kernel Fuzzy C-Means Algorithm for Image Segmentation , 2011, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).