Don't fool Me!: Detection, Characterisation and Diagnosis of Spoofed and Masked Events in Wireless Sensor Networks

Wireless Sensor Networks carry a high risk of being compromised, as their deployments are often unattended, physically accessible and the wireless medium is difficult to secure. Malicious data injections take place when the sensed measurements are maliciously altered to trigger wrong and potentially dangerous responses. When many sensors are compromised, they can collude with each other to alter the measurements making such changes difficult to detect. Distinguishing between genuine and malicious measurements is even more difficult when significant variations may be introduced because of events, especially if more events occur simultaneously. We propose a novel methodology based on wavelet transform to detect malicious data injections, to characterise the responsible sensors, and to distinguish malicious interference from faulty behaviours. The results, both with simulated and real measurements, show that our approach is able to counteract sophisticated attacks, achieving a significant improvement over state-of-the-art approaches.

[1]  D. F. Andrews,et al.  Robust Estimates of Location: Survey and Advances. , 1975 .

[2]  C. J. Lawrence Robust estimates of location : survey and advances , 1975 .

[3]  R. Dennis Cook,et al.  Cross-Validation of Regression Models , 1984 .

[4]  E. S. Husebye,et al.  A new three-component detector and automatic single-station bulletin production , 1992 .

[5]  D. A. Smith,et al.  Major chemical species in buoyant turbulent diffusion flames , 1992 .

[6]  Teri A. Crosby,et al.  How to Detect and Handle Outliers , 1993 .

[7]  Christopher John Young,et al.  A comparison of select trigger algorithms for automated global seismic phase and event detection , 1998, Bulletin of the Seismological Society of America.

[8]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[9]  Andrew L. Sullivan,et al.  A review of radiant heat flux models used in bushfire applications , 2003 .

[10]  Soo-Chang Pei,et al.  Detecting digital tampering by blur estimation , 2005, First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE'05).

[11]  Yunghsiang Sam Han,et al.  A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.

[12]  Pan Du,et al.  Bioinformatics Original Paper Improved Peak Detection in Mass Spectrum by Incorporating Continuous Wavelet Transform-based Pattern Matching , 2022 .

[13]  Wei Zhang,et al.  A Trust Based Framework for Secure Data Aggregation in Wireless Sensor Networks , 2006, 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks.

[14]  Siwei Lyu,et al.  Steganalysis using higher-order image statistics , 2006, IEEE Transactions on Information Forensics and Security.

[15]  T. Keitt,et al.  Detection of scale-specific community dynamics using wavelets. , 2006, Ecology.

[16]  M. Palaniswami,et al.  Distributed Anomaly Detection in Wireless Sensor Networks , 2006, 2006 10th IEEE Singapore International Conference on Communication Systems.

[17]  Marimuthu Palaniswami,et al.  Quarter Sphere Based Distributed Anomaly Detection in Wireless Sensor Networks , 2007, 2007 IEEE International Conference on Communications.

[18]  Aric A. Hagberg,et al.  Separating the Wheat from the Chaff: Practical Anomaly Detection Schemes in Ecological Applications of Distributed Sensor Networks , 2007, DCOSS.

[19]  Nasir D. Memon,et al.  Tamper Detection Based on Regularity of Wavelet Transform Coefficients , 2007, 2007 IEEE International Conference on Image Processing.

[20]  Mukesh Singhal,et al.  Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..

[21]  Kyung Sup Kwak,et al.  Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications , 2010, Journal of Medical Systems.

[22]  Ming Li,et al.  Data security and privacy in wireless body area networks , 2010, IEEE Wireless Communications.

[23]  Yoon Hwa Choi,et al.  A Malicious and Malfunctioning Node Detection Scheme for Wireless Sensor Networks , 2012 .

[24]  Yaning Liu,et al.  A lightweight anomaly detection framework for medical wireless sensor networks , 2013, 2013 IEEE Wireless Communications and Networking Conference (WCNC).

[25]  Marimuthu Palaniswami,et al.  Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..

[26]  Elisa Bertino,et al.  A robust iterative filtering technique for wireless sensor networks in the presence of malicious attacks , 2013, SenSys '13.

[27]  Emil C. Lupu,et al.  Detecting Malicious Data Injections in Wireless Sensor Networks , 2015, ACM Comput. Surv..

[28]  Emil C. Lupu,et al.  Detecting Malicious Data Injections in Event Detection Wireless Sensor Networks , 2015, IEEE Transactions on Network and Service Management.