Malicious Node Detection in Wireless Sensor Networks Using an Autoregression Technique

In this paper we propose a strategy based on past/present values provided by each sensor of a network for detecting their malicious activity. Basically, we will compare at each moment the sensor's output with its estimated value computed by an autoregressive predictor. In case the difference between the two values is higher then a chosen threshold, the sensor node becomes suspicious and a decision block is activated.

[1]  Tarek F. Abdelzaher,et al.  Range-free localization schemes for large scale sensor networks , 2003, MobiCom '03.

[2]  D. P. Agrawal,et al.  Self-organized criticality and stochastic learning based intrusion detection system for wireless sensor networks , 2003, IEEE Military Communications Conference, 2003. MILCOM 2003..

[3]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[4]  Joseph R. Cavallaro,et al.  Efficient implementation of rotation operations for high performance QRD-RLS filtering , 1997, Proceedings IEEE International Conference on Application-Specific Systems, Architectures and Processors.

[5]  Diran Basmadjian,et al.  The Art of Modeling in Science and Engineering with Mathematica , 1999 .

[6]  Lang Tong,et al.  Sensor networks with mobile agents , 2003, IEEE Military Communications Conference, 2003. MILCOM 2003..

[7]  Mani B. Srivastava,et al.  Dynamic fine-grained localization in Ad-Hoc networks of sensors , 2001, MobiCom '01.

[8]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[9]  Dae-Ki Kang,et al.  Learning classifiers for misuse and anomaly detection using a bag of system calls representation , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.

[10]  Peng Ning,et al.  LAD: localization anomaly detection for wireless sensor networks , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.

[11]  Tomasz Bednarz,et al.  Discovery of Malicious Nodes in Wireless Sensor Networks Using Neural Predictors , 2007 .

[12]  Andrea Vitaletti,et al.  Rijndael for Sensor Networks: Is Speed the Main Issue? , 2007, Electron. Notes Theor. Comput. Sci..

[13]  Y. Selen,et al.  Model-order selection: a review of information criterion rules , 2004, IEEE Signal Processing Magazine.

[14]  Zinaida Benenson,et al.  Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks , 2006, SPC.

[15]  Miodrag Potkonjak,et al.  System-architectures for sensor networks issues, alternatives, and directions , 2002, Proceedings. IEEE International Conference on Computer Design: VLSI in Computers and Processors.

[16]  Ricardo Staciarini Puttini,et al.  Security in Ad Hoc Networks: a General Intrusion Detection Architecture Enhancing Trust Based Approaches , 2002, Wireless Information Systems.