IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Security Issues on Outlier Detection and Countermeasure for Distributed Hierarchical Wireless Sensor Networks

Security Issues on Outlier Detection and Countermeasure for Distributed Hierarchical Wireless Sensor Networks
View Sample PDF
Author(s): Yiying Zhang (Shenyang Institute of Engineering, China), Lin He (Korea University, South Korea), Lei Shu (Osaka University, Japan), Takahiro Hara (Osaka University, Japan)and Shojiro Nishio (Osaka University, Japan)
Copyright: 2012
Pages: 29
Source title: Advancements in Distributed Computing and Internet Technologies: Trends and Issues
Source Author(s)/Editor(s): Al-Sakib Khan Pathan (International Islamic University Malaysia (IIUM), Malaysia), Mukaddim Pathan (Commonwealth Scientific and Industrial Research Organization (CSIRO), Australia)and Hae Young Lee (Electronics and Telecommunications Research Institut (ETRI), South Korea)
DOI: 10.4018/978-1-61350-110-8.ch009

Purchase


Abstract

Outliers in wireless sensor networks (WSNs) are sensor nodes that launch attacks by abnormal behaviors and fake message dissemination. However, existing cryptographic techniques have difficulty in detecting these outliers, which makes outlier recognition a critical and challenging issue for reliable and secure data dissemination when outliers exist in WSNs. This chapter is concerned about detection and elimination problems of outlier. To efficiently identify and isolate outliers, we present a novel “Outlier Detection and Countermeasure Scheme” (ODCS), which consists of three mechanisms: (1) An abnormal event observation mechanism (AEOM) for network surveillance; (2) An exceptional message supervision mechanism (EMSM) for distinguishing fake messages by exploiting spatiotemporal correlation and consistency; (3) An abnormal frequency supervision mechanism (AFSM) for the evaluation of node behavior. The chapter also provides a heuristic methodology which does not need the knowledge of normal or malicious sensors in advance. This property makes the ODCS not only to distinguish and deal with various dynamic attacks automatically without advance learning but also reduces the requirement of capability for constrained nodes. In our solution, the communication is limited to a local range, such as one-hop or a cluster, which can reduce the communication frequency and circumscribe the session range further. Moreover, the chapter also provides countermeasures for different types of attacks, such as the rerouting scheme and the rekey security scheme, which can separate outliers from normal sensors and enhance the robustness of network, even when some nodes are compromised by adversary. Simulation results indicate that our approach can effectively detect and defend the outlier attack.

Related Content

Nithin Kalorth, Vidya Deshpande. © 2024. 7 pages.
Nitesh Behare, Vinayak Chandrakant Shitole, Shubhada Nitesh Behare, Shrikant Ganpatrao Waghulkar, Tabrej Mulla, Suraj Ashok Sonawane. © 2024. 24 pages.
T.S. Sujith. © 2024. 13 pages.
C. Suganya, M. Vijayakumar. © 2024. 11 pages.
B. Harry, Vijayakumar Muthusamy. © 2024. 19 pages.
Munise Hayrun Sağlam, Ibrahim Kirçova. © 2024. 19 pages.
Elif Karakoç Keskin. © 2024. 19 pages.
Body Bottom