Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3327961.3329530acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

Exploiting Correlations to Detect False Data Injections in Low-Density Wireless Sensor Networks

Published: 02 July 2019 Publication History

Abstract

We propose a novel framework to detect false data injections in a low-density sensor environment with heterogeneous sensor data. The proposed detection algorithm learns how each sensor's data correlates within the sensor network, and false data is identified by exploiting the anomalies in these correlations. When a large number of sensors measuring homogeneous data are deployed, data correlations in space at a fixed snapshot in time could be used as as basis to detect anomalies. Exploiting disruptions in correlations when false data is injected has been used in a high-density sensor setting and proven to be effective. With increasing adoption of sensor deployments in low-density setting, there is a need to develop detection techniques for these applications. However, with constraints on the number of sensors and different data types, we propose the use of temporal correlations across the heterogeneous data to determine the authenticity of the reported data. We also provide an adversarial model that utilizes a graphical method to devise complex attack strategies where an attacker injects coherent false data in multiple sensors to provide a false representation of the physical state of the system with the aim of subverting detection. This allows us to test the detection algorithm and assess its performance in improving the resilience of the sensor network against data integrity attacks.

References

[1]
Sridhar Adepu and Aditya Mathur. 2016. Using Process Invariants to Detect Cyber Attacks on a Water Treatment System. In ICT Systems Security and Privacy Protection, Jaap-Henk Hoepman and Stefan Katzenbeisser (Eds.). Springer International Publishing, Cham, 91--104.
[2]
Riham AlTawy and Amr M Youssef. 2016. Security tradeoffs in cyber physical systems: A case study survey on implantable medical devices. IEEE Access, Vol. 4 (2016), 959--979.
[3]
Samaneh Aminikhanghahi and Diane J Cook. 2017. A survey of methods for time series change point detection. Knowledge and information systems, Vol. 51, 2 (2017), 339--367.
[4]
Mich$è$le Basseville, Igor V Nikiforov, et almbox. 1993. Detection of abrupt changes: theory and application. Vol. 104. Prentice Hall Englewood Cliffs.
[5]
Janneke H Bolt and Linda C van der Gaag. 2004. The convergence error in loopy propagation. In International Conference on Advances in Intelligent Systems: Theory and Applications .
[6]
Eric Chan-Tin, Daniel Feldman, Nicholas Hopper, and Yongdae Kim. 2009. The Frog-Boiling Attack: Limitations of Anomaly Detection for Secure Network Coordinate Systems. In Security and Privacy in Communication Networks, Yan Chen, Tassos D. Dimitriou, and Jianying Zhou (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 448--458.
[7]
United States Nuclear Regulation Commision. 2018. Backgrounder on the Three Mile Island Accident. https://www.nrc.gov/reading-rm/doc-collections/fact-sheets/3mile-isle.html
[8]
Kate Fagan, Allison Sabel, Philip S Mehler, and Thomas D MacKenzie. 2012. Vital sign abnormalities, rapid response, and adverse outcomes in hospitalized patients. American Journal of Medical Quality, Vol. 27, 6 (2012), 480--486.
[9]
A. Faquih, P. Kadam, and Z. Saquib. 2015. Cryptographic techniques for wireless sensor networks: A survey. In 2015 IEEE Bombay Section Symposium (IBSS). 1--6.
[10]
Jairo Giraldo, David Urbina, Alvaro Cardenas, Junia Valente, Mustafa Faisal, Justin Ruths, Nils Ole Tippenhauer, Henrik Sandberg, and Richard Candell. 2018. A survey of physics-based attack detection in cyber-physical systems. ACM Computing Surveys (CSUR), Vol. 51, 4 (2018), 76.
[11]
1954 Hamilton, James D. (James Douglas). 1994. Time series analysis .Princeton University Press, Princeton, N.J. ; Chichester. 93004958
[12]
Vittorio Illiano. 2018. Ensuring the resilience of wireless sensor networks to malicious data injections through measurements inspection.
[13]
Vittorio Illiano and Emil Lupu. 2015a. Detecting Malicious Data Injections in Wireless Sensor Networks: A Survey. ACM Computing Surveys (CSUR), Vol. 48, 2 (November 2015), 1--33.
[14]
V.P. Illiano, L. Muñoz-González, and E.C. Lupu. 2017. Don't fool me!: Detection, characterisation and diagnosis of spoofed and masked events in wireless sensor networks. IEEE Transactions on Dependable and Secure Computing, Vol. 14, 3 (2017), 279--293.
[15]
Vittorio Illiano, Andrea Paudice, Luis Muñoz-González, and Emil Lupu. 2018. Determining Resilience Gains From Anomaly Detection for Event Integrity in Wireless Sensor Networks. ACM Transactions on Sensor Networks (TOSN), Vol. 14, 1 (March 2018), 1--35.
[16]
Vittorio P. Illiano and Emil C. Lupu. 2015. Detecting Malicious Data Injections in Event Detection Wireless Sensor Networks. Network and Service Management, IEEE Transactions on, Vol. 12, 3 (September 2015), 496--510.
[17]
Jason Imperato, Daniel J Henning, Patrick J McBee, Leon D Sanchez, et almbox. 2017. Using markedly abnormal vital signs in the emergency department to anticipate needs for intensive care unit admission. Journal of Acute Disease, Vol. 6, 6 (2017), 268.
[18]
Chris Karlof and David Wagner. 2003. Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Networks, Vol. 1, 2 (2003), 293--315.
[19]
Joseph B Kruskal. 1956. On the shortest spanning subtree of a graph and the traveling salesman problem. Proceedings of the American Mathematical society, Vol. 7, 1 (1956), 48--50.
[20]
Dorothy N. Monekosso and Paolo Remagnino. 2013. Data reconciliation in a smart home sensor network. Expert Systems with Applications, Vol. 40, 8 (June 2013), 3248--3255.
[21]
Adrian Perrig, John Stankovic, and David Wagner. 2004. Security in wireless sensor networks. Commun. ACM, Vol. 47, 6 (June 2004), 53--57.
[22]
Physiobank. 2000. physiotoolkit, and physionet components of a new research resource for complex physiologic signals. Goldberger AL, Amaral LAN, Glass L, Hausdorff JM, Ivanov P, Mark RG, Mietus JE, Moody GB, Peng C, and Stanley HE. Circulation, Vol. 101, 23 (2000).
[23]
Robert Clay Prim. 1957. Shortest connection networks and some generalizations. Bell system technical journal, Vol. 36, 6 (1957), 1389--1401.
[24]
Murad Rassam, Anazida Zainal, and Mohd Maarof. 2013. Advancements of Data Anomaly Detection Research in Wireless Sensor Networks: A Survey and Open Issues. Sensors, Vol. 13, 8 (August 2013), 10087--10122.
[25]
Osman Salem, Alexey Guerassimov, Ahmed Mehaoua, Anthony Marcus, and Borko Furht. 2014. Anomaly detection in medical wireless sensor networks using SVM and linear regression models. International Journal of E-Health and Medical Communications (IJEHMC), Vol. 5, 1 (2014), 20--45.
[26]
Richard Shiavi. 2007. Introduction to applied statistical signal analysis: guide to biomedical and electrical engineering applications 3rd ed. ed.). Academic, Amsterdam: London.
[27]
David I Urbina, David I Urbina, Jairo Giraldo, Alvaro A Cardenas, Junia Valente, Mustafa Faisal, Nils Ole Tippenhauer, Justin Ruths, Richard Candell, and Henrik Sandberg. 2016. Survey and new directions for physics-based attack detection in control systems .US Department of Commerce, National Institute of Standards and Technology.
[28]
James Welch, Benjamin Kanter, Brooke Skora, Scott McCombie, Isaac Henry, Devin McCombie, Rosemary Kennedy, and Babs Soller. 2016. Multi-parameter vital sign database to assist in alarm optimization for general care units. Journal of clinical monitoring and computing, Vol. 30, 6 (2016), 895--900.

Cited By

View all
  • (2023)A Novel Diagnosis Scheme against Collusive False Data Injection AttackSensors10.3390/s2313594323:13(5943)Online publication date: 26-Jun-2023
  • (2023)Security Issue Reviewed and Resolved: Heart Disease Detection2023 International Conference on Artificial Intelligence for Innovations in Healthcare Industries (ICAIIHI)10.1109/ICAIIHI57871.2023.10489083(1-6)Online publication date: 29-Dec-2023
  • (2023)Machine Learning for Healthcare-IoT Security: A Review and Risk MitigationIEEE Access10.1109/ACCESS.2023.334632011(145869-145896)Online publication date: 2023
  • Show More Cited By

Index Terms

  1. Exploiting Correlations to Detect False Data Injections in Low-Density Wireless Sensor Networks

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      CPSS '19: Proceedings of the 5th on Cyber-Physical System Security Workshop
      July 2019
      63 pages
      ISBN:9781450367875
      DOI:10.1145/3327961
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 02 July 2019

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. anomaly detection
      2. false data injections
      3. sensor networks

      Qualifiers

      • Research-article

      Conference

      Asia CCS '19
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 43 of 135 submissions, 32%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)15
      • Downloads (Last 6 weeks)1
      Reflects downloads up to 06 Oct 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2023)A Novel Diagnosis Scheme against Collusive False Data Injection AttackSensors10.3390/s2313594323:13(5943)Online publication date: 26-Jun-2023
      • (2023)Security Issue Reviewed and Resolved: Heart Disease Detection2023 International Conference on Artificial Intelligence for Innovations in Healthcare Industries (ICAIIHI)10.1109/ICAIIHI57871.2023.10489083(1-6)Online publication date: 29-Dec-2023
      • (2023)Machine Learning for Healthcare-IoT Security: A Review and Risk MitigationIEEE Access10.1109/ACCESS.2023.334632011(145869-145896)Online publication date: 2023
      • (2022)IPAL: Breaking up Silos of Protocol-dependent and Domain-specific Industrial Intrusion Detection SystemsProceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses10.1145/3545948.3545968(510-525)Online publication date: 26-Oct-2022
      • (2022)A Smart and Secure IoT devices Using Machine Learning Algorithm2022 IEEE 2nd Mysore Sub Section International Conference (MysuruCon)10.1109/MysuruCon55714.2022.9972586(1-8)Online publication date: 16-Oct-2022
      • (2022)Detecting PLC Intrusions Using Control InvariantsIEEE Internet of Things Journal10.1109/JIOT.2022.31647239:12(9934-9947)Online publication date: 15-Jun-2022
      • (2021)Temporal Consistency Checks to Detect LiDAR Spoofing Attacks on Autonomous Vehicle PerceptionProceedings of the 1st Workshop on Security and Privacy for Mobile AI10.1145/3469261.3469406(13-18)Online publication date: 24-Jun-2021
      • (2020)Ensemble-Based Spam Detection in Smart Home IoT Devices Time Series Data Using Machine Learning TechniquesInformation10.3390/info1107034411:7(344)Online publication date: 2-Jul-2020
      • (2020)Evaluating Cascading Impact of Attacks on Resilience of Industrial Control Systems: A Design-Centric Modeling ApproachProceedings of the 6th ACM on Cyber-Physical System Security Workshop10.1145/3384941.3409587(42-53)Online publication date: 6-Oct-2020

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media