Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

Black Hole Traffic Anomaly Detections in Wireless Sensor Network

Published: 01 January 2015 Publication History

Abstract

With the flourish of Internet of Things, the security issues in wireless sensor network WSN, especially traffic anomaly detections, have attracted researchers' attentions. As a distributed wireless network, WSN is vulnerable to many attacks. In this research, the authors investigate the traffic anomaly detections of a well-known attack, black hole attack, in WSNs. With limited computation capacity, sensor nodes are unable to perform sophisticated detection techniques. Therefore, the authors propose a profile based monitoring approach with a restricted feature set to supervise the network traffic. The proposed profile based monitoring approach contains two components, feature selection and anomaly detection. In order to complement the limited computing capacity of a sensor node, feature selection component will extract features with high contribution or high relevance for future monitoring. The anomaly detection component monitors the selected features and alarms the administrator when an anomaly is detected. Two types of combination are proposed, graphic and non-graphic based models. The graphic based approach seems to surpass the non-graphic based approach, but the graphic based approach takes much longer time to select the important features than non-graphic based approach.

References

[1]
Bhatnagar, R., & Shankar, U. 2012. The proposal of hybrid intrusion detection for defence of sync flood attack in wireless sensor network. International Journal of Computer Science & Engineering Survey, 32, 31-38.
[2]
Bouckaert, R. R. 1993. Probabilistic network construction using the minimum description length principle Symbolic and Quantitative Approaches to Reasoning and Uncertainty pp. 41-48. Springer.
[3]
Cai, B., Bi, Q., Li, F., Wang, D., Yang, Y., & Yuan, C. 2010. Research and Design of Agricultural Environment Monitoring System Based on ZigBee Wireless Sensor Network. Acta Agriculturae Jiangxi, 11, 050.
[4]
Chen, R.-C., Haung, Y.-F., & Hsieh, C.-F. 2010. Ranger intrusion detection system for wireless sensor networks with Sybil attack based on ontology. New Aspects of Applied Informatics, Biomedical Electronics and Informatics and Communications.
[5]
Chen, R.-C., Hsieh, C.-F., & Huang, Y.-F. 2010. An isolation intrusion detection system for hierarchical wireless sensor networks. Journal of Networks, 53, 335-342.
[6]
Friedl, M. A., & Brodley, C. E. 1997. Decision tree classification of land cover from remotely sensed data. Remote Sensing of Environment, 613, 399-409.
[7]
Gungor, V. C., & Hancke, G. P. 2009. Industrial wireless sensor networks: Challenges, design principles, and technical approaches. Industrial Electronics . IEEE Transactions on, 5610, 4258-4265.
[8]
Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., & Witten, I. H. 2009. The WEKA data mining software: an update. ACM SIGKDD explorations newsletter, 111, 10-18.
[9]
Huang, Y.-a., Fan, W., Lee, W., & Yu, P. S. 2003. Cross-feature analysis for detecting ad-hoc routing anomalies. Paper presented at the Distributed Computing Systems, 2003. Proceedings. 23rd International Conference on.
[10]
Issariyakul, T., & Hossain, E. 2011. Introduction to network simulator NS2. Springer.
[11]
Kawadia, V., & Kumar, P. 2003. Power control and clustering in ad hoc networks. Paper presented at the INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies.
[12]
Kullback, S., & Leibler, R. A. 1951. On information and sufficiency. Annals of Mathematical Statistics, 221, 79-86.
[13]
Mamun, M. S. I., & Kabir, A. S. 2010. Hierarchical design based intrusion detection system for wireless ad hoc sensor network. {IJNSA}. International Journal of Network Security & Its Applications, 23, 102-117.
[14]
Mao, Y. 2010. A semantic-based intrusion detection framework for wireless sensor network. Paper presented at the Networked Computing INC, 2010 6th International Conference on.
[15]
Pantelopoulos, A., & Bourbakis, N. G. 2010. A survey on wearable sensor-based systems for health monitoring and prognosis. Systems, Man, and Cybernetics, Part C: Applications and Reviews . IEEE Transactions on, 401, 1-12.
[16]
Tsamardinos, I., Aliferis, C. F., Statnikov, A. R., & Statnikov, E. 2003. Algorithms for Large Scale Markov Blanket Discovery. Paper presented at the FLAIRS Conference.
[17]
Wang, X., Lin, T.-l., & Wong, J. S. 2005. Feature selection in intrusion detection system over mobile ad-hoc network.
[18]
Yamamoto, H., Uchiyama, S., Yamamoto, M., Nakamura, K., & Yamazaki, K. 2012. Development of Sensor Network for Ecology Observation of Seabirds. IEICE Transactions on Information and Systems, 952, 532-539.
[19]
Zhang, Y., Lee, W., & Huang, Y.-A. 2003. Intrusion detection techniques for mobile wireless networks. Wireless Networks, 95, 545-556.
  1. Black Hole Traffic Anomaly Detections in Wireless Sensor Network

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image International Journal of Grid and High Performance Computing
      International Journal of Grid and High Performance Computing  Volume 7, Issue 1
      January 2015
      66 pages
      ISSN:1938-0259
      EISSN:1938-0267
      Issue’s Table of Contents

      Publisher

      IGI Global

      United States

      Publication History

      Published: 01 January 2015

      Author Tags

      1. Black Hole Attacks
      2. Intrusion Detection
      3. Network Security
      4. Traffic Anomaly Detection
      5. Wireless Sensor Networks

      Qualifiers

      • Article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • 0
        Total Citations
      • 0
        Total Downloads
      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 12 Jan 2025

      Other Metrics

      Citations

      View Options

      View options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media