Skip to main content

2017 | OriginalPaper | Buchkapitel

Recognizing Attacks in Wireless Sensor Network in View of Internet of Things

verfasst von : D. P. Acharjya, N. Syed Siraj Ahmed

Erschienen in: Internet of Things: Novel Advances and Envisioned Applications

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Wireless sensor networks are wide spreading, dominating, and has a far-reaching range of utilizations such as battlefield scrutiny, traffic scrutiny, forest fire detection, flood detection etc. Both industry and academia are targeting their research works for the sake of advancing their functions. The safety of a wireless sensor network is negotiated due to the random distribution of sensor nodes in exposed environment, memory restraints, power restraints and unattended nature. Furthermore, providing confidence between every couple of communicating nodes is a demanding issue and is of prime importance in internet of things. Under these conditions this chapter spotlights variety of attacks and their symptoms thoroughly. The chapter analyzes them based on trusting based protection techniques including classical techniques such as fuzzy, Bayesian, game theory etc. Modern techniques such as clustering, bio-inspired computing, key establishment based techniques are stressed upon to provide maximum protection for each node in the wireless sensor network.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Akyildiz, I., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Comput. Netw. 38, 393–422 (2002)CrossRef Akyildiz, I., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Comput. Netw. 38, 393–422 (2002)CrossRef
2.
Zurück zum Zitat Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. Ad hoc Netw. 1, 293–315 (2003)CrossRef Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. Ad hoc Netw. 1, 293–315 (2003)CrossRef
3.
Zurück zum Zitat Hill, J., Szewczyk, R., Woo, A., Hollar, S., Culler, D., Pister, K.: System architecture directions for networked sensors. In: Proceedings of ACM ASPLOS, pp. 93–104 (2000) Hill, J., Szewczyk, R., Woo, A., Hollar, S., Culler, D., Pister, K.: System architecture directions for networked sensors. In: Proceedings of ACM ASPLOS, pp. 93–104 (2000)
4.
Zurück zum Zitat Liu, F., Cheng, X., Chen, D.: Insider attacker detection in wireless sensor networks. In: Proceedings of IEEE INFOCOM, pp. 1937–1945 (2007) Liu, F., Cheng, X., Chen, D.: Insider attacker detection in wireless sensor networks. In: Proceedings of IEEE INFOCOM, pp. 1937–1945 (2007)
5.
Zurück zum Zitat Li, G., He, J., Fu, Y.: A group-based intrusion detection scheme in wireless sensor networks. In: Proceedings of GPS Workshops IEEE, pp. 286–291 (2008) Li, G., He, J., Fu, Y.: A group-based intrusion detection scheme in wireless sensor networks. In: Proceedings of GPS Workshops IEEE, pp. 286–291 (2008)
6.
Zurück zum Zitat Xu, W., Ma, K., Trappe, W., Zhang, Y.: Jamming sensor networks: attack and defense strategies. IEEE Netw. 20, 41–47 (2006)CrossRef Xu, W., Ma, K., Trappe, W., Zhang, Y.: Jamming sensor networks: attack and defense strategies. IEEE Netw. 20, 41–47 (2006)CrossRef
7.
Zurück zum Zitat Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor network. In: Proceedings of New York, NY, USA, pp. 53–57. ACM Press, New York (2004) Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor network. In: Proceedings of New York, NY, USA, pp. 53–57. ACM Press, New York (2004)
8.
Zurück zum Zitat Soomro, S.A., Memon, A.G., Baqi, A.: Denial of service attacks in wireless ad-hoc networks. J. Inf. Commun. Technol. 4, 01–10 (2010) Soomro, S.A., Memon, A.G., Baqi, A.: Denial of service attacks in wireless ad-hoc networks. J. Inf. Commun. Technol. 4, 01–10 (2010)
9.
Zurück zum Zitat Walters, J.P., Liang, Z., Shi, W., Chaudhary, V.: Wireless sensor network security: a survey. Secur. Distrib Grid Pervasive Comput. 3, 10–15 (2006) Walters, J.P., Liang, Z., Shi, W., Chaudhary, V.: Wireless sensor network security: a survey. Secur. Distrib Grid Pervasive Comput. 3, 10–15 (2006)
10.
Zurück zum Zitat Hu, Y.C., Perrig, A., Johnson, D.B.: Packet leashes: a defense against wormhole attacks in wireless networks. In: INFOCOM, Twenty-Second Annual Joint Conference of the IEEE Computer and Communication Societies, vol. 3, pp. 1976–1986 (2003) Hu, Y.C., Perrig, A., Johnson, D.B.: Packet leashes: a defense against wormhole attacks in wireless networks. In: INFOCOM, Twenty-Second Annual Joint Conference of the IEEE Computer and Communication Societies, vol. 3, pp. 1976–1986 (2003)
11.
Zurück zum Zitat Mahajan, V., Natu, M., Sethi, A.: Analysis of wormhole intrusion attacks in manets. In: Proceedings of IEEE Military Communications Conference (MILCOM), pp. 1–7 (2008) Mahajan, V., Natu, M., Sethi, A.: Analysis of wormhole intrusion attacks in manets. In: Proceedings of IEEE Military Communications Conference (MILCOM), pp. 1–7 (2008)
12.
Zurück zum Zitat Mohammadi, S., Atani, R.E., Jadidoleslamy, H.: A comparison of link layer attacks on wireless sensor networks. J. Inf. Secur. 4, 69–84 (2011) Mohammadi, S., Atani, R.E., Jadidoleslamy, H.: A comparison of link layer attacks on wireless sensor networks. J. Inf. Secur. 4, 69–84 (2011)
13.
Zurück zum Zitat Lopez, J., Roman, R., Alcaraz, C.: Analysis of security threats, requirements, technologies and standards in wireless sensor networks. Found. Secur. Anal. Des. 57, 289–338 (2009) Lopez, J., Roman, R., Alcaraz, C.: Analysis of security threats, requirements, technologies and standards in wireless sensor networks. Found. Secur. Anal. Des. 57, 289–338 (2009)
14.
Zurück zum Zitat Chen, X., Makki, K., Yen, K., Pissinou, N.: Sensor network security: a survey. IEEE Commun. Surv. Tutor. 11, 52–73 (2009)CrossRef Chen, X., Makki, K., Yen, K., Pissinou, N.: Sensor network security: a survey. IEEE Commun. Surv. Tutor. 11, 52–73 (2009)CrossRef
15.
Zurück zum Zitat Law, Y.W., Havinga, P.J.: How to secure a wireless sensor network. In: Proceeding of the International Conference on Intelligent Sensors, Sensor Networks and Information Processing Conference, pp. 89–95 (2005) Law, Y.W., Havinga, P.J.: How to secure a wireless sensor network. In: Proceeding of the International Conference on Intelligent Sensors, Sensor Networks and Information Processing Conference, pp. 89–95 (2005)
16.
Zurück zum Zitat Kyriazanos, D.M., Prasad, N.R., Patrikakis, C.Z.: A security, privacy and trust architecture for wireless sensor networks. In: Proceedings 50th International Symposium ELMAR, pp. 523–529 (2008) Kyriazanos, D.M., Prasad, N.R., Patrikakis, C.Z.: A security, privacy and trust architecture for wireless sensor networks. In: Proceedings 50th International Symposium ELMAR, pp. 523–529 (2008)
17.
Zurück zum Zitat Hoffman, K., Zage, D., Rotaru, C.N.: A survey of attack and defense techniques for reputation systems. ACM Comput. Surv. 42, 1–31 (2009)CrossRef Hoffman, K., Zage, D., Rotaru, C.N.: A survey of attack and defense techniques for reputation systems. ACM Comput. Surv. 42, 1–31 (2009)CrossRef
18.
Zurück zum Zitat Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: Proceeding of the IEEE Symposium on Security and Privacy, pp. 164–173 (1996) Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: Proceeding of the IEEE Symposium on Security and Privacy, pp. 164–173 (1996)
19.
Zurück zum Zitat Chapin, P., Skalka, C., Wang, X.: Authorization in trust management: features and foundations. ACM Comput. Surv. 40, 1–48 (2008)CrossRef Chapin, P., Skalka, C., Wang, X.: Authorization in trust management: features and foundations. ACM Comput. Surv. 40, 1–48 (2008)CrossRef
20.
Zurück zum Zitat Grandison, T., Sloman, M.A.: Survey of trust in internet applications. IEEE Commun. Surv. Tutor. 3, 2–16 (2000)CrossRef Grandison, T., Sloman, M.A.: Survey of trust in internet applications. IEEE Commun. Surv. Tutor. 3, 2–16 (2000)CrossRef
21.
Zurück zum Zitat Momani, M., Challa, S., Alhmouz, R.: Can we trust trusted nodes in wireless sensor networks? Proce. Int. Conf. Comput. Commun. Eng. 3, 1227–1232 (2008) Momani, M., Challa, S., Alhmouz, R.: Can we trust trusted nodes in wireless sensor networks? Proce. Int. Conf. Comput. Commun. Eng. 3, 1227–1232 (2008)
22.
Zurück zum Zitat Lin, C., Varadharajan, V.A.: Hybrid trust model for enhancing security in distributed systems. In: Proceedings of the Second International Conference on Availability, Reliability and Security, pp. 35–42 (2007) Lin, C., Varadharajan, V.A.: Hybrid trust model for enhancing security in distributed systems. In: Proceedings of the Second International Conference on Availability, Reliability and Security, pp. 35–42 (2007)
23.
Zurück zum Zitat Abdul-Rahman, A., Hailes, S.: Supporting trust in virtual communities. In: Proceeding of the 33rd IEEE Hawaii International Conference on System Sciences, pp. 4–7 (2000) Abdul-Rahman, A., Hailes, S.: Supporting trust in virtual communities. In: Proceeding of the 33rd IEEE Hawaii International Conference on System Sciences, pp. 4–7 (2000)
24.
Zurück zum Zitat Zhou, M., Dresner, M., Windle, R.: Online reputation systems: design and strategic practices. Decis. Support Syst. 44, 785–797 (2008)CrossRef Zhou, M., Dresner, M., Windle, R.: Online reputation systems: design and strategic practices. Decis. Support Syst. 44, 785–797 (2008)CrossRef
25.
Zurück zum Zitat Tafreschi, O., Maler, D., Fengel, J., Rebstock, M., Eckert, C.: A reputation system for electronic negotiations. Comput. Stand. Int. 30, 351–360 (2008)CrossRef Tafreschi, O., Maler, D., Fengel, J., Rebstock, M., Eckert, C.: A reputation system for electronic negotiations. Comput. Stand. Int. 30, 351–360 (2008)CrossRef
26.
Zurück zum Zitat Ziegler, C.-N., Golbeck, J.: Investigating interactions of trust and interest similarity. Decis. Support Syst. 43, 460–475 (2007)CrossRef Ziegler, C.-N., Golbeck, J.: Investigating interactions of trust and interest similarity. Decis. Support Syst. 43, 460–475 (2007)CrossRef
27.
Zurück zum Zitat Bo ukerche, A., Ren, Y.: A trust-based security system for ubiquitous and pervasive computing environments. Comput. Commun. 31, 4343–4351 (2008) Bo ukerche, A., Ren, Y.: A trust-based security system for ubiquitous and pervasive computing environments. Comput. Commun. 31, 4343–4351 (2008)
28.
Zurück zum Zitat Sun, Y.L., Han, Z., Yu, W., Liu, K.J.R.: A trust evaluation framework in distributed networks: vulnerability analysis and defense against attacks. In: IEEE INFOCOM, pp. 1–13 (2006) Sun, Y.L., Han, Z., Yu, W., Liu, K.J.R.: A trust evaluation framework in distributed networks: vulnerability analysis and defense against attacks. In: IEEE INFOCOM, pp. 1–13 (2006)
29.
Zurück zum Zitat Qi, J.-J., Li, Z.-Z., Wei, L.: A trust model based on bayesian approach. IEEE INFOCOM Adv. Web Intell. 35, 374–379 (2005)CrossRef Qi, J.-J., Li, Z.-Z., Wei, L.: A trust model based on bayesian approach. IEEE INFOCOM Adv. Web Intell. 35, 374–379 (2005)CrossRef
30.
31.
Zurück zum Zitat King-Casas, B., Tomlin, D., Anen, C., Camerer, C.F., Quartz, S.R., Montague, P.R.: Getting to know you: reputation and trust in a two-person economic exchange. Science 308, 78–80 (2005)CrossRef King-Casas, B., Tomlin, D., Anen, C., Camerer, C.F., Quartz, S.R., Montague, P.R.: Getting to know you: reputation and trust in a two-person economic exchange. Science 308, 78–80 (2005)CrossRef
32.
Zurück zum Zitat Jaramillo, J., Srikant, R.: Darwin: distributed and adaptive reputation mechanism for wireless ad hoc networks. In: Proceedings of the 13th Annual ACM International Conference on Mobile Computing and Networking, pp. 87–98 (2007) Jaramillo, J., Srikant, R.: Darwin: distributed and adaptive reputation mechanism for wireless ad hoc networks. In: Proceedings of the 13th Annual ACM International Conference on Mobile Computing and Networking, pp. 87–98 (2007)
33.
Zurück zum Zitat Komathyk, K., Narayanasamy, P.: Trust-based evolutionary game model assisting AODV routing against selfishness. J. Netw. Comput. Appl. 31, 446–471 (2008)CrossRef Komathyk, K., Narayanasamy, P.: Trust-based evolutionary game model assisting AODV routing against selfishness. J. Netw. Comput. Appl. 31, 446–471 (2008)CrossRef
34.
Zurück zum Zitat Papaioannou, T., Stamoulis, G.: Achieving honest ratings with reputation-based fines in electronic markets. In: Proceedings of IEEE INFOCOM, pp. 1040–1048 (2008) Papaioannou, T., Stamoulis, G.: Achieving honest ratings with reputation-based fines in electronic markets. In: Proceedings of IEEE INFOCOM, pp. 1040–1048 (2008)
35.
Zurück zum Zitat Caticha, A., Giffin, A.: Updating probabilities. In: The 26th International Workshop on Bayesian Inference and Maximum Entropy Methods, vol. 872, pp. 31–42 (2006) Caticha, A., Giffin, A.: Updating probabilities. In: The 26th International Workshop on Bayesian Inference and Maximum Entropy Methods, vol. 872, pp. 31–42 (2006)
36.
Zurück zum Zitat Marmol, F.G., Girao, J., Perez, G.M.: Trims, a privacy-aware trust and reputation model for identity management systems. Comput. Netw. 54, 2899–2912 (2010)CrossRef Marmol, F.G., Girao, J., Perez, G.M.: Trims, a privacy-aware trust and reputation model for identity management systems. Comput. Netw. 54, 2899–2912 (2010)CrossRef
37.
Zurück zum Zitat Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.: SPINS: security protocols for sensor networks. J. Wirel. Nets 8, 521–534 (2002)CrossRefMATH Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.: SPINS: security protocols for sensor networks. J. Wirel. Nets 8, 521–534 (2002)CrossRefMATH
38.
Zurück zum Zitat Eschenauer, L., Gligor, V.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communication Security, pp. 41–47. ACM Press (2002) Eschenauer, L., Gligor, V.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communication Security, pp. 41–47. ACM Press (2002)
Metadaten
Titel
Recognizing Attacks in Wireless Sensor Network in View of Internet of Things
verfasst von
D. P. Acharjya
N. Syed Siraj Ahmed
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-53472-5_7