Skip to main content
Erschienen in: Wireless Personal Communications 2/2019

23.10.2018

Using Improved Hilbert–Huang Transformation Method to Detect Routing-Layer Reduce of Quality Attack in Wireless Sensor Network

Erschienen in: Wireless Personal Communications | Ausgabe 2/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Denial of Service (DoS) attack is a serious threat to the security of Wireless Sensor Netwokr (WSN). Moreover, Reduce of Quality (RoQ) attack is a special DoS attack type. The RoQ attack is a potential DoS attack, it is simulator to normal traffic,so it is difficult to be detected by traditional detection method. Hilbert–Huang Transform (HHT) time–frequency analysis method can be used to analyze the non-linear signal generated by RoQ attack. However, mode mixing and false component are the challenge problems to analyze the RoQ attack by HHT method. Ensemble empirical mode decomposition (EEMD) method is used to eliminate the mode mixing problem. Correlated coefficient method is used to recognize the false components. In this paper, EEMD and correlated coefficient methods are combined to detect the weak signal generated by RoQ attack. Ad Hoc On-demand Multi-path Distance Vector routing protocol and random Routing REQuest flooding attack are simulated to implement RoQ attack in wireless sensor network by Network Simulator. Suitable white noises are added to original signal to detect the weak RoQ attack signal. Experiment results show that the improved HHT methods are highly effective to detect RoQ attack, when the standard deviation of white noise is 0.01 and the number of ensemble is 80, the detection results is best. When the correlated coefficient of intrinsic mode functions (IMFs) is greater than 0.2, the IMFs can be used to analyze and detect RoQ attack. To our knowledge, this is the first quantitative experiment and method research on the routing-layer RoQ attack detection in WSN.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Krishna Chaitanya, D., Ghosh, A., & Ever, E. (2011). Analysis of denial of service attacks on wireless sensor networks using simulation. In Kaspersky Lab IT security conference for the next generation, Erfurt, Germany, January 27–30. Krishna Chaitanya, D., Ghosh, A., & Ever, E. (2011). Analysis of denial of service attacks on wireless sensor networks using simulation. In Kaspersky Lab IT security conference for the next generation, Erfurt, Germany, January 27–30.
2.
Zurück zum Zitat He, Y.et al. (2009). Reduction of Quality (RoQ) attacks on structured peer-to-peer networks. In IEEE international parallel and distributed processing symposium (IPDPS 09). He, Y.et al. (2009). Reduction of Quality (RoQ) attacks on structured peer-to-peer networks. In IEEE international parallel and distributed processing symposium (IPDPS 09).
3.
Zurück zum Zitat Guirguis, M., Bestavros, A., Matta, I., & Zhang, Y. (2005). Reduction of Quality (RoQ) attacks on internet end- systems. IEEE INFOCOM, 2, 1362–1372. Guirguis, M., Bestavros, A., Matta, I., & Zhang, Y. (2005). Reduction of Quality (RoQ) attacks on internet end- systems. IEEE INFOCOM, 2, 1362–1372.
4.
Zurück zum Zitat Chen, W., Zhang, Y., & Wei, Y. (2008). The feasibility of launching Reduction of Quality (RoQ) attacks in 802.11 wireless networks. In International conference on parallel and distributed systems - ICPADS 2008 (pp. 517–524). Chen, W., Zhang, Y., & Wei, Y. (2008). The feasibility of launching Reduction of Quality (RoQ) attacks in 802.11 wireless networks. In International conference on parallel and distributed systems - ICPADS 2008 (pp. 517–524).
5.
Zurück zum Zitat Barros, U., Bouet, M., Santos, T. A., & Nogueira, M. (2010). Assessing RoQ attacks on MANETs over aware and unaware TPC techniques. In 2010 International conference on network and service management (pp. 1–5). Barros, U., Bouet, M., Santos, T. A., & Nogueira, M. (2010). Assessing RoQ attacks on MANETs over aware and unaware TPC techniques. In 2010 International conference on network and service management (pp. 1–5).
6.
Zurück zum Zitat Ren, W., Yeung, D.-Y., & Jin, H. (2007). Pulsing RoQ DDoS attack and defense scheme in mobile ad hoc networks. International Journal of Network Security, 4(2), 227–234. Ren, W., Yeung, D.-Y., & Jin, H. (2007). Pulsing RoQ DDoS attack and defense scheme in mobile ad hoc networks. International Journal of Network Security, 4(2), 227–234.
7.
Zurück zum Zitat Wen, K., Yang, J., Cheng, F., Li, C., Wang, Z., & Yin, H. (2014). Two-stage detection algorithm for RoQ attack based on localized periodicity analysis of traffic anomaly. In ICCCN, 2014 (pp. 1–6). Wen, K., Yang, J., Cheng, F., Li, C., Wang, Z., & Yin, H. (2014). Two-stage detection algorithm for RoQ attack based on localized periodicity analysis of traffic anomaly. In ICCCN, 2014 (pp. 1–6).
8.
Zurück zum Zitat Hong, R., Hui-Mei, W., & Ming, X. (2013). A novel method for detecting Reduction of Quality (RoQ) attack based on fast independent component analysis. Journal of Electronics & Information Technology, 35(10), 2307–2313. Hong, R., Hui-Mei, W., & Ming, X. (2013). A novel method for detecting Reduction of Quality (RoQ) attack based on fast independent component analysis. Journal of Electronics & Information Technology, 35(10), 2307–2313.
9.
Zurück zum Zitat Torrence, C., & Compo, G. (1998). A practical guide to wavelet analysis. Bulletin of the American Meteorological Society, 79(1), 61–78.CrossRef Torrence, C., & Compo, G. (1998). A practical guide to wavelet analysis. Bulletin of the American Meteorological Society, 79(1), 61–78.CrossRef
10.
Zurück zum Zitat Huang, N. E., Shen, Z., & Long, S. R. (1998). The empirical ode decomposition and the Hilbert spectrum for nonlinear and non-stationary time series analysis. Proceedings of the Royal Society of London A, 454, 903–995.CrossRefMATH Huang, N. E., Shen, Z., & Long, S. R. (1998). The empirical ode decomposition and the Hilbert spectrum for nonlinear and non-stationary time series analysis. Proceedings of the Royal Society of London A, 454, 903–995.CrossRefMATH
11.
Zurück zum Zitat Kangfeng, Z., Xiujuan, W., Yixian, Y., & Shize, G. (2011). Detecting DDoS attack With Hilbert–Huang transformation. China Communications, 8(2), 126–133. Kangfeng, Z., Xiujuan, W., Yixian, Y., & Shize, G. (2011). Detecting DDoS attack With Hilbert–Huang transformation. China Communications, 8(2), 126–133.
12.
Zurück zum Zitat Han, J., & Zhang, J. Z. (2013). Network traffic anomaly detection using weighted self-similarity based on EMD. In 2013 Proceedings of IEEE Southeastcon, Southeastcon (pp. 1–5). Han, J., & Zhang, J. Z. (2013). Network traffic anomaly detection using weighted self-similarity based on EMD. In 2013 Proceedings of IEEE Southeastcon, Southeastcon (pp. 1–5).
13.
Zurück zum Zitat Han, J. (2013). Network traffic anomaly detection using EMD and Hilbert-Huan transform. 2013 Western Carolina University (WCU) Thesis. Han, J. (2013). Network traffic anomaly detection using EMD and Hilbert-Huan transform. 2013 Western Carolina University (WCU) Thesis.
14.
Zurück zum Zitat Le, A., & Loo, J. (2013). The impact of rank attack on network topology of routing protocol for low-power and lossy networks. IEEE Sensors Journal, 13(10), 3685–3692.CrossRef Le, A., & Loo, J. (2013). The impact of rank attack on network topology of routing protocol for low-power and lossy networks. IEEE Sensors Journal, 13(10), 3685–3692.CrossRef
15.
Zurück zum Zitat Hsueh, C.-T., & Wen, Chih-Yu. (2015). A secure scheme against power exhausting attacks in hierarchical wireless sensor networks. IEEE Sensors Journal, 15(6), 3590–3602.CrossRef Hsueh, C.-T., & Wen, Chih-Yu. (2015). A secure scheme against power exhausting attacks in hierarchical wireless sensor networks. IEEE Sensors Journal, 15(6), 3590–3602.CrossRef
16.
Zurück zum Zitat Shiravi, A., Shiravi, H., Tavallaee, M., & Ghorbani, A. A. (2012). Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Computers & Security, 31(3), 357–374.CrossRef Shiravi, A., Shiravi, H., Tavallaee, M., & Ghorbani, A. A. (2012). Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Computers & Security, 31(3), 357–374.CrossRef
17.
Zurück zum Zitat Hamedheidari, S., & Rafeh, R. (2013). A novel agent-based approach to detect sinkhole attacks in wireless sensor networks. Computers & Security, 37(20), 1–14.CrossRef Hamedheidari, S., & Rafeh, R. (2013). A novel agent-based approach to detect sinkhole attacks in wireless sensor networks. Computers & Security, 37(20), 1–14.CrossRef
18.
Zurück zum Zitat Hongsong, C., Zhenzhou, J., & Mingzeng, H. (2007). Design and performance evaluation of a multi-agent-based dynamic lifetime security scheme for AODV routing protocol. Journal of Network & Computer Applications, 30(1), 145–166.CrossRef Hongsong, C., Zhenzhou, J., & Mingzeng, H. (2007). Design and performance evaluation of a multi-agent-based dynamic lifetime security scheme for AODV routing protocol. Journal of Network & Computer Applications, 30(1), 145–166.CrossRef
19.
Zurück zum Zitat Huang, N. E., Shen, Z., & Long, S. R. (1999). A new view of nonlinear water waves: The Hilbert spectrum. Annual Review of Fluid Mechanics, 31, 417–457.MathSciNetCrossRef Huang, N. E., Shen, Z., & Long, S. R. (1999). A new view of nonlinear water waves: The Hilbert spectrum. Annual Review of Fluid Mechanics, 31, 417–457.MathSciNetCrossRef
20.
Zurück zum Zitat Wu, Z., & Huang, N. E. (2009). Ensemble empirical mode decomposition: A noise-assisted data analysis method. Advances in Adaptive Data Analysis, 1, 1–41.CrossRef Wu, Z., & Huang, N. E. (2009). Ensemble empirical mode decomposition: A noise-assisted data analysis method. Advances in Adaptive Data Analysis, 1, 1–41.CrossRef
22.
Zurück zum Zitat Zhang, W., Wang, C., & Wang, H. (2012). Hilbert–Huang transform-based electrostatic signal analysis of ring-shape electrodes with different widths. IEEE Instrumentation and Measurement Society, 64(5), 1209–1217.CrossRef Zhang, W., Wang, C., & Wang, H. (2012). Hilbert–Huang transform-based electrostatic signal analysis of ring-shape electrodes with different widths. IEEE Instrumentation and Measurement Society, 64(5), 1209–1217.CrossRef
23.
Zurück zum Zitat Wang, L., Yan, Y., Hu, Y., & Qian, X. (2014). Rotational speed measurement through electrostatic sensing and correlation signal processing. IEEE Transactions on Instrumentation and Measurement, 63(5), 1190–1199.CrossRef Wang, L., Yan, Y., Hu, Y., & Qian, X. (2014). Rotational speed measurement through electrostatic sensing and correlation signal processing. IEEE Transactions on Instrumentation and Measurement, 63(5), 1190–1199.CrossRef
24.
Zurück zum Zitat Chen, H., Bhargava, B., & Zhongchuan, F. (2014). Multilabels-based scalable access control for big data applications. IEEE Cloud Computing Magazine, 1(3), 65–71.CrossRef Chen, H., Bhargava, B., & Zhongchuan, F. (2014). Multilabels-based scalable access control for big data applications. IEEE Cloud Computing Magazine, 1(3), 65–71.CrossRef
Metadaten
Titel
Using Improved Hilbert–Huang Transformation Method to Detect Routing-Layer Reduce of Quality Attack in Wireless Sensor Network
Publikationsdatum
23.10.2018
Erschienen in
Wireless Personal Communications / Ausgabe 2/2019
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-018-6036-3

Weitere Artikel der Ausgabe 2/2019

Wireless Personal Communications 2/2019 Zur Ausgabe

Neuer Inhalt