TU Darmstadt / ULB / TUbiblio

Lightweight Detection of Denial-of-Service Attacks on Wireless Sensor Networks Revisited

Riecker, Michael ; Almon, Lars ; Hollick, Matthias (2017)
Lightweight Detection of Denial-of-Service Attacks on Wireless Sensor Networks Revisited.
2017 IEEE 42nd Conference on Local Computer Networks (LCN). Singapore (09.10.2017-12.10.2017)
doi: 10.1109/LCN.2017.110
Conference or Workshop Item, Bibliographie

Abstract

The resource-constrained nature of sensor nodes makes wireless sensor networks (WSNs) especially susceptible to denial-of-service (DoS) attacks. Due to the wireless communication medium, it is difficult to prevent attacks such as jamming. Hence, mechanisms to detect attacks during operation are required. The current generation of intrusion detection systems are still rather heavyweight, as some form of collaboration is typically needed. In this paper, we study the behavior of a large number of node-centric metrics under jamming and blackhole attacks, by applying a logistic regression. In our experiments, we vary several parameters, such as traffic intensity, transmission power, and attacker location. We consider the most common topologies in wireless sensor networks such as central data collection and meshed multi-hop networks by using the collection tree and the mesh protocol. The created regression models are then used to implement a fully localized intrusion detection system requiring no collaboration, showing that certain models can be generalized to different networks.

Item Type: Conference or Workshop Item
Erschienen: 2017
Creators: Riecker, Michael ; Almon, Lars ; Hollick, Matthias
Type of entry: Bibliographie
Title: Lightweight Detection of Denial-of-Service Attacks on Wireless Sensor Networks Revisited
Language: English
Date: 2017
Publisher: IEEE
Event Title: 2017 IEEE 42nd Conference on Local Computer Networks (LCN)
Event Location: Singapore
Event Dates: 09.10.2017-12.10.2017
DOI: 10.1109/LCN.2017.110
URL / URN: https://ieeexplore.ieee.org/document/8109386
Abstract:

The resource-constrained nature of sensor nodes makes wireless sensor networks (WSNs) especially susceptible to denial-of-service (DoS) attacks. Due to the wireless communication medium, it is difficult to prevent attacks such as jamming. Hence, mechanisms to detect attacks during operation are required. The current generation of intrusion detection systems are still rather heavyweight, as some form of collaboration is typically needed. In this paper, we study the behavior of a large number of node-centric metrics under jamming and blackhole attacks, by applying a logistic regression. In our experiments, we vary several parameters, such as traffic intensity, transmission power, and attacker location. We consider the most common topologies in wireless sensor networks such as central data collection and meshed multi-hop networks by using the collection tree and the mesh protocol. The created regression models are then used to implement a fully localized intrusion detection system requiring no collaboration, showing that certain models can be generalized to different networks.

Uncontrolled Keywords: Wireless Sensor Networks; Denial-of-Service; Intrusion Detection
Divisions: 20 Department of Computer Science
20 Department of Computer Science > Sichere Mobile Netze
LOEWE
LOEWE > LOEWE-Schwerpunkte
LOEWE > LOEWE-Schwerpunkte > NiCER – Networked infrastructureless Cooperation for Emergency Response
LOEWE > LOEWE-Zentren
LOEWE > LOEWE-Zentren > CRISP - Center for Research in Security and Privacy
Date Deposited: 22 Jan 2019 07:13
Last Modified: 23 Aug 2021 12:38
PPN:
Export:
Suche nach Titel in: TUfind oder in Google
Send an inquiry Send an inquiry

Options (only for editors)
Show editorial Details Show editorial Details