Skip to main content

Weak Process Models for Attack Detection in a Clustered Sensor Network Using Mobile Agents

  • Conference paper
Book cover Sensor Systems and Software (S-CUBE 2009)

Abstract

This paper proposes a methodology for detecting network-layer anomalies in wireless sensor networks using weak process models (WPM). Weak process models are a non-parametric version of Hidden Markov models (HMM), wherein state transition probabilities are reduced to rules of reachability. Specifically, we present an intrusion detection system based on anomaly detection logic. It identifies any observable event correlated to a threat by applying a set of anomaly rules to the incoming traffic. Attacks are classified into low and high potential attacks according to its final state. Alarms are issued as soon as one or more high potential attacks are detected.

We model hello flooding, sinkhole and wormhole. We introduced single threat models and aggregated models and study how effective they are to detect each attack.

We present the design approach for the proposed WPM-based detection technique using mobile agents. Early implementations of the agent based secure platform have already been implemented.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Roosta, T., Shieh, S., Sastry, S.: Taxonomy of security attacks in sensor networks. In: First IEEE International Conference on System Integration and Reliability Improvements, Hanoi, Vietnam, vol. 1, pp. 529–536 (2006)

    Google Scholar 

  2. Debar, H., Dacier, M., Wespi, A.: Towards a Taxonomy of Intrusion-Detection Systems. Computer Networks: The International Journal of Computer and Telecommunications Networking 31(9), 805–822 (1999)

    Article  Google Scholar 

  3. Forney, G.: The Viterbi Algorithm. Proc. IEEE 61(3), 268–278 (1973)

    Article  MathSciNet  Google Scholar 

  4. Pugliese, M., Giani, A., Santucci, F.: A Weak Process Approach to Anomaly Detection in Wireless Sensor Networks. In: First International Workshop on Sensor Networks (SN 2008), Virgin Islands (2008)

    Google Scholar 

  5. Ephraim, Y., Merhav, N.: Hidden Markov Processes. IEEE Trans. Informormation Theory 48(6) (2002)

    Google Scholar 

  6. Loo, C., Ng, M., Leckie, C., Palaniswami, M.: Intrusion Detection for Routing Attacks in Sensor Networks. International Journal of Distributed Sensor Networks (2005)

    Google Scholar 

  7. Doumit, S., Agrawal, D.: Self Organized Critically and Stochastic Learning Based Intrusion Detection System for Wireless Sensor Networks. In: Military Communications Conference, MILCOM (2003)

    Google Scholar 

  8. Jiang, G.: Robust process detection using nonparametric weak models. International Journal of Intelligent Control and Systems 10 (2005)

    Google Scholar 

  9. Yin, Q., Shen, L., Zhang, R., Li, X., Wang, H.: Intrusion Detection Based on Hidden Markov Model. In: International Conference on Machine Learning and Cybernetics, vol. 5, pp. 3115–3118 (2003)

    Google Scholar 

  10. Khanna, R., Liu, H.: System Approach to Intrusion Detection Using Hidden Markov Model. In: Proceedings of the international conference on Wireless communications and mobile computing, vol. 5, pp. 349–354 (2006)

    Google Scholar 

  11. Sheng, Y., Cybenko, G.: Distance Measures for Nonparametric Weak Process Models. In: IEEE International Conference on Systems, Man and Cybernetics, vol. 1, pp. 722–727 (2005)

    Google Scholar 

  12. Giani, A.: Detection of Attacks on Cognitive Channels. Ph.D. Thesis, Dartmouth College, Hanover, NH, USA (2006)

    Google Scholar 

  13. Silva, A., Martins, M., Rocha, B., Loureiro, A., Ruiz, L., Wong, H.: Decentralized Intrusion Detection in wireless sensor networks. In: Proceedings of the 1st ACM International Workshop on Quality of service and security in wireless and mobile Networks (2005)

    Google Scholar 

  14. Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: Attacks and countermeasures. In: 1st IEEE International Workshop on Sensor Network Protocols and Applications, vol. 10 (2003)

    Google Scholar 

  15. Rabiner, L., Juang, B.: An Introduction to Hidden Markov Models. IEEE ASSP Magazine, 4–16 (1986)

    Google Scholar 

  16. http://www.tinyos.net/tinyos2.x/doc

  17. Pugliese, M., Santucci, F.: Pair-wise Network Topology Authenticated Hybrid Cryptographic Keys for Wireless Sensor Networks using Vector Algebra. In: 4th IEEE International Workshop on Wireless Sensor Networks Security (WSNS 2008), Atlanta (2008)

    Google Scholar 

  18. Whitman, M., Mattord, H.: Principles of Information Security, 3rd edn. Thomson (2009)

    Google Scholar 

  19. Ross, A.: Security Engineering. Wiley, New York (2001)

    Google Scholar 

  20. Baker, Z., Prasanna, V.: Computationally-efficient engine for flexible intrusion detection (2005)

    Google Scholar 

  21. Dainotti, A., Pescape, A., Rossi, P., Palmieri, F., Ventre, G.: Internet Traffic modeling by means of Hidden Markov Models. Computer Networks 54, 2645–2662 (2008)

    Article  MATH  Google Scholar 

  22. Al-Subaie, M., Zulkernine, M.: Efficacy of Hidden Markov Models Over Neural Networks in Anomaly Intrusion Detection. In: Proceedings of the 30th Annual International Computer Software and Applications Conference (COMPSAC), vol. 1, pp. 325–332 (2006)

    Google Scholar 

  23. Wang, W., Guan, X., Zhang, X.: Modeling program behaviors by hidden Markov models for intrusion detection. In: Proceedings of 2004 International Conference on Machine Learning and Cybernetics, vol. 5, pp. 2830–2835 (2004)

    Google Scholar 

  24. Luk, M., Mezzour, G., Perrig, A., Gligor, V.: MiniSec: A Secure Sensor Network Communication Architecture. In: Proceedings of the Sixth International Conference on Information Processing in Sensor Networks (IPSN) (April 2007)

    Google Scholar 

  25. Hu, Y., Perrig, A., Johnson, D.: Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks. In: Proceedings of the INFOCOM 2003 (2003)

    Google Scholar 

  26. Law, Y., Havinga, P., Johnson, D.: How to Secure a Wireless Sensor Network. In: Proc. of the International Conference on Intelligent Sensors, Sensor Networks and Information Processing Conference (2005)

    Google Scholar 

  27. Ngai, E., Liu, J., Lyu, M.: On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks. In: Proc. of the IEEE International Conference on Communications, ICC 2006 (2006)

    Google Scholar 

  28. Krontiris, I., Dimitriou, T., Giannetsos, T., Mpasoukos, M.: Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks. In: Proc. 3rd International Workshop on Algorithmic Aspects of Wireless Sensor Networks, AlgoSensors 2007 (2007)

    Google Scholar 

  29. Dallas, D., Leckie, C., Ramamohanarao, K.: Hop-Count Monitoring: Detecting Sinkhole Attacks in Wireless Sensor Networks. In: Proc. of the 15th IEEE International Conference on Networks, ICON 2007 (2007)

    Google Scholar 

  30. Brust, M.R., Andronache, A., Rothkugel, S., Benenson, Z.: Topology-based Clusterhead Candidate Selection in Wireless Ad-hoc and Sensor Networks. In: 2nd International Conference on Communication Systems Software and Middleware, COMSWARE 2007, pp. 1–8 (2007)

    Google Scholar 

  31. Fok, C.-L., Roman, G.C., Lu, C.: Agilla: A Mobile Agent Middleware for Sensor Networks. Tech. Report, Washington University in St. Louis, WUCSE-2006-16 (2006)

    Google Scholar 

  32. Balasubramainyan, J., Garcia-Fernandez, J.O., Isacoff, D., Spafford, E., Zamboni, D.: An architecture of Intrusion Detection using Autonomous Agents, Department of Computer Science, Purdue University TR 98-05 (1998)

    Google Scholar 

  33. Vahid Dastjerdi, A., Abu Bakar, K.: A Novel Hybrid Mobile Agent Based Distributed Intrusion Detection System. Proc. of World Academy of Science Engineering and Technology 35 (November 2008)

    Google Scholar 

  34. Ramachandran, G., Hart, D.: A P2P Intrusion Detection System based on Mobile Agents. ACM, New York (2004)

    Book  Google Scholar 

  35. Zhou, C.V., Karunasekera, S., Leckie, C.: A Peer-to-Peer Collaborative Intrusion Detection System. In: Proc. of 13th IEEE International Conference on Communications, ICC 2005 (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Pugliese, M., Giani, A., Santucci, F. (2010). Weak Process Models for Attack Detection in a Clustered Sensor Network Using Mobile Agents. In: Hailes, S., Sicari, S., Roussos, G. (eds) Sensor Systems and Software. S-CUBE 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 24. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-11528-8_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-11528-8_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-11527-1

  • Online ISBN: 978-3-642-11528-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics