A Hybrid Threat Detection and Security Adaptation System for Industrial Wireless Sensor Networks

  • Mohammed Bahria
  • Alexis Olivereau
  • Aymen Boudguiga
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8221)

Abstract

Wireless Sensor Networks (WSNs) led the way to new forms of communications, which extend today the Internet paradigm to unforeseen boundaries. The legacy industry, however, is slower to adopt this technology, mainly for security reasons. Self-managed security systems allowing a quicker detection of and better resilience to attacks, may counterbalance this reluctance. We propose in this paper a hybrid threat detection and security adaptation system, designed to run on top of industrial WSNs. We explain why this system is suitable for architectures mainly composed of constrained or sleeping devices, while being able to achieve a fair level of autonomous security.

Keywords

Threat detection sensor network security adaptation 

References

  1. 1.
    Refaei, M.T., Srivastava, V., DaSilva, L., Eltoweissy, M.: A reputation-based mechanism for isolating selfish nodes in ad hoc networks. In: Mobile and Ubiquitous Systems: Networking and Services, MobiQuitous 2005 (July 2005)Google Scholar
  2. 2.
    Debar, H., Thomas, Y., Cuppens, F., Cuppens-Boulahia, N.: Enabling automated threat response through theuse of a dynamic security policy. Journal in Computer Virology (JCV) 3 (August 2007)Google Scholar
  3. 3.
    Wander, A., Gura, N., Eberle, H., Gupta, V., Shantz, S.C.: Energy analysis of public-key cryptography for wireless sensor networks. In: Third IEEE International Conference on Pervasive Computing and Communications, pp. 324–328 (2005)Google Scholar
  4. 4.
    Roman, R., Zhou, J., Lopez, J.: Applying intrusion detection systems to wireless sensor networks. In: Proceedings of IEEE Consumer Communications and Networking Conference (CCNC 2006), Las Vegas, USA, pp. 640–644 (January 2006)Google Scholar
  5. 5.
    Ioannis, K., et al.: Toward Intrusion Detection in Sensor Networks. In: 13th European Wireless Conference, Paris (2007)Google Scholar
  6. 6.
    Huang, Y.-A., Lee, W.: A cooperative intrusion detection system for ad hoc networks. In: Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, Fairfax, Virginia, October 31 (2003)Google Scholar
  7. 7.
    Ma, J., Zhang, S., Zhong, Y., Tong, X.: SAID: A self-adaptive intrusion detection system in wireless sensor networks. In: Proceedings of the 7th International Conference on Information Security Applications: Part I, Jeju Island, Korea, August 28-30 (2006)Google Scholar
  8. 8.
    Lacoste, M., Privat, G., Ramparany, F.: Evaluating confidence in context for context-aware security. In: Schiele, B., Dey, A.K., Gellersen, H., de Ruyter, B., Tscheligi, M., Wichert, R., Aarts, E., Buchmann, A.P. (eds.) AmI 2007. LNCS, vol. 4794, pp. 211–229. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  9. 9.
    Younis, M., Krajewski, N., Farrag, O.: Adaptive security provision for increased energy efficiency in Wireless Sensor Networks. In: 2009 IEEE 34th Conference on Local Computer Networks, pp. 999–1005 (October 2009)Google Scholar
  10. 10.
    Taddeo, A.V., Micconi, L., Ferrante, A.: Gradual adaptation of security for sensor networks. In: Proceedings of the IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks, pp. 1–9. IEEE (2010)Google Scholar
  11. 11.
    Shi, K., Qin, X., Cheng, Q., Cheng, Y.: Designing a Reconfigurable Security Architecture for Wireless Sensor Networks. In: World Congress on Software Engineering, pp. 154–158. IEEE (2009)Google Scholar
  12. 12.
    Hsieh, M.-Y., Huang, Y.-M., Chao, H.-C.: Adaptive security design with malicious node detection in cluster-based sensor networks. Computer Communications 30(11-12), 2385–2400 (2007)CrossRefGoogle Scholar

Copyright information

© IFIP International Federation for Information Processing 2014

Authors and Affiliations

  • Mohammed Bahria
    • 1
  • Alexis Olivereau
    • 1
  • Aymen Boudguiga
    • 1
  1. 1.Communicating Systems LaboratoryCEA, LISTGif-sur-YvetteFrance

Personalised recommendations