Abstract
Wireless Sensor Networks (WSNs) led the way to new forms of communications, which extend today the Internet paradigm to unforeseen boundaries. The legacy industry, however, is slower to adopt this technology, mainly for security reasons. Self-managed security systems allowing a quicker detection of and better resilience to attacks, may counterbalance this reluctance. We propose in this paper a hybrid threat detection and security adaptation system, designed to run on top of industrial WSNs. We explain why this system is suitable for architectures mainly composed of constrained or sleeping devices, while being able to achieve a fair level of autonomous security.
Chapter PDF
Similar content being viewed by others
References
Refaei, M.T., Srivastava, V., DaSilva, L., Eltoweissy, M.: A reputation-based mechanism for isolating selfish nodes in ad hoc networks. In: Mobile and Ubiquitous Systems: Networking and Services, MobiQuitous 2005 (July 2005)
Debar, H., Thomas, Y., Cuppens, F., Cuppens-Boulahia, N.: Enabling automated threat response through theuse of a dynamic security policy. Journal in Computer Virology (JCV)Â 3 (August 2007)
Wander, A., Gura, N., Eberle, H., Gupta, V., Shantz, S.C.: Energy analysis of public-key cryptography for wireless sensor networks. In: Third IEEE International Conference on Pervasive Computing and Communications, pp. 324–328 (2005)
Roman, R., Zhou, J., Lopez, J.: Applying intrusion detection systems to wireless sensor networks. In: Proceedings of IEEE Consumer Communications and Networking Conference (CCNC 2006), Las Vegas, USA, pp. 640–644 (January 2006)
Ioannis, K., et al.: Toward Intrusion Detection in Sensor Networks. In: 13th European Wireless Conference, Paris (2007)
Huang, Y.-A., Lee, W.: A cooperative intrusion detection system for ad hoc networks. In: Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, Fairfax, Virginia, October 31 (2003)
Ma, J., Zhang, S., Zhong, Y., Tong, X.: SAID: A self-adaptive intrusion detection system in wireless sensor networks. In: Proceedings of the 7th International Conference on Information Security Applications: Part I, Jeju Island, Korea, August 28-30 (2006)
Lacoste, M., Privat, G., Ramparany, F.: Evaluating confidence in context for context-aware security. In: Schiele, B., Dey, A.K., Gellersen, H., de Ruyter, B., Tscheligi, M., Wichert, R., Aarts, E., Buchmann, A.P. (eds.) AmI 2007. LNCS, vol. 4794, pp. 211–229. Springer, Heidelberg (2007)
Younis, M., Krajewski, N., Farrag, O.: Adaptive security provision for increased energy efficiency in Wireless Sensor Networks. In: 2009 IEEE 34th Conference on Local Computer Networks, pp. 999–1005 (October 2009)
Taddeo, A.V., Micconi, L., Ferrante, A.: Gradual adaptation of security for sensor networks. In: Proceedings of the IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks, pp. 1–9. IEEE (2010)
Shi, K., Qin, X., Cheng, Q., Cheng, Y.: Designing a Reconfigurable Security Architecture for Wireless Sensor Networks. In: World Congress on Software Engineering, pp. 154–158. IEEE (2009)
Hsieh, M.-Y., Huang, Y.-M., Chao, H.-C.: Adaptive security design with malicious node detection in cluster-based sensor networks. Computer Communications 30(11-12), 2385–2400 (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 IFIP International Federation for Information Processing
About this paper
Cite this paper
Bahria, M., Olivereau, A., Boudguiga, A. (2014). A Hybrid Threat Detection and Security Adaptation System for Industrial Wireless Sensor Networks. In: Elmenreich, W., Dressler, F., Loreto, V. (eds) Self-Organizing Systems. IWSOS 2013. Lecture Notes in Computer Science, vol 8221. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-54140-7_15
Download citation
DOI: https://doi.org/10.1007/978-3-642-54140-7_15
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-54139-1
Online ISBN: 978-3-642-54140-7
eBook Packages: Computer ScienceComputer Science (R0)