The Modeling and Detection of Attacks in Role-Based Self-Organized Decentralized Wireless Sensor Networks

This article discusses the modeling and detection of attacks in self-organizing decentralized wireless sensor networks (WSNs) that can be applied to various critical scenarios in practice. Security issues in this type of network have previously been studied to a rather poor extent. In particular, ex...

Full description

Bibliographic Details
Main Authors: Aleksey Meleshko, Vasily Desnitsky
Format: Article
Language:English
Published: MDPI AG 2024-02-01
Series:Telecom
Subjects:
Online Access:https://www.mdpi.com/2673-4001/5/1/8
_version_ 1797239219349880832
author Aleksey Meleshko
Vasily Desnitsky
author_facet Aleksey Meleshko
Vasily Desnitsky
author_sort Aleksey Meleshko
collection DOAJ
description This article discusses the modeling and detection of attacks in self-organizing decentralized wireless sensor networks (WSNs) that can be applied to various critical scenarios in practice. Security issues in this type of network have previously been studied to a rather poor extent. In particular, existing attack detection approaches and algorithms do not rely on the properties of self-organization and decentralization, which an attacker is able to exploit to compromise the network and its services. We propose, first, a model of a self-organizing decentralized wireless sensor network; second, a model of the attacks on such networks; third, algorithms for data collection and attack detection; and, finally, a technique for their application. The WSN model represents a formal specification of this type of network, defining the conditions and limitations of network self-organization and decentralization. The model is characterized by a proposed underlying role-based operation of network nodes and a set of their functional states. The proposed attack model covers the possible types of attacks that are relevant to a given type of WSN and are based on the exploitation of the self-organization and decentralization of the network. The developed algorithm for collecting data for attack detection presents specific types of data and their sources. The developed combined attack detection algorithm is formed of actions that detect relevant attacks on self-organizing decentralized WSNs using machine learning methods. The distinctive element of this algorithm is a set of highly specific features that are obtained by analyzing the data collected in the WSN and used to detect attacks. The proposed technique combines the constructed models and algorithms for the sake of tuning and deploying the attack detection module and the effective detection of attacks in practice. This technique specifies the main steps for the joint use of the models and algorithms and the assignment of data collection and detection parameters. The results of the experiments confirm the correctness of the constructed models, algorithms and technique due to the high values of the attack detection quality indicators. Therefore, the practical application of the proposed apparatus will facilitate improvements in the security of self-organizing decentralized WSNs. Experimental research has confirmed the practical applicability of our proposed solutions. In particular, it has shown that the proposed algorithms and the detection technique can detect both attacks implemented through the exploitation of the network’s properties of decentralization/self-organization and common variations in these attacks (i.e., without exploiting the decentralization property). In general, the experimental results expose a high quality of detection, with an f1-score equal to 0.99.
first_indexed 2024-04-24T17:48:03Z
format Article
id doaj.art-2cb2b7e2e78f4dc8aed08d9e881be045
institution Directory Open Access Journal
issn 2673-4001
language English
last_indexed 2024-04-24T17:48:03Z
publishDate 2024-02-01
publisher MDPI AG
record_format Article
series Telecom
spelling doaj.art-2cb2b7e2e78f4dc8aed08d9e881be0452024-03-27T14:05:53ZengMDPI AGTelecom2673-40012024-02-015114517510.3390/telecom5010008The Modeling and Detection of Attacks in Role-Based Self-Organized Decentralized Wireless Sensor NetworksAleksey Meleshko0Vasily Desnitsky1St. Petersburg Federal Research Center of the Russian Academy of Sciences, 199178 St. Petersburg, RussiaSt. Petersburg Federal Research Center of the Russian Academy of Sciences, 199178 St. Petersburg, RussiaThis article discusses the modeling and detection of attacks in self-organizing decentralized wireless sensor networks (WSNs) that can be applied to various critical scenarios in practice. Security issues in this type of network have previously been studied to a rather poor extent. In particular, existing attack detection approaches and algorithms do not rely on the properties of self-organization and decentralization, which an attacker is able to exploit to compromise the network and its services. We propose, first, a model of a self-organizing decentralized wireless sensor network; second, a model of the attacks on such networks; third, algorithms for data collection and attack detection; and, finally, a technique for their application. The WSN model represents a formal specification of this type of network, defining the conditions and limitations of network self-organization and decentralization. The model is characterized by a proposed underlying role-based operation of network nodes and a set of their functional states. The proposed attack model covers the possible types of attacks that are relevant to a given type of WSN and are based on the exploitation of the self-organization and decentralization of the network. The developed algorithm for collecting data for attack detection presents specific types of data and their sources. The developed combined attack detection algorithm is formed of actions that detect relevant attacks on self-organizing decentralized WSNs using machine learning methods. The distinctive element of this algorithm is a set of highly specific features that are obtained by analyzing the data collected in the WSN and used to detect attacks. The proposed technique combines the constructed models and algorithms for the sake of tuning and deploying the attack detection module and the effective detection of attacks in practice. This technique specifies the main steps for the joint use of the models and algorithms and the assignment of data collection and detection parameters. The results of the experiments confirm the correctness of the constructed models, algorithms and technique due to the high values of the attack detection quality indicators. Therefore, the practical application of the proposed apparatus will facilitate improvements in the security of self-organizing decentralized WSNs. Experimental research has confirmed the practical applicability of our proposed solutions. In particular, it has shown that the proposed algorithms and the detection technique can detect both attacks implemented through the exploitation of the network’s properties of decentralization/self-organization and common variations in these attacks (i.e., without exploiting the decentralization property). In general, the experimental results expose a high quality of detection, with an f1-score equal to 0.99.https://www.mdpi.com/2673-4001/5/1/8wireless sensor networkattack detectiondata collectionfeature constructionrole-based model
spellingShingle Aleksey Meleshko
Vasily Desnitsky
The Modeling and Detection of Attacks in Role-Based Self-Organized Decentralized Wireless Sensor Networks
Telecom
wireless sensor network
attack detection
data collection
feature construction
role-based model
title The Modeling and Detection of Attacks in Role-Based Self-Organized Decentralized Wireless Sensor Networks
title_full The Modeling and Detection of Attacks in Role-Based Self-Organized Decentralized Wireless Sensor Networks
title_fullStr The Modeling and Detection of Attacks in Role-Based Self-Organized Decentralized Wireless Sensor Networks
title_full_unstemmed The Modeling and Detection of Attacks in Role-Based Self-Organized Decentralized Wireless Sensor Networks
title_short The Modeling and Detection of Attacks in Role-Based Self-Organized Decentralized Wireless Sensor Networks
title_sort modeling and detection of attacks in role based self organized decentralized wireless sensor networks
topic wireless sensor network
attack detection
data collection
feature construction
role-based model
url https://www.mdpi.com/2673-4001/5/1/8
work_keys_str_mv AT alekseymeleshko themodelinganddetectionofattacksinrolebasedselforganizeddecentralizedwirelesssensornetworks
AT vasilydesnitsky themodelinganddetectionofattacksinrolebasedselforganizeddecentralizedwirelesssensornetworks
AT alekseymeleshko modelinganddetectionofattacksinrolebasedselforganizeddecentralizedwirelesssensornetworks
AT vasilydesnitsky modelinganddetectionofattacksinrolebasedselforganizeddecentralizedwirelesssensornetworks