Two-Hop Monitoring Mechanism Based on Relaxed Flow Conservation Constraints against Selective Routing Attacks in Wireless Sensor Networks
In this paper, we investigate the problem of selective routing attack in wireless sensor networks by considering a novel threat, named the upstream-node effect, which limits the accuracy of the monitoring functions in deciding whether a monitored node is legitimate or malicious. To address this limi...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2020-10-01
|
Series: | Sensors |
Subjects: | |
Online Access: | https://www.mdpi.com/1424-8220/20/21/6106 |
_version_ | 1797549688303386624 |
---|---|
author | Abdelouahid Derhab Abdelghani Bouras Mohamed Belaoued Leandros Maglaras Farrukh Aslam Khan |
author_facet | Abdelouahid Derhab Abdelghani Bouras Mohamed Belaoued Leandros Maglaras Farrukh Aslam Khan |
author_sort | Abdelouahid Derhab |
collection | DOAJ |
description | In this paper, we investigate the problem of selective routing attack in wireless sensor networks by considering a novel threat, named the upstream-node effect, which limits the accuracy of the monitoring functions in deciding whether a monitored node is legitimate or malicious. To address this limitation, we propose a one-dimensional one-class classifier, named relaxed flow conservation constraint, as an intrusion detection scheme to counter the upstream node attack. Each node uses four types of relaxed flow conservation constraints to monitor all of its neighbors. Three constraints are applied by using one-hop knowledge, and the fourth one is calculated by monitoring two-hop information. The latter is obtained by proposing two-hop energy-efficient and secure reporting scheme. We theoretically analyze the security and performance of the proposed intrusion detection method. We also show the superiority of relaxed flow conservation constraint in defending against upstream node attack compared to other schemes. The simulation results show that the proposed intrusion detection system achieves good results in terms of detection effectiveness. |
first_indexed | 2024-03-10T15:18:57Z |
format | Article |
id | doaj.art-953b1daac9a7427bb2d6cdf38918a812 |
institution | Directory Open Access Journal |
issn | 1424-8220 |
language | English |
last_indexed | 2024-03-10T15:18:57Z |
publishDate | 2020-10-01 |
publisher | MDPI AG |
record_format | Article |
series | Sensors |
spelling | doaj.art-953b1daac9a7427bb2d6cdf38918a8122023-11-20T18:42:14ZengMDPI AGSensors1424-82202020-10-012021610610.3390/s20216106Two-Hop Monitoring Mechanism Based on Relaxed Flow Conservation Constraints against Selective Routing Attacks in Wireless Sensor NetworksAbdelouahid Derhab0Abdelghani Bouras1Mohamed Belaoued2Leandros Maglaras3Farrukh Aslam Khan4Center of Excellence in Information Assurance (CoEIA), King Saud University, Riyadh 11451, Saudi ArabiaDepartment of Industrial Engineering, College of Engineering, Alfaisal University, Riyadh 11533, Saudi ArabiaLICUS Laboratory, Department of Computer Science, University of 20 August 1955, Skikda 21000, AlgeriaSchool of Computer Science and Informatics, De Montfort University, Leicester LE1 9BH, UKCenter of Excellence in Information Assurance (CoEIA), King Saud University, Riyadh 11451, Saudi ArabiaIn this paper, we investigate the problem of selective routing attack in wireless sensor networks by considering a novel threat, named the upstream-node effect, which limits the accuracy of the monitoring functions in deciding whether a monitored node is legitimate or malicious. To address this limitation, we propose a one-dimensional one-class classifier, named relaxed flow conservation constraint, as an intrusion detection scheme to counter the upstream node attack. Each node uses four types of relaxed flow conservation constraints to monitor all of its neighbors. Three constraints are applied by using one-hop knowledge, and the fourth one is calculated by monitoring two-hop information. The latter is obtained by proposing two-hop energy-efficient and secure reporting scheme. We theoretically analyze the security and performance of the proposed intrusion detection method. We also show the superiority of relaxed flow conservation constraint in defending against upstream node attack compared to other schemes. The simulation results show that the proposed intrusion detection system achieves good results in terms of detection effectiveness.https://www.mdpi.com/1424-8220/20/21/6106intrusion detection systemwireless sensor networkselective routing attacktwo-hop monitoringrelaxed flow conservation constraint |
spellingShingle | Abdelouahid Derhab Abdelghani Bouras Mohamed Belaoued Leandros Maglaras Farrukh Aslam Khan Two-Hop Monitoring Mechanism Based on Relaxed Flow Conservation Constraints against Selective Routing Attacks in Wireless Sensor Networks Sensors intrusion detection system wireless sensor network selective routing attack two-hop monitoring relaxed flow conservation constraint |
title | Two-Hop Monitoring Mechanism Based on Relaxed Flow Conservation Constraints against Selective Routing Attacks in Wireless Sensor Networks |
title_full | Two-Hop Monitoring Mechanism Based on Relaxed Flow Conservation Constraints against Selective Routing Attacks in Wireless Sensor Networks |
title_fullStr | Two-Hop Monitoring Mechanism Based on Relaxed Flow Conservation Constraints against Selective Routing Attacks in Wireless Sensor Networks |
title_full_unstemmed | Two-Hop Monitoring Mechanism Based on Relaxed Flow Conservation Constraints against Selective Routing Attacks in Wireless Sensor Networks |
title_short | Two-Hop Monitoring Mechanism Based on Relaxed Flow Conservation Constraints against Selective Routing Attacks in Wireless Sensor Networks |
title_sort | two hop monitoring mechanism based on relaxed flow conservation constraints against selective routing attacks in wireless sensor networks |
topic | intrusion detection system wireless sensor network selective routing attack two-hop monitoring relaxed flow conservation constraint |
url | https://www.mdpi.com/1424-8220/20/21/6106 |
work_keys_str_mv | AT abdelouahidderhab twohopmonitoringmechanismbasedonrelaxedflowconservationconstraintsagainstselectiveroutingattacksinwirelesssensornetworks AT abdelghanibouras twohopmonitoringmechanismbasedonrelaxedflowconservationconstraintsagainstselectiveroutingattacksinwirelesssensornetworks AT mohamedbelaoued twohopmonitoringmechanismbasedonrelaxedflowconservationconstraintsagainstselectiveroutingattacksinwirelesssensornetworks AT leandrosmaglaras twohopmonitoringmechanismbasedonrelaxedflowconservationconstraintsagainstselectiveroutingattacksinwirelesssensornetworks AT farrukhaslamkhan twohopmonitoringmechanismbasedonrelaxedflowconservationconstraintsagainstselectiveroutingattacksinwirelesssensornetworks |