Don't fool Me!: Detection, Characterisation and Diagnosis of Spoofed and Masked Events in Wireless Sensor Networks

Wireless Sensor Networks carry a high risk of being compromised, as their deployments are often unattended, physically accessible and the wireless medium is difficult to secure. Malicious data injections take place when the sensed measurements are maliciously altered to trigger wrong and potentially...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on dependable and secure computing 2017-05, Vol.14 (3), p.279-293
Hauptverfasser: Illiano, Vittorio P., Munoz-Gonzalez, Luis, Lupu, Emil C.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 293
container_issue 3
container_start_page 279
container_title IEEE transactions on dependable and secure computing
container_volume 14
creator Illiano, Vittorio P.
Munoz-Gonzalez, Luis
Lupu, Emil C.
description Wireless Sensor Networks carry a high risk of being compromised, as their deployments are often unattended, physically accessible and the wireless medium is difficult to secure. Malicious data injections take place when the sensed measurements are maliciously altered to trigger wrong and potentially dangerous responses. When many sensors are compromised, they can collude with each other to alter the measurements making such changes difficult to detect. Distinguishing between genuine and malicious measurements is even more difficult when significant variations may be introduced because of events, especially if more events occur simultaneously. We propose a novel methodology based on wavelet transform to detect malicious data injections, to characterise the responsible sensors, and to distinguish malicious interference from faulty behaviours. The results, both with simulated and real measurements, show that our approach is able to counteract sophisticated attacks, achieving a significant improvement over state-of-the-art approaches.
doi_str_mv 10.1109/TDSC.2016.2614505
format Article
fullrecord <record><control><sourceid>proquest_ieee_</sourceid><recordid>TN_cdi_ieee_primary_7707304</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>7707304</ieee_id><sourcerecordid>2174469136</sourcerecordid><originalsourceid>FETCH-LOGICAL-c384t-5a081fe39f79ea8c7892ad1ef7d8c31f7b46812fb891ec8c42e1bd35ed46cfa63</originalsourceid><addsrcrecordid>eNo9kM1OwzAQhCMEEqXwAIiLEQcupHgTJ7a5obT8SC0cWsQxcp01pC1xsV0Qb09CK0472p3Zkb4oOgU6AKDyejacFoOEQj5IcmAZzfaiHkgGMaUg9ludsSzOJIfD6Mj7BaUJE5L1Ije0zWUgxtoVmeD5DRliQB1q21yR4l05pQO62qtuQ1RTkWGt3hrra0-sIdO1tQarv8NE-WUrR1_YBE_qhrzWDlfoPZli460jTxi-rVv64-jAqJXHk93sRy93o1nxEI-f7x-L23GsU8FCnCkqwGAqDZeohOZCJqoCNLwSOgXD5ywXkJi5kIBaaJYgzKs0w4rl2qg87UcX279rZz836EO5sBvXtJVlApyxXELauWDr0s5679CUa1d_KPdTAi07tGWHtuzQlju0beZsm6kR8d_POeUpZekvhHx1mQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2174469136</pqid></control><display><type>article</type><title>Don't fool Me!: Detection, Characterisation and Diagnosis of Spoofed and Masked Events in Wireless Sensor Networks</title><source>IEEE Electronic Library (IEL)</source><creator>Illiano, Vittorio P. ; Munoz-Gonzalez, Luis ; Lupu, Emil C.</creator><creatorcontrib>Illiano, Vittorio P. ; Munoz-Gonzalez, Luis ; Lupu, Emil C.</creatorcontrib><description>Wireless Sensor Networks carry a high risk of being compromised, as their deployments are often unattended, physically accessible and the wireless medium is difficult to secure. Malicious data injections take place when the sensed measurements are maliciously altered to trigger wrong and potentially dangerous responses. When many sensors are compromised, they can collude with each other to alter the measurements making such changes difficult to detect. Distinguishing between genuine and malicious measurements is even more difficult when significant variations may be introduced because of events, especially if more events occur simultaneously. We propose a novel methodology based on wavelet transform to detect malicious data injections, to characterise the responsible sensors, and to distinguish malicious interference from faulty behaviours. The results, both with simulated and real measurements, show that our approach is able to counteract sophisticated attacks, achieving a significant improvement over state-of-the-art approaches.</description><identifier>ISSN: 1545-5971</identifier><identifier>EISSN: 1941-0018</identifier><identifier>DOI: 10.1109/TDSC.2016.2614505</identifier><identifier>CODEN: ITDSCM</identifier><language>eng</language><publisher>Washington: IEEE</publisher><subject>Change detection ; continuous wavelet transforms ; Correlation ; event detection ; Information security ; Monitoring ; Pollution measurement ; Remote sensors ; Sensors ; State of the art ; Temperature measurement ; Temperature sensors ; Transforms ; Wavelet transforms ; Wireless sensor networks</subject><ispartof>IEEE transactions on dependable and secure computing, 2017-05, Vol.14 (3), p.279-293</ispartof><rights>Copyright IEEE Computer Society 2017</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c384t-5a081fe39f79ea8c7892ad1ef7d8c31f7b46812fb891ec8c42e1bd35ed46cfa63</citedby><cites>FETCH-LOGICAL-c384t-5a081fe39f79ea8c7892ad1ef7d8c31f7b46812fb891ec8c42e1bd35ed46cfa63</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/7707304$$EHTML$$P50$$Gieee$$Hfree_for_read</linktohtml><link.rule.ids>314,780,784,796,27924,27925,54758</link.rule.ids></links><search><creatorcontrib>Illiano, Vittorio P.</creatorcontrib><creatorcontrib>Munoz-Gonzalez, Luis</creatorcontrib><creatorcontrib>Lupu, Emil C.</creatorcontrib><title>Don't fool Me!: Detection, Characterisation and Diagnosis of Spoofed and Masked Events in Wireless Sensor Networks</title><title>IEEE transactions on dependable and secure computing</title><addtitle>TDSC</addtitle><description>Wireless Sensor Networks carry a high risk of being compromised, as their deployments are often unattended, physically accessible and the wireless medium is difficult to secure. Malicious data injections take place when the sensed measurements are maliciously altered to trigger wrong and potentially dangerous responses. When many sensors are compromised, they can collude with each other to alter the measurements making such changes difficult to detect. Distinguishing between genuine and malicious measurements is even more difficult when significant variations may be introduced because of events, especially if more events occur simultaneously. We propose a novel methodology based on wavelet transform to detect malicious data injections, to characterise the responsible sensors, and to distinguish malicious interference from faulty behaviours. The results, both with simulated and real measurements, show that our approach is able to counteract sophisticated attacks, achieving a significant improvement over state-of-the-art approaches.</description><subject>Change detection</subject><subject>continuous wavelet transforms</subject><subject>Correlation</subject><subject>event detection</subject><subject>Information security</subject><subject>Monitoring</subject><subject>Pollution measurement</subject><subject>Remote sensors</subject><subject>Sensors</subject><subject>State of the art</subject><subject>Temperature measurement</subject><subject>Temperature sensors</subject><subject>Transforms</subject><subject>Wavelet transforms</subject><subject>Wireless sensor networks</subject><issn>1545-5971</issn><issn>1941-0018</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><sourceid>ESBDL</sourceid><sourceid>RIE</sourceid><recordid>eNo9kM1OwzAQhCMEEqXwAIiLEQcupHgTJ7a5obT8SC0cWsQxcp01pC1xsV0Qb09CK0472p3Zkb4oOgU6AKDyejacFoOEQj5IcmAZzfaiHkgGMaUg9ludsSzOJIfD6Mj7BaUJE5L1Ije0zWUgxtoVmeD5DRliQB1q21yR4l05pQO62qtuQ1RTkWGt3hrra0-sIdO1tQarv8NE-WUrR1_YBE_qhrzWDlfoPZli460jTxi-rVv64-jAqJXHk93sRy93o1nxEI-f7x-L23GsU8FCnCkqwGAqDZeohOZCJqoCNLwSOgXD5ywXkJi5kIBaaJYgzKs0w4rl2qg87UcX279rZz836EO5sBvXtJVlApyxXELauWDr0s5679CUa1d_KPdTAi07tGWHtuzQlju0beZsm6kR8d_POeUpZekvhHx1mQ</recordid><startdate>20170501</startdate><enddate>20170501</enddate><creator>Illiano, Vittorio P.</creator><creator>Munoz-Gonzalez, Luis</creator><creator>Lupu, Emil C.</creator><general>IEEE</general><general>IEEE Computer Society</general><scope>97E</scope><scope>ESBDL</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>JQ2</scope></search><sort><creationdate>20170501</creationdate><title>Don't fool Me!: Detection, Characterisation and Diagnosis of Spoofed and Masked Events in Wireless Sensor Networks</title><author>Illiano, Vittorio P. ; Munoz-Gonzalez, Luis ; Lupu, Emil C.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c384t-5a081fe39f79ea8c7892ad1ef7d8c31f7b46812fb891ec8c42e1bd35ed46cfa63</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2017</creationdate><topic>Change detection</topic><topic>continuous wavelet transforms</topic><topic>Correlation</topic><topic>event detection</topic><topic>Information security</topic><topic>Monitoring</topic><topic>Pollution measurement</topic><topic>Remote sensors</topic><topic>Sensors</topic><topic>State of the art</topic><topic>Temperature measurement</topic><topic>Temperature sensors</topic><topic>Transforms</topic><topic>Wavelet transforms</topic><topic>Wireless sensor networks</topic><toplevel>online_resources</toplevel><creatorcontrib>Illiano, Vittorio P.</creatorcontrib><creatorcontrib>Munoz-Gonzalez, Luis</creatorcontrib><creatorcontrib>Lupu, Emil C.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE Open Access Journals</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>ProQuest Computer Science Collection</collection><jtitle>IEEE transactions on dependable and secure computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Illiano, Vittorio P.</au><au>Munoz-Gonzalez, Luis</au><au>Lupu, Emil C.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Don't fool Me!: Detection, Characterisation and Diagnosis of Spoofed and Masked Events in Wireless Sensor Networks</atitle><jtitle>IEEE transactions on dependable and secure computing</jtitle><stitle>TDSC</stitle><date>2017-05-01</date><risdate>2017</risdate><volume>14</volume><issue>3</issue><spage>279</spage><epage>293</epage><pages>279-293</pages><issn>1545-5971</issn><eissn>1941-0018</eissn><coden>ITDSCM</coden><abstract>Wireless Sensor Networks carry a high risk of being compromised, as their deployments are often unattended, physically accessible and the wireless medium is difficult to secure. Malicious data injections take place when the sensed measurements are maliciously altered to trigger wrong and potentially dangerous responses. When many sensors are compromised, they can collude with each other to alter the measurements making such changes difficult to detect. Distinguishing between genuine and malicious measurements is even more difficult when significant variations may be introduced because of events, especially if more events occur simultaneously. We propose a novel methodology based on wavelet transform to detect malicious data injections, to characterise the responsible sensors, and to distinguish malicious interference from faulty behaviours. The results, both with simulated and real measurements, show that our approach is able to counteract sophisticated attacks, achieving a significant improvement over state-of-the-art approaches.</abstract><cop>Washington</cop><pub>IEEE</pub><doi>10.1109/TDSC.2016.2614505</doi><tpages>15</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1545-5971
ispartof IEEE transactions on dependable and secure computing, 2017-05, Vol.14 (3), p.279-293
issn 1545-5971
1941-0018
language eng
recordid cdi_ieee_primary_7707304
source IEEE Electronic Library (IEL)
subjects Change detection
continuous wavelet transforms
Correlation
event detection
Information security
Monitoring
Pollution measurement
Remote sensors
Sensors
State of the art
Temperature measurement
Temperature sensors
Transforms
Wavelet transforms
Wireless sensor networks
title Don't fool Me!: Detection, Characterisation and Diagnosis of Spoofed and Masked Events in Wireless Sensor Networks
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-27T11%3A29%3A29IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_ieee_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Don't%20fool%20Me!:%20Detection,%20Characterisation%20and%20Diagnosis%20of%20Spoofed%20and%20Masked%20Events%20in%20Wireless%20Sensor%20Networks&rft.jtitle=IEEE%20transactions%20on%20dependable%20and%20secure%20computing&rft.au=Illiano,%20Vittorio%20P.&rft.date=2017-05-01&rft.volume=14&rft.issue=3&rft.spage=279&rft.epage=293&rft.pages=279-293&rft.issn=1545-5971&rft.eissn=1941-0018&rft.coden=ITDSCM&rft_id=info:doi/10.1109/TDSC.2016.2614505&rft_dat=%3Cproquest_ieee_%3E2174469136%3C/proquest_ieee_%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2174469136&rft_id=info:pmid/&rft_ieee_id=7707304&rfr_iscdi=true