Modeling and Simulation of Abnormal Behavior Detection Through History Trajectory Monitoring in Wireless Sensor Networks
Data security is becoming increasingly important with the growing popularity of smart management systems combining wireless sensor networks (WSNs) and intelligent systems in industrial, agricultural, and construction fields. Traditional security methods for WSN have focused on data integrity and the...
Gespeichert in:
Veröffentlicht in: | IEEE access 2022, Vol.10, p.119232-119243 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Data security is becoming increasingly important with the growing popularity of smart management systems combining wireless sensor networks (WSNs) and intelligent systems in industrial, agricultural, and construction fields. Traditional security methods for WSN have focused on data integrity and the identification of outliers in sensor data and are therefore vulnerable to attacks such as false positive attacks (FPAs) and false negative attack (FNAs) using massively compromised nodes. these attacks significantly compromise the sensor nodes because the correlation between node verification behaviors is not considered in the communication process until the intercepted sensor data are used as input into the system. This study introduces an FPA and FNA detection method using a spatiotemporal historical data-based knowledge base. The main contribution of the present study is the recognition of abnormal correlations using behavior monitoring through the discrete event system specification model. By recognizing abnormal correlations, the proposed method prevents the inflow of false data generated as a result of widespread damage. Furthermore, a new strategy is proposed to maximize the lifetime of the network by blocking any compromised nodes. The proposed spatiotemporal data-based detection approach is applicable to a wide variety of fields owing to its use of a shared security model. The proposed method was shown to reduce the energy consumption by 46.737% and 41.927% in comparison to statistical en-route filtering and cluster-based false-data filtering, respectively. |
---|---|
ISSN: | 2169-3536 2169-3536 |
DOI: | 10.1109/ACCESS.2022.3202541 |