Modeling and Simulation of Abnormal Behavior Detection Through History Trajectory Monitoring in Wireless Sensor Networks
Data security is becoming increasingly important with the growing popularity of smart management systems combining wireless sensor networks (WSNs) and intelligent systems in industrial, agricultural, and construction fields. Traditional security methods for WSN have focused on data integrity and the...
Gespeichert in:
Veröffentlicht in: | IEEE access 2022, Vol.10, p.119232-119243 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 119243 |
---|---|
container_issue | |
container_start_page | 119232 |
container_title | IEEE access |
container_volume | 10 |
creator | Ahn, Jung Sub Cho, Tae Ho |
description | Data security is becoming increasingly important with the growing popularity of smart management systems combining wireless sensor networks (WSNs) and intelligent systems in industrial, agricultural, and construction fields. Traditional security methods for WSN have focused on data integrity and the identification of outliers in sensor data and are therefore vulnerable to attacks such as false positive attacks (FPAs) and false negative attack (FNAs) using massively compromised nodes. these attacks significantly compromise the sensor nodes because the correlation between node verification behaviors is not considered in the communication process until the intercepted sensor data are used as input into the system. This study introduces an FPA and FNA detection method using a spatiotemporal historical data-based knowledge base. The main contribution of the present study is the recognition of abnormal correlations using behavior monitoring through the discrete event system specification model. By recognizing abnormal correlations, the proposed method prevents the inflow of false data generated as a result of widespread damage. Furthermore, a new strategy is proposed to maximize the lifetime of the network by blocking any compromised nodes. The proposed spatiotemporal data-based detection approach is applicable to a wide variety of fields owing to its use of a shared security model. The proposed method was shown to reduce the energy consumption by 46.737% and 41.927% in comparison to statistical en-route filtering and cluster-based false-data filtering, respectively. |
doi_str_mv | 10.1109/ACCESS.2022.3202541 |
format | Article |
fullrecord | <record><control><sourceid>proquest_doaj_</sourceid><recordid>TN_cdi_proquest_journals_2736886712</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9869634</ieee_id><doaj_id>oai_doaj_org_article_b06c8ce7962d4ef09ff228b3cae7db6f</doaj_id><sourcerecordid>2736886712</sourcerecordid><originalsourceid>FETCH-LOGICAL-c358t-403d13b1af7c7ccd06b8d71ed817999c39d2f5bd45beeac7cfa8b4154c3dd0cc3</originalsourceid><addsrcrecordid>eNpNUU1PGzEQXVWtVAT8Ai6WOCf1x64_jmlKCxK0hwRxtPwxThw2a2pv2vLvcViE6sP4aea9NyO9prkgeE4IVl8Wy-XVajWnmNI5q7VryYfmhBKuZqxj_ON_-HNzXsoO1ydrqxMnzb-75KGPwwaZwaNV3B96M8Y0oBTQwg4p702PvsLW_Ikpo28wgnsdr7c5HTZbdB3LmPIzWmezq6MjvEtDrODoGQf0EDP0UApawVCqxU8Y_6b8WM6aT8H0Bc7f_tPm_vvVenk9u_3142a5uJ051slx1mLmCbPEBOGEcx5zK70g4CURSinHlKehs77tLICplGCkbUnXOuY9do6dNjeTr09mp59y3Jv8rJOJ-rWR8kabPEbXg7aYO-lAKE59CwGrECiVljkDwlseqtfl5PWU0-8DlFHv0iEP9XxNBeNSckFoZbGJ5XIqJUN430qwPiamp8T0MTH9llhVXUyqCADvCiW54qxlLx1TlWs</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2736886712</pqid></control><display><type>article</type><title>Modeling and Simulation of Abnormal Behavior Detection Through History Trajectory Monitoring in Wireless Sensor Networks</title><source>IEEE Open Access Journals</source><source>DOAJ Directory of Open Access Journals</source><source>EZB-FREE-00999 freely available EZB journals</source><creator>Ahn, Jung Sub ; Cho, Tae Ho</creator><creatorcontrib>Ahn, Jung Sub ; Cho, Tae Ho</creatorcontrib><description>Data security is becoming increasingly important with the growing popularity of smart management systems combining wireless sensor networks (WSNs) and intelligent systems in industrial, agricultural, and construction fields. Traditional security methods for WSN have focused on data integrity and the identification of outliers in sensor data and are therefore vulnerable to attacks such as false positive attacks (FPAs) and false negative attack (FNAs) using massively compromised nodes. these attacks significantly compromise the sensor nodes because the correlation between node verification behaviors is not considered in the communication process until the intercepted sensor data are used as input into the system. This study introduces an FPA and FNA detection method using a spatiotemporal historical data-based knowledge base. The main contribution of the present study is the recognition of abnormal correlations using behavior monitoring through the discrete event system specification model. By recognizing abnormal correlations, the proposed method prevents the inflow of false data generated as a result of widespread damage. Furthermore, a new strategy is proposed to maximize the lifetime of the network by blocking any compromised nodes. The proposed spatiotemporal data-based detection approach is applicable to a wide variety of fields owing to its use of a shared security model. The proposed method was shown to reduce the energy consumption by 46.737% and 41.927% in comparison to statistical en-route filtering and cluster-based false-data filtering, respectively.</description><identifier>ISSN: 2169-3536</identifier><identifier>EISSN: 2169-3536</identifier><identifier>DOI: 10.1109/ACCESS.2022.3202541</identifier><identifier>CODEN: IAECCG</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>Behavioral sciences ; Data analysis ; Data integrity ; Data models ; Discrete event system specification (DEVS) ; Discrete event systems ; Energy consumption ; false negative attack detection ; false positive attack detection ; Filtering ; Filtration ; history trajectory monitoring ; Intelligent systems ; Knowledge based systems ; Knowledge bases (artificial intelligence) ; Management systems ; Monitoring ; network security ; Nodes ; Outliers (statistics) ; Security ; Sensors ; Spatiotemporal data ; Spatiotemporal phenomena ; Wireless networks ; wireless sensor network ; Wireless sensor networks</subject><ispartof>IEEE access, 2022, Vol.10, p.119232-119243</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c358t-403d13b1af7c7ccd06b8d71ed817999c39d2f5bd45beeac7cfa8b4154c3dd0cc3</cites><orcidid>0000-0002-3945-4021 ; 0000-0001-6222-2096</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9869634$$EHTML$$P50$$Gieee$$Hfree_for_read</linktohtml><link.rule.ids>314,780,784,864,2100,4022,27632,27922,27923,27924,54932</link.rule.ids></links><search><creatorcontrib>Ahn, Jung Sub</creatorcontrib><creatorcontrib>Cho, Tae Ho</creatorcontrib><title>Modeling and Simulation of Abnormal Behavior Detection Through History Trajectory Monitoring in Wireless Sensor Networks</title><title>IEEE access</title><addtitle>Access</addtitle><description>Data security is becoming increasingly important with the growing popularity of smart management systems combining wireless sensor networks (WSNs) and intelligent systems in industrial, agricultural, and construction fields. Traditional security methods for WSN have focused on data integrity and the identification of outliers in sensor data and are therefore vulnerable to attacks such as false positive attacks (FPAs) and false negative attack (FNAs) using massively compromised nodes. these attacks significantly compromise the sensor nodes because the correlation between node verification behaviors is not considered in the communication process until the intercepted sensor data are used as input into the system. This study introduces an FPA and FNA detection method using a spatiotemporal historical data-based knowledge base. The main contribution of the present study is the recognition of abnormal correlations using behavior monitoring through the discrete event system specification model. By recognizing abnormal correlations, the proposed method prevents the inflow of false data generated as a result of widespread damage. Furthermore, a new strategy is proposed to maximize the lifetime of the network by blocking any compromised nodes. The proposed spatiotemporal data-based detection approach is applicable to a wide variety of fields owing to its use of a shared security model. The proposed method was shown to reduce the energy consumption by 46.737% and 41.927% in comparison to statistical en-route filtering and cluster-based false-data filtering, respectively.</description><subject>Behavioral sciences</subject><subject>Data analysis</subject><subject>Data integrity</subject><subject>Data models</subject><subject>Discrete event system specification (DEVS)</subject><subject>Discrete event systems</subject><subject>Energy consumption</subject><subject>false negative attack detection</subject><subject>false positive attack detection</subject><subject>Filtering</subject><subject>Filtration</subject><subject>history trajectory monitoring</subject><subject>Intelligent systems</subject><subject>Knowledge based systems</subject><subject>Knowledge bases (artificial intelligence)</subject><subject>Management systems</subject><subject>Monitoring</subject><subject>network security</subject><subject>Nodes</subject><subject>Outliers (statistics)</subject><subject>Security</subject><subject>Sensors</subject><subject>Spatiotemporal data</subject><subject>Spatiotemporal phenomena</subject><subject>Wireless networks</subject><subject>wireless sensor network</subject><subject>Wireless sensor networks</subject><issn>2169-3536</issn><issn>2169-3536</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>ESBDL</sourceid><sourceid>RIE</sourceid><sourceid>DOA</sourceid><recordid>eNpNUU1PGzEQXVWtVAT8Ai6WOCf1x64_jmlKCxK0hwRxtPwxThw2a2pv2vLvcViE6sP4aea9NyO9prkgeE4IVl8Wy-XVajWnmNI5q7VryYfmhBKuZqxj_ON_-HNzXsoO1ydrqxMnzb-75KGPwwaZwaNV3B96M8Y0oBTQwg4p702PvsLW_Ikpo28wgnsdr7c5HTZbdB3LmPIzWmezq6MjvEtDrODoGQf0EDP0UApawVCqxU8Y_6b8WM6aT8H0Bc7f_tPm_vvVenk9u_3142a5uJ051slx1mLmCbPEBOGEcx5zK70g4CURSinHlKehs77tLICplGCkbUnXOuY9do6dNjeTr09mp59y3Jv8rJOJ-rWR8kabPEbXg7aYO-lAKE59CwGrECiVljkDwlseqtfl5PWU0-8DlFHv0iEP9XxNBeNSckFoZbGJ5XIqJUN430qwPiamp8T0MTH9llhVXUyqCADvCiW54qxlLx1TlWs</recordid><startdate>2022</startdate><enddate>2022</enddate><creator>Ahn, Jung Sub</creator><creator>Cho, Tae Ho</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>ESBDL</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7SR</scope><scope>8BQ</scope><scope>8FD</scope><scope>JG9</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>DOA</scope><orcidid>https://orcid.org/0000-0002-3945-4021</orcidid><orcidid>https://orcid.org/0000-0001-6222-2096</orcidid></search><sort><creationdate>2022</creationdate><title>Modeling and Simulation of Abnormal Behavior Detection Through History Trajectory Monitoring in Wireless Sensor Networks</title><author>Ahn, Jung Sub ; Cho, Tae Ho</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c358t-403d13b1af7c7ccd06b8d71ed817999c39d2f5bd45beeac7cfa8b4154c3dd0cc3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Behavioral sciences</topic><topic>Data analysis</topic><topic>Data integrity</topic><topic>Data models</topic><topic>Discrete event system specification (DEVS)</topic><topic>Discrete event systems</topic><topic>Energy consumption</topic><topic>false negative attack detection</topic><topic>false positive attack detection</topic><topic>Filtering</topic><topic>Filtration</topic><topic>history trajectory monitoring</topic><topic>Intelligent systems</topic><topic>Knowledge based systems</topic><topic>Knowledge bases (artificial intelligence)</topic><topic>Management systems</topic><topic>Monitoring</topic><topic>network security</topic><topic>Nodes</topic><topic>Outliers (statistics)</topic><topic>Security</topic><topic>Sensors</topic><topic>Spatiotemporal data</topic><topic>Spatiotemporal phenomena</topic><topic>Wireless networks</topic><topic>wireless sensor network</topic><topic>Wireless sensor networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Ahn, Jung Sub</creatorcontrib><creatorcontrib>Cho, Tae Ho</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE Open Access Journals</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Engineered Materials Abstracts</collection><collection>METADEX</collection><collection>Technology Research Database</collection><collection>Materials Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>IEEE access</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Ahn, Jung Sub</au><au>Cho, Tae Ho</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Modeling and Simulation of Abnormal Behavior Detection Through History Trajectory Monitoring in Wireless Sensor Networks</atitle><jtitle>IEEE access</jtitle><stitle>Access</stitle><date>2022</date><risdate>2022</risdate><volume>10</volume><spage>119232</spage><epage>119243</epage><pages>119232-119243</pages><issn>2169-3536</issn><eissn>2169-3536</eissn><coden>IAECCG</coden><abstract>Data security is becoming increasingly important with the growing popularity of smart management systems combining wireless sensor networks (WSNs) and intelligent systems in industrial, agricultural, and construction fields. Traditional security methods for WSN have focused on data integrity and the identification of outliers in sensor data and are therefore vulnerable to attacks such as false positive attacks (FPAs) and false negative attack (FNAs) using massively compromised nodes. these attacks significantly compromise the sensor nodes because the correlation between node verification behaviors is not considered in the communication process until the intercepted sensor data are used as input into the system. This study introduces an FPA and FNA detection method using a spatiotemporal historical data-based knowledge base. The main contribution of the present study is the recognition of abnormal correlations using behavior monitoring through the discrete event system specification model. By recognizing abnormal correlations, the proposed method prevents the inflow of false data generated as a result of widespread damage. Furthermore, a new strategy is proposed to maximize the lifetime of the network by blocking any compromised nodes. The proposed spatiotemporal data-based detection approach is applicable to a wide variety of fields owing to its use of a shared security model. The proposed method was shown to reduce the energy consumption by 46.737% and 41.927% in comparison to statistical en-route filtering and cluster-based false-data filtering, respectively.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/ACCESS.2022.3202541</doi><tpages>12</tpages><orcidid>https://orcid.org/0000-0002-3945-4021</orcidid><orcidid>https://orcid.org/0000-0001-6222-2096</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2169-3536 |
ispartof | IEEE access, 2022, Vol.10, p.119232-119243 |
issn | 2169-3536 2169-3536 |
language | eng |
recordid | cdi_proquest_journals_2736886712 |
source | IEEE Open Access Journals; DOAJ Directory of Open Access Journals; EZB-FREE-00999 freely available EZB journals |
subjects | Behavioral sciences Data analysis Data integrity Data models Discrete event system specification (DEVS) Discrete event systems Energy consumption false negative attack detection false positive attack detection Filtering Filtration history trajectory monitoring Intelligent systems Knowledge based systems Knowledge bases (artificial intelligence) Management systems Monitoring network security Nodes Outliers (statistics) Security Sensors Spatiotemporal data Spatiotemporal phenomena Wireless networks wireless sensor network Wireless sensor networks |
title | Modeling and Simulation of Abnormal Behavior Detection Through History Trajectory Monitoring in Wireless Sensor Networks |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-11T13%3A19%3A10IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_doaj_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Modeling%20and%20Simulation%20of%20Abnormal%20Behavior%20Detection%20Through%20History%20Trajectory%20Monitoring%20in%20Wireless%20Sensor%20Networks&rft.jtitle=IEEE%20access&rft.au=Ahn,%20Jung%20Sub&rft.date=2022&rft.volume=10&rft.spage=119232&rft.epage=119243&rft.pages=119232-119243&rft.issn=2169-3536&rft.eissn=2169-3536&rft.coden=IAECCG&rft_id=info:doi/10.1109/ACCESS.2022.3202541&rft_dat=%3Cproquest_doaj_%3E2736886712%3C/proquest_doaj_%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2736886712&rft_id=info:pmid/&rft_ieee_id=9869634&rft_doaj_id=oai_doaj_org_article_b06c8ce7962d4ef09ff228b3cae7db6f&rfr_iscdi=true |