Modeling and Simulation of Abnormal Behavior Detection Through History Trajectory Monitoring in Wireless Sensor Networks

Data security is becoming increasingly important with the growing popularity of smart management systems combining wireless sensor networks (WSNs) and intelligent systems in industrial, agricultural, and construction fields. Traditional security methods for WSN have focused on data integrity and the...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE access 2022, Vol.10, p.119232-119243
Hauptverfasser: Ahn, Jung Sub, Cho, Tae Ho
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 119243
container_issue
container_start_page 119232
container_title IEEE access
container_volume 10
creator Ahn, Jung Sub
Cho, Tae Ho
description Data security is becoming increasingly important with the growing popularity of smart management systems combining wireless sensor networks (WSNs) and intelligent systems in industrial, agricultural, and construction fields. Traditional security methods for WSN have focused on data integrity and the identification of outliers in sensor data and are therefore vulnerable to attacks such as false positive attacks (FPAs) and false negative attack (FNAs) using massively compromised nodes. these attacks significantly compromise the sensor nodes because the correlation between node verification behaviors is not considered in the communication process until the intercepted sensor data are used as input into the system. This study introduces an FPA and FNA detection method using a spatiotemporal historical data-based knowledge base. The main contribution of the present study is the recognition of abnormal correlations using behavior monitoring through the discrete event system specification model. By recognizing abnormal correlations, the proposed method prevents the inflow of false data generated as a result of widespread damage. Furthermore, a new strategy is proposed to maximize the lifetime of the network by blocking any compromised nodes. The proposed spatiotemporal data-based detection approach is applicable to a wide variety of fields owing to its use of a shared security model. The proposed method was shown to reduce the energy consumption by 46.737% and 41.927% in comparison to statistical en-route filtering and cluster-based false-data filtering, respectively.
doi_str_mv 10.1109/ACCESS.2022.3202541
format Article
fullrecord <record><control><sourceid>proquest_doaj_</sourceid><recordid>TN_cdi_proquest_journals_2736886712</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9869634</ieee_id><doaj_id>oai_doaj_org_article_b06c8ce7962d4ef09ff228b3cae7db6f</doaj_id><sourcerecordid>2736886712</sourcerecordid><originalsourceid>FETCH-LOGICAL-c358t-403d13b1af7c7ccd06b8d71ed817999c39d2f5bd45beeac7cfa8b4154c3dd0cc3</originalsourceid><addsrcrecordid>eNpNUU1PGzEQXVWtVAT8Ai6WOCf1x64_jmlKCxK0hwRxtPwxThw2a2pv2vLvcViE6sP4aea9NyO9prkgeE4IVl8Wy-XVajWnmNI5q7VryYfmhBKuZqxj_ON_-HNzXsoO1ydrqxMnzb-75KGPwwaZwaNV3B96M8Y0oBTQwg4p702PvsLW_Ikpo28wgnsdr7c5HTZbdB3LmPIzWmezq6MjvEtDrODoGQf0EDP0UApawVCqxU8Y_6b8WM6aT8H0Bc7f_tPm_vvVenk9u_3142a5uJ051slx1mLmCbPEBOGEcx5zK70g4CURSinHlKehs77tLICplGCkbUnXOuY9do6dNjeTr09mp59y3Jv8rJOJ-rWR8kabPEbXg7aYO-lAKE59CwGrECiVljkDwlseqtfl5PWU0-8DlFHv0iEP9XxNBeNSckFoZbGJ5XIqJUN430qwPiamp8T0MTH9llhVXUyqCADvCiW54qxlLx1TlWs</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2736886712</pqid></control><display><type>article</type><title>Modeling and Simulation of Abnormal Behavior Detection Through History Trajectory Monitoring in Wireless Sensor Networks</title><source>IEEE Open Access Journals</source><source>DOAJ Directory of Open Access Journals</source><source>EZB-FREE-00999 freely available EZB journals</source><creator>Ahn, Jung Sub ; Cho, Tae Ho</creator><creatorcontrib>Ahn, Jung Sub ; Cho, Tae Ho</creatorcontrib><description>Data security is becoming increasingly important with the growing popularity of smart management systems combining wireless sensor networks (WSNs) and intelligent systems in industrial, agricultural, and construction fields. Traditional security methods for WSN have focused on data integrity and the identification of outliers in sensor data and are therefore vulnerable to attacks such as false positive attacks (FPAs) and false negative attack (FNAs) using massively compromised nodes. these attacks significantly compromise the sensor nodes because the correlation between node verification behaviors is not considered in the communication process until the intercepted sensor data are used as input into the system. This study introduces an FPA and FNA detection method using a spatiotemporal historical data-based knowledge base. The main contribution of the present study is the recognition of abnormal correlations using behavior monitoring through the discrete event system specification model. By recognizing abnormal correlations, the proposed method prevents the inflow of false data generated as a result of widespread damage. Furthermore, a new strategy is proposed to maximize the lifetime of the network by blocking any compromised nodes. The proposed spatiotemporal data-based detection approach is applicable to a wide variety of fields owing to its use of a shared security model. The proposed method was shown to reduce the energy consumption by 46.737% and 41.927% in comparison to statistical en-route filtering and cluster-based false-data filtering, respectively.</description><identifier>ISSN: 2169-3536</identifier><identifier>EISSN: 2169-3536</identifier><identifier>DOI: 10.1109/ACCESS.2022.3202541</identifier><identifier>CODEN: IAECCG</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>Behavioral sciences ; Data analysis ; Data integrity ; Data models ; Discrete event system specification (DEVS) ; Discrete event systems ; Energy consumption ; false negative attack detection ; false positive attack detection ; Filtering ; Filtration ; history trajectory monitoring ; Intelligent systems ; Knowledge based systems ; Knowledge bases (artificial intelligence) ; Management systems ; Monitoring ; network security ; Nodes ; Outliers (statistics) ; Security ; Sensors ; Spatiotemporal data ; Spatiotemporal phenomena ; Wireless networks ; wireless sensor network ; Wireless sensor networks</subject><ispartof>IEEE access, 2022, Vol.10, p.119232-119243</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c358t-403d13b1af7c7ccd06b8d71ed817999c39d2f5bd45beeac7cfa8b4154c3dd0cc3</cites><orcidid>0000-0002-3945-4021 ; 0000-0001-6222-2096</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9869634$$EHTML$$P50$$Gieee$$Hfree_for_read</linktohtml><link.rule.ids>314,780,784,864,2100,4022,27632,27922,27923,27924,54932</link.rule.ids></links><search><creatorcontrib>Ahn, Jung Sub</creatorcontrib><creatorcontrib>Cho, Tae Ho</creatorcontrib><title>Modeling and Simulation of Abnormal Behavior Detection Through History Trajectory Monitoring in Wireless Sensor Networks</title><title>IEEE access</title><addtitle>Access</addtitle><description>Data security is becoming increasingly important with the growing popularity of smart management systems combining wireless sensor networks (WSNs) and intelligent systems in industrial, agricultural, and construction fields. Traditional security methods for WSN have focused on data integrity and the identification of outliers in sensor data and are therefore vulnerable to attacks such as false positive attacks (FPAs) and false negative attack (FNAs) using massively compromised nodes. these attacks significantly compromise the sensor nodes because the correlation between node verification behaviors is not considered in the communication process until the intercepted sensor data are used as input into the system. This study introduces an FPA and FNA detection method using a spatiotemporal historical data-based knowledge base. The main contribution of the present study is the recognition of abnormal correlations using behavior monitoring through the discrete event system specification model. By recognizing abnormal correlations, the proposed method prevents the inflow of false data generated as a result of widespread damage. Furthermore, a new strategy is proposed to maximize the lifetime of the network by blocking any compromised nodes. The proposed spatiotemporal data-based detection approach is applicable to a wide variety of fields owing to its use of a shared security model. The proposed method was shown to reduce the energy consumption by 46.737% and 41.927% in comparison to statistical en-route filtering and cluster-based false-data filtering, respectively.</description><subject>Behavioral sciences</subject><subject>Data analysis</subject><subject>Data integrity</subject><subject>Data models</subject><subject>Discrete event system specification (DEVS)</subject><subject>Discrete event systems</subject><subject>Energy consumption</subject><subject>false negative attack detection</subject><subject>false positive attack detection</subject><subject>Filtering</subject><subject>Filtration</subject><subject>history trajectory monitoring</subject><subject>Intelligent systems</subject><subject>Knowledge based systems</subject><subject>Knowledge bases (artificial intelligence)</subject><subject>Management systems</subject><subject>Monitoring</subject><subject>network security</subject><subject>Nodes</subject><subject>Outliers (statistics)</subject><subject>Security</subject><subject>Sensors</subject><subject>Spatiotemporal data</subject><subject>Spatiotemporal phenomena</subject><subject>Wireless networks</subject><subject>wireless sensor network</subject><subject>Wireless sensor networks</subject><issn>2169-3536</issn><issn>2169-3536</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>ESBDL</sourceid><sourceid>RIE</sourceid><sourceid>DOA</sourceid><recordid>eNpNUU1PGzEQXVWtVAT8Ai6WOCf1x64_jmlKCxK0hwRxtPwxThw2a2pv2vLvcViE6sP4aea9NyO9prkgeE4IVl8Wy-XVajWnmNI5q7VryYfmhBKuZqxj_ON_-HNzXsoO1ydrqxMnzb-75KGPwwaZwaNV3B96M8Y0oBTQwg4p702PvsLW_Ikpo28wgnsdr7c5HTZbdB3LmPIzWmezq6MjvEtDrODoGQf0EDP0UApawVCqxU8Y_6b8WM6aT8H0Bc7f_tPm_vvVenk9u_3142a5uJ051slx1mLmCbPEBOGEcx5zK70g4CURSinHlKehs77tLICplGCkbUnXOuY9do6dNjeTr09mp59y3Jv8rJOJ-rWR8kabPEbXg7aYO-lAKE59CwGrECiVljkDwlseqtfl5PWU0-8DlFHv0iEP9XxNBeNSckFoZbGJ5XIqJUN430qwPiamp8T0MTH9llhVXUyqCADvCiW54qxlLx1TlWs</recordid><startdate>2022</startdate><enddate>2022</enddate><creator>Ahn, Jung Sub</creator><creator>Cho, Tae Ho</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>ESBDL</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7SR</scope><scope>8BQ</scope><scope>8FD</scope><scope>JG9</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>DOA</scope><orcidid>https://orcid.org/0000-0002-3945-4021</orcidid><orcidid>https://orcid.org/0000-0001-6222-2096</orcidid></search><sort><creationdate>2022</creationdate><title>Modeling and Simulation of Abnormal Behavior Detection Through History Trajectory Monitoring in Wireless Sensor Networks</title><author>Ahn, Jung Sub ; Cho, Tae Ho</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c358t-403d13b1af7c7ccd06b8d71ed817999c39d2f5bd45beeac7cfa8b4154c3dd0cc3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Behavioral sciences</topic><topic>Data analysis</topic><topic>Data integrity</topic><topic>Data models</topic><topic>Discrete event system specification (DEVS)</topic><topic>Discrete event systems</topic><topic>Energy consumption</topic><topic>false negative attack detection</topic><topic>false positive attack detection</topic><topic>Filtering</topic><topic>Filtration</topic><topic>history trajectory monitoring</topic><topic>Intelligent systems</topic><topic>Knowledge based systems</topic><topic>Knowledge bases (artificial intelligence)</topic><topic>Management systems</topic><topic>Monitoring</topic><topic>network security</topic><topic>Nodes</topic><topic>Outliers (statistics)</topic><topic>Security</topic><topic>Sensors</topic><topic>Spatiotemporal data</topic><topic>Spatiotemporal phenomena</topic><topic>Wireless networks</topic><topic>wireless sensor network</topic><topic>Wireless sensor networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Ahn, Jung Sub</creatorcontrib><creatorcontrib>Cho, Tae Ho</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE Open Access Journals</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Engineered Materials Abstracts</collection><collection>METADEX</collection><collection>Technology Research Database</collection><collection>Materials Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>IEEE access</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Ahn, Jung Sub</au><au>Cho, Tae Ho</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Modeling and Simulation of Abnormal Behavior Detection Through History Trajectory Monitoring in Wireless Sensor Networks</atitle><jtitle>IEEE access</jtitle><stitle>Access</stitle><date>2022</date><risdate>2022</risdate><volume>10</volume><spage>119232</spage><epage>119243</epage><pages>119232-119243</pages><issn>2169-3536</issn><eissn>2169-3536</eissn><coden>IAECCG</coden><abstract>Data security is becoming increasingly important with the growing popularity of smart management systems combining wireless sensor networks (WSNs) and intelligent systems in industrial, agricultural, and construction fields. Traditional security methods for WSN have focused on data integrity and the identification of outliers in sensor data and are therefore vulnerable to attacks such as false positive attacks (FPAs) and false negative attack (FNAs) using massively compromised nodes. these attacks significantly compromise the sensor nodes because the correlation between node verification behaviors is not considered in the communication process until the intercepted sensor data are used as input into the system. This study introduces an FPA and FNA detection method using a spatiotemporal historical data-based knowledge base. The main contribution of the present study is the recognition of abnormal correlations using behavior monitoring through the discrete event system specification model. By recognizing abnormal correlations, the proposed method prevents the inflow of false data generated as a result of widespread damage. Furthermore, a new strategy is proposed to maximize the lifetime of the network by blocking any compromised nodes. The proposed spatiotemporal data-based detection approach is applicable to a wide variety of fields owing to its use of a shared security model. The proposed method was shown to reduce the energy consumption by 46.737% and 41.927% in comparison to statistical en-route filtering and cluster-based false-data filtering, respectively.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/ACCESS.2022.3202541</doi><tpages>12</tpages><orcidid>https://orcid.org/0000-0002-3945-4021</orcidid><orcidid>https://orcid.org/0000-0001-6222-2096</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 2169-3536
ispartof IEEE access, 2022, Vol.10, p.119232-119243
issn 2169-3536
2169-3536
language eng
recordid cdi_proquest_journals_2736886712
source IEEE Open Access Journals; DOAJ Directory of Open Access Journals; EZB-FREE-00999 freely available EZB journals
subjects Behavioral sciences
Data analysis
Data integrity
Data models
Discrete event system specification (DEVS)
Discrete event systems
Energy consumption
false negative attack detection
false positive attack detection
Filtering
Filtration
history trajectory monitoring
Intelligent systems
Knowledge based systems
Knowledge bases (artificial intelligence)
Management systems
Monitoring
network security
Nodes
Outliers (statistics)
Security
Sensors
Spatiotemporal data
Spatiotemporal phenomena
Wireless networks
wireless sensor network
Wireless sensor networks
title Modeling and Simulation of Abnormal Behavior Detection Through History Trajectory Monitoring in Wireless Sensor Networks
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-11T13%3A19%3A10IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_doaj_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Modeling%20and%20Simulation%20of%20Abnormal%20Behavior%20Detection%20Through%20History%20Trajectory%20Monitoring%20in%20Wireless%20Sensor%20Networks&rft.jtitle=IEEE%20access&rft.au=Ahn,%20Jung%20Sub&rft.date=2022&rft.volume=10&rft.spage=119232&rft.epage=119243&rft.pages=119232-119243&rft.issn=2169-3536&rft.eissn=2169-3536&rft.coden=IAECCG&rft_id=info:doi/10.1109/ACCESS.2022.3202541&rft_dat=%3Cproquest_doaj_%3E2736886712%3C/proquest_doaj_%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2736886712&rft_id=info:pmid/&rft_ieee_id=9869634&rft_doaj_id=oai_doaj_org_article_b06c8ce7962d4ef09ff228b3cae7db6f&rfr_iscdi=true