[go: up one dir, main page]

Next Article in Journal
Significant Wave Height Estimation from Joint CYGNSS DDMA and LES Observations
Next Article in Special Issue
Reconfigurable Wireless Sensor Node Remote Laboratory Platform with Cloud Connectivity
Previous Article in Journal
Analysis of Impact of Natural Ventilation Strategies in Ventilation Rates and Indoor Environmental Acoustics Using Sensor Measurement Data in Educational Buildings
Previous Article in Special Issue
New Calibration System for Low-Cost Suspended Particulate Matter Sensors with Controlled Air Speed, Temperature and Humidity
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

An Adaptive Protection System for Sensor Networks Based on Analysis of Neighboring Nodes

1
Faculty of Electrical Engineering and Informatics, Technical University of Košice, Letná 9, 04200 Košice, Slovakia
2
Institute for Computer Technologies and Information Security, Southern Federal University, Chekhova 2, 347922 Taganrog, Russia
3
Faculty of Science, Queensland University of Technology (QUT), Gardens Point Campus, Brisbane, QLD 4001, Australia
*
Author to whom correspondence should be addressed.
Sensors 2021, 21(18), 6116; https://doi.org/10.3390/s21186116
Submission received: 30 July 2021 / Revised: 2 September 2021 / Accepted: 8 September 2021 / Published: 12 September 2021
(This article belongs to the Special Issue Intelligent Circuits and Sensing Technologies)
Figure 1
<p>Block diagram of the adaptive protection system of the sensor node.</p> ">
Figure 2
<p>Changes in the traffic pattern when analyzing raw data on: (<b>a</b>) received packets of node <span class="html-italic">i</span> and (<b>b</b>) packets sent from node <span class="html-italic">i</span>; (<b>c</b>) received packets from node <span class="html-italic">j</span> and (<b>d</b>) sent packets from node <span class="html-italic">j</span> during normal operation of the sensor network.</p> ">
Figure 3
<p>The result of calculating the entropy for: (<b>a</b>) received packets and (<b>b</b>) sent packets by node <span class="html-italic">i</span> relative to node <span class="html-italic">j</span> (marked in blue) and node <span class="html-italic">j</span> relative to node <span class="html-italic">i</span> (marked in orange).</p> ">
Figure 4
<p>Changing the CPU load when analyzing raw data: (<b>a</b>) for node <span class="html-italic">i</span>; and (<b>b</b>) for node <span class="html-italic">j</span>.</p> ">
Figure 5
<p>Result of calculating the entropy for the level of CPU utilization by node <span class="html-italic">i</span> relative to node <span class="html-italic">j</span> (marked in blue) and by node <span class="html-italic">j</span> relative to node <span class="html-italic">i</span> (marked in orange).</p> ">
Figure 6
<p>The result of calculating the normal distribution function for incoming traffic of: (<b>a</b>) node <span class="html-italic">i</span> with additional payload; and (<b>b</b>) node <span class="html-italic">j</span> in normal mode.</p> ">
Figure 7
<p>The result of calculating the entropy for: (<b>a</b>) received packets; and (<b>b</b>) sent packets by node <span class="html-italic">i</span> relative to node <span class="html-italic">j</span> (marked in blue) and by node <span class="html-italic">j</span> relative to node <span class="html-italic">i</span> (marked in orange) with additional payload.</p> ">
Figure 8
<p>The result of calculating the entropy for the level of CPU utilization by node <span class="html-italic">i</span> relative to node <span class="html-italic">j</span> (marked in blue) and by node <span class="html-italic">j</span> relative to node <span class="html-italic">i</span> (marked in orange) with an additional payload.</p> ">
Figure 9
<p>Changes in the traffic pattern when analyzing raw data on: (<b>a</b>) received packets from node <span class="html-italic">i</span>; and (<b>b</b>) sent packets from node <span class="html-italic">i</span> under conditions of a SYN flood attack.</p> ">
Figure 10
<p>The result of calculating the entropy for: (<b>a</b>) received packets; and (<b>b</b>) sent packets by node <span class="html-italic">i</span> relative to node <span class="html-italic">j</span> (marked in blue) and node <span class="html-italic">j</span> relative to node <span class="html-italic">i</span> (marked in orange) under conditions of a SYN flood attack.</p> ">
Figure 11
<p>The result of calculating the normal distribution function for the incoming traffic of node <span class="html-italic">i</span> under conditions of a SYN flood attack.</p> ">
Figure 12
<p>Changing the CPU load when analyzing raw data for node <span class="html-italic">i</span> under conditions of a SYN flood attack.</p> ">
Figure 13
<p>The result of calculating the entropy for CPU load by node <span class="html-italic">i</span> relative to node <span class="html-italic">j</span> (marked in blue) and by node <span class="html-italic">j</span> relative to node <span class="html-italic">i</span> (marked in orange) under conditions of a SYN flood attack.</p> ">
Figure 14
<p>The result of calculating the entropy for: (<b>a</b>) received packets; and (<b>b</b>) packets sent by node <span class="html-italic">i</span> relative to node <span class="html-italic">j</span> (marked in blue) and by node <span class="html-italic">j</span> relative to node <span class="html-italic">i</span> (marked in orange) under conditions of a deauthentication attack.</p> ">
Figure 15
<p>The result of calculating the entropy for received packets by node <span class="html-italic">i</span> relative to node <span class="html-italic">j</span> (marked in yellow) and by node <span class="html-italic">j</span> relative to node <span class="html-italic">i</span> (marked in orange) under conditions of a deauthentication attack.</p> ">
Figure 16
<p>The result of calculating the entropy for CPU load by node <span class="html-italic">i</span> relative to node <span class="html-italic">j</span> (marked in blue) and by node <span class="html-italic">j</span> relative to node <span class="html-italic">i</span> (marked in orange) by the impact of a deauthentication attack.</p> ">
Versions Notes

Abstract

:
Creation and operation of sensor systems is a complex challenge not only for industrial and military purposes but also for consumer services (“smart city”, “smart home”) and other applications such as agriculture (“smart farm”, “smart greenhouse”). The use of such systems gives a positive economic effect and provides additional benefits from various points of view. At the same time, due to a large number of threats and challenges to cyber security, it is necessary to detect attacks on sensor systems in a timely manner. Here we present an anomaly detection method in which sensor nodes observe their neighbors and detect obvious deviations in their behavior. In this way, the community of neighboring nodes works collectively to protect one another. The nodes record only those parameters and attributes that are inherent in any node. Regardless of the node’s functionality, such parameters include the amount of traffic passing through the node, its Central Processing Unit (CPU) load, as well as the presence and number of packets dropped by the node. Our method’s main goal is to implement protection against the active influence of an internal attacker on the whole sensor network. We present the anomaly detection method, a dataset collection strategy, and experimental results that show how different types of attacks can be distinguished in the data produced by the nodes.

1. Introduction

Sensor systems and networks are being implemented in various spheres of human activity. Smart sensors are used to build Internet-of-Things systems, groups of mobile robots, smart cars, and so on [1]. In the process of creating and operating these systems, cyber security becomes a critical concern [2]. Because sensor systems are built on new architectural solutions and principles, they are characterized by new cyber security threats [3]. For example, clustering is often used to build sensory systems and occasionally a new leader is chosen for a cluster. Introducing an intruder into such a scheme can lead to the intruder itself becoming the leader of the cluster or can affect the division of nodes into groups. As a result, not only information flows and processes can be disrupted, but the physical environment can be affected. This problem is especially relevant for cyber-physical systems that manage physical objects or assets [4].
Many proposals to protect sensor networks include the use of Blockchain technologies. The blockchain must ensure trusted use of the sensor network’s infrastructure, which ultimately increases security [5]. However, blockchain is a rather complex and resource-intensive technology, in which trust is achieved using signatures, as in classical cryptography [6]. Deep learning authentication methods are another popular sensor security solution [7]. At the same time, researchers are looking for new signs of behavior assessment that would form the basis of authentication [8]. However, cryptographic and authentication methods cannot always ensure the complete security of a system.
Often the sensory system is located outside a controlled area, in natural conditions, or outdoors. The nodes of the system may be mobile, the architecture of the system can be periodically updated, and new nodes may be added [9]. Cryptographic and authentication methods cannot always ensure the complete security of such a system. In addition, many sensor systems are based on wireless networks that are themselves not physically secure [10]. Even if the nodes encrypt traffic and authenticate each other, this will not protect them from active attacks and other destructive influences and will not help to detect external influences [11].
One of the solutions to improve the security of sensor networks may be the modernization of the network’s underlying architecture, through improvement of its physical properties. Dodig et al. [12] propose modifying the architecture of Industry 4.0 systems to implement security solutions at the hardware level.
Stępień and Poniszewska-Marańda propose behavioral-based safety measures and algorithms for vehicular networks [13]. Their approach concentrates on vehicles assessing each other’s behavior. Various types of vehicle behavior are identified, which ultimately affects the level of confidence in it. In this case, it is necessary to comply with certain constraints, such as the distance to the neighboring car, and the number of neighbors. The authors claim that even if the number of intruder vehicles exceeds 50%, the system will still be able to detect them.
Jiang et al. [14] use statistical and machine learning methods to identify anomalies. At the same time, the authors analyze time series, classifying them into the following types: periodic, stationary, non-periodic, and non-stationary. Then, different schemes are applied to different classes of time series to detect anomalies. The authors declare that their semi-supervised anomaly detection framework method (called Tri-CAD) yields the best grading results.
Mittal et al. [15] analyze the security and performance of the most popular secure routing protocols, Low-Energy Adaptive Clustering Hierarchy (LEACH) [16], Energy-Efficient Sensor Routing (EESR), and Sub-Cluster LEACH. They show that Sub-LEACH with Large Margin Nearest Neighbor (LMNN) produces the best performance [17]. The authors also propose an intrusion detection system. They use data normalization and coding techniques for better processing.
Schneider et al. [18] use a ready-made collection of data to evaluate their method [19]. The authors analyze various methods for detecting attacks and anomalies, based on machine learning algorithms (Logistic Regression (LR), Support Vector Machine (SVM), Decision Tree (DT), Random Forest (RF), Artificial Neural Network (ANN), and k-Nearest Neighbor (KNN)), to protect against cybersecurity threats on the Internet of Things. In contrast to previous work on individual classifiers, they also analyze ensemble methods such as packing, boosting, and summation to improve the performance of their detection system [20,21,22,23]. The authors integrate feature selection, cross-validation, and multi-class classification for the cybersecurity field. Experimental results with an existing dataset of attacks demonstrate that the method can effectively identify cyberattacks.
Thus, we have seen that ensuring information security of sensor networks, and the detection of anomalies, is an important research topic. However, previous authors often focus on machine learning-style methods rather than identifying the basic classification criteria. In most studies, ready-made databases with already-known attacks are used for analysis and identification of anomalies. In our research, we focused on identifying the fundamental signs of an attack.
A key objective of our research is to study changes in cyber-physical parameters under the influence of an attack, both during normal functioning and with additional load. It is necessary to identify signs of an attack that could give a new insight into anomalies in the sensory system. In addition, the study should allow the creation of its own database, which can be considered authentic for artificial intelligence training. The database can then be used to test various classification methods.
Determination of attack signs and analysis of cyber-physical parameters as a new vector for assessing an attack was a priority task in our study. We also consider the issues of data normalization. By virtue of data normalization and detection of threshold values at the experimental stage, our method can be applied to any sensory system without the need for prior training. Most importantly, our approach allows nodes in a network to detect attacks on their neighbors, thus allowing them to work together to defend the entire network.
The rest of the paper is as follows. In Section 2, the architecture of the anomaly detection system is presented, its main modules are described, and the method for detecting anomalies is presented. Section 3 explains the experimental study, its results, and discussion, as well as attributes for classifying attacks. Finally, the conclusion and future work is discussed in Section 4.

2. Materials and Methods

2.1. Threat Model

The threat model in this study is based on the vulnerabilities of wireless communication channels between the sensor network nodes. The main threats are implemented using active attacks and can be considered as follows:
  • Threat of deauthorization of an authorized wireless client. The threat is the ability to automatically disconnect a wireless access point from an authorized wireless client.
  • Threat of unauthorized access to the system via wireless channels. The threat lies in the possibility of an intruder gaining access to the resources of the entire discredited information system through the wireless data transmission channels used in its composition.
  • Threat of exploiting weaknesses in network/local communication protocols. The threat lies in the possibility of an intruder’s unauthorized access to information due to a destructive effect on the protocols of network/local data exchange in the system.
  • Threat of remote consumption of sensor nodes resources. The threat is that an attacker can influence the consumed unit of energy resources (i.e., the amount of energy consumed per unit of time) by continuing to send packets to them, but also without allowing nodes to go into sleep mode.
  • Threat of blocking wireless communication channels between nodes. The threat lies in the possibility of noise or blocking of one of the nodes participating in the network exchange, which leads to blocking of the communication line.
Let us consider the impact of different types of attacks on the cyber-physical parameters of the sensor node. The result of the analysis is shown in Table 1.
In the study described in this paper, scenarios of two active attacks were implemented. One of them is a SYN (Synchronize sequence numbers) flood attack, which was carried out using the netwox utility. The second is a deauthentication attack, which was carried out using the aireplay-ng utility. A SYN flood attack can be thought of as an availability attack and a host depletion attack. A deauthentication attack can be thought of as an accessibility attack.

2.2. Architecture of the Sensor Network Adaptive Protection System

In this subsection, we describe the assumed architecture of the adaptive protection system. The main capabilities that the system provides are:
  • Detection of anomalies through analysis of the system node’s parameters;
  • Timely notification of the operator and neighboring nodes about a possible incident; and
  • Determination of the type of attack.
Figure 1 shows a general structural diagram of our protection system, including the main modules and subsystems, as well as their integration into the sensor system.
The subsystem for analyzing and collecting data from the sensor node collects information about changes in cyber-physical parameters. The subsystem receives data from the sensor node’s hardware. The key idea is that by analyzing cyber-physical parameters throughout the entire operation of the sensory system, it is possible to detect the presence of anomalies that could be signs of an active attack on the sensory system. Cyber-physical parameters are parameters that reflect changes in both software and physical components of the sensor node.

2.2.1. Sensor Node Data Analysis Module

The module for analyzing data about the sensor node also includes a module for processing and normalizing data. Using raw data can be ineffective for several reasons. First, raw data requires more memory and processing power. Secondly, when processing raw data, false alarms or measurement inaccuracies can occur. Thus, in our approach, methods of probability theory were used to normalize data. Quantile diagrams were built to determine the types of probability distributions for each parameter. This helps to determine the distribution type of a random variable. The sensor node data analysis module collects information from hardware devices, sensors, and actuators about CPU utilization, power consumption, and memory resources, network traffic, etc. Then the data is normalized and transmitted to the sensor node anomaly analysis module. The advantages of using the data analysis subsystem are as follows:
  • The ability to transfer collected and normalized data to other subsystems; and
  • The ability to present the collected data in a simple format convenient for analysis.

2.2.2. Cyber-Physical Parameters for Analysis

Figure 1 shows the use of cyber-physical parameters and hardware components of the sensor node by the adaptive protection system modules.
As can be seen, only the sensor node data analysis module accesses the hardware devices. It takes readings from sensors, computing resources, actuators and receives a set of cyber-physical parameters.
System modules work with processed data. Thus, the advantage of the sensor node data analysis subsystem is the use of one set of data for solving different protection tasks, as well as a decrease in the number of calls of software modules to hardware. Firstly, it provides greater reliability because the sensor node is controlled by a single process, while it is necessary to consider different processes in a single control system. If we talk about building a protection system, each process must be authorized, and its access to the hardware is controlled and recorded; otherwise, the system may fail or be compromised. Therefore, the fewer such calls, the easier it is to process these events from a security point of view. Secondly, the processing of software modules with prepared datasets speeds up the decision-making process, which increases the response time and, at the same time, the performance of the system. An attacker can carry out targeted attacks on certain cyber-physical parameters, or can carry out attacks that indirectly affect the physical properties of the system [24]. For example, there could be a direct attack on the depletion of a device’s battery, and an attack on a network overflow with false requests to connect to a node, which can be a sensor network node. In this case, the effects of both attacks can be similar. For example, both attacks can result in a greater computational load and drain the battery faster whereas an overflow attack on false requests also increases network traffic.
If we consider cyber-physical parameters in general terms, then it is quite difficult to track the difference in the impact of attacks on each of them. Many types of attacks are the same for different cyber-physical parameters. In addition, the evaluation of the parameter in a general form can give false positives. For example, an increase in network traffic may be associated with the need to transmit additional useful information, and not with an attack. However, if we consider the network traffic in more detail, and classify it by protocol types and direction, then the values can be more accurate. In addition, greater detail will allow identifying attack types in the future.
By considering which cyber-physical parameters changed their value and to what extent it becomes possible to determine not only the type or class of the attack but also to establish which attack was implemented on the system.

2.2.3. Sensor Node Adaptive Protection System

This module is based on the detection of anomalies or abnormal behavior. As a consequence of their potentially destructive effect, the state of the sensory system changes from a normal state to an abnormal one. The main tasks performed are:
  • Detecting anomalies and establishing a correlation between an anomaly and an attack; and
  • Exchanging information with other modules in the protection system.
Anomalies and denials of service can occur not only as a result of a deliberate attack but also due to external natural influences or component failures associated with mistakes made in the design of the sensor system. To rule these out, it is necessary to study the process of diagnostics, forecasting, monitoring, and decision-making in real-time using data obtained from both a single sensor node and from the sensor system.
The module for detecting attacks and the type of attack on the sensor system classifies the detected anomaly as an attack and determines its type. The sensor node can be intercepted by an intruder and used as an attacking node or can harm the rest of the sensor system because of a technical, systemic failure. The type of attack is determined based on which cyber-physical parameters are affected and to what extent. The attack-detection module receives data from the anomaly-detection module and uses them for further analysis. The module for detecting attacks and the type of attack of the sensor node also interacts with the alert notification subsystem. Using this architecture, our research defines the set of rules for the further implementation of these modules.

2.2.4. Alert Notification Module

This human-machine interface module is designed to send messages to the operator, who can monitor the operation of the sensor system and coordinate it. The module can be useful in mixed control when the operator gives commands, and the nodes are already in an autonomous mode to execute them.
If the system is configured so that nodes share tasks and act as a coordinated group, then this module will notify not only about anomalies detected for an individual node but about anomalies detected by neighboring nodes.

2.3. Method for Determining the Abnormal Activity of the Sensor System

2.3.1. Technique for Processing and Normalizing Data

Here we describe our technique for processing the raw sensor data in order to identify abnormalities. A normal distribution smooths out the changes in the random variable, and the attack start time may not be fixed if the distribution is rebuilt every time interval [25]. If the range of values is significant, then the attack will be missed due to the fact that the standard deviation will rise sharply and may even exceed the expected value. After determining the initial conditions, a normal distribution is constructed:
f ( s ) = 1 σ s 2 π e ( s M s ) 2 2 σ s 2 ,
f ( r ) = 1 σ r 2 π e ( r M r ) 2 2 σ r 2 ,
where f(s) and f(r) are the normal distribution functions of a random variable (in this case, the number of packets sent and received, respectively) at specified time intervals; Ms and Mr are the mathematical expectations for sent and received packets, respectively, calculated in the same way for forwarded and dropped packets; and σs and σr are the standard deviations for the same parameters.
A Poisson distribution can be used to estimate the cyber-physical parameter of the CPU load [26]. The Poisson model describes a scheme of rare events: under certain assumptions about the nature of the process of occurrence of random events, the number of events that occurred over a fixed period or in a fixed region of space often obeys the Poisson distribution:
P ( K n ) = λ K n K n ! e λ ,
where P is the probability function of the distribution of a random variable according to the Poisson distribution; Kn is the percentage of the total amount of processor time between n and n–1 that the processor spent on processing processes running in the kernel mode; λ is the mathematical expectation that is the average number of occurrences of the event of interest in a unit of time; and e is Euler’s number.

2.3.2. The Method of Detecting Anomalies Based on Entropy in the Sensor System

Our analysis of the normalized cyber-physical parameters showed that the probability distribution of the victim and the normal state is often close to each other, but the abnormal state is significantly different [27]. To measure the difference between function distributions, the Kullback-Leibler entropy measure is used. The entropy of a random variable is a measure of its uncertainty; it is a measure of the amount of information required on average to describe a random variable. Relative entropy is a measure of the distance between two distributions [28]. In statistics, it appears as the expected logarithm of the likelihood ratio [27]. The relative entropy D (p||q) is the measure of inefficiency if the distribution is assumed to be q when the true distribution is equal to p. For example, if you know the true distribution p of a random variable, you can construct a code with an average description length H (p). If instead a code were used to distribute q, it would take on average H (p) + D (p||q) bits to describe the random variable. Relative entropy was first determined by Kullback and Leibler [29,30].
1. Determination of the measure of entropy for the cyber-physical parameter (the level of CPU load):
K L ( P K n i | | P K n j ) = P K n i ( x ) | ln P K n i ( x ) P K n j ( x ) d x = D i j
K L ( P K n j | | P K n i ) = P K n j ( x ) ln P K n j ( x ) P K n i ( x ) d x = D j i
where PKni is the function of the probability distribution of the CPU workload of a random variable of the sensor node i at the current time interval; PKnj is the function of the probability distribution of the CPU workload of a random variable of the sensor node j at the current time interval; Dij is the degree of deviation of the distributions of node i from node j; and Dji is the degree of deviation of the distributions of node j from node i;
2. Determination of the measure of entropy for the cyber-physical parameter (network traffic):
K L ( f ( s , r ) n i | | f ( s , r ) n j ) = f ( s , r ) n i ln f ( s , r ) n i f ( s , r ) n j d ( s , r ) = D L i j
K L ( f ( s , r ) n j | | f ( s , r ) n i ) = f ( s , r ) n j ln f ( s , r ) n j f ( s , r ) n i d ( s , r ) = D L j i
where f(s,r)ni is the function of normal distribution of network traffic of the sensor node i for on the current time interval; f(s,r)nj is the function of normal distribution of network traffic of a random variable j on the current time interval; DLij is the degree of deviation of the distributions of node i from node j; and DLji is the degree of deviation of the distributions of node j from node i.
Thus, using this method, it is possible to determine to what extent the behavior of a given node i differs from a neighboring node j and to identify anomalies.

3. Results and Discussion

Based on the protection system architecture and data analysis equations above, we conducted practical experiments to both validate and configure the anomaly detection process. The main objectives of the experimental study were as follows:
  • confirmation of the effectiveness of the method for detecting anomalies of the sensor system;
  • collecting data to form a data set for training a neural network, to classify attacks; and
  • analysis of the boundaries of divergence values for making decisions about the presence of anomalies and attacks in the sensory system.
The experimental study was carried out using a test bench developed and presented by the authors earlier [31]. The test bench is a set of single-board computers with a Linux-based operating system installed. The stand includes 4 nodes that exchange useful information according to a given algorithm, while a wireless mesh network is created between the nodes.
The experimental study was carried out in four directions:
  • Recording the normal operation of the sensor system, when the nodes exchange information according to a given algorithm using the User Datagram Protocol (UDP) [32], and when the Optimized Link State Routing (OLSR) protocol [33] is used between the nodes. In this case, there is no additional effect on the sensory system.
  • Adding a payload to normal node operation. The Internet Control Message Protocol (ICMP) was used as the payload and the request/response messages were sent to the neighboring node.
  • A denial-of-service attack aimed at overloading a node. To implement this scenario, a SYN flood attack was used, the victim’s open port was attacked, in this case, Port 22 [34]. During the attack, the victim node received many connection requests, because of which the message queue overflowed, and the node was blocked, while the network remained available.
  • A denial-of-service attack aimed at blocking a channel. To implement this scenario, a deauthentication attack was used. When one of the nodes was blocked and its connection with other corners was lost, packets were not transmitted between neighboring nodes [35]. At the same time, the work of the node itself was not blocked, but it simply could not receive a response to the messages transmitted to it.

3.1. Analysis of Node Behavior during Normal Operation

As mentioned earlier, the nodes exchange messages according to a previously defined algorithm. They send packets based on their calculations, not monotonously. Therefore, as can be seen from Figure 2, the traffic picture does not look straightforward. Small changes are observed from one time series to another. In general, the number of transmitted and received packets grows over time.
After the data analysis module receives the traffic information, it normalizes it, and the entropy is calculated, as shown in Section 2.2 above. The result of calculating entropy by neighboring nodes is shown in Figure 3. Figure 3a shows the result of calculating entropy for incoming traffic. Small deviations are observed, and the peak value reaches 0.5. This situation is normal and does not indicate an attack. Figure 3b shows the computation result for received packets.
As can be seen from the figures, the entropy values for the received packets are lower than for the sent ones. This situation correlates with the traffic picture obtained for the raw data. Figure 2 shows that the traffic changes are slightly larger for received packets. Although it can be seen from Figure 2b that the number of sent packets themselves is much larger than the number of received ones. That is, the method allows us to detect deviations regardless of the number of packets, namely, on the behavior of the node when sending/receiving them. In this case, there are no false alarms, and no thresholds are exceeded. It is important to note that, according to this method, the nodes analyze not themselves, but each other. Figure 3 shows that there is practically no difference between the sent packets of the two nodes, the graphs are uniform, although the number of packets is different. The graphs of received packets are more different but not significantly.
Next, we considered changing the CPU load parameter. In this study, the load is determined not as a percentage, but in processor ticks for a fraction of a second. As can be seen from Figure 4, at first glance, the CPU load parameter for nodes i and j is different.
At an in-depth analysis, we can see large differences in values, and no overall picture is uniform. The CPU load cannot be the same at different intervals since, by its very nature, this parameter changes abruptly. The result of calculating the entropy for node i for node j is presented in Figure 5. We can see that a small difference in values is observed on time intervals starting from the 10th, which correlates with the raw data.

3.2. Analysis of Node Behavior with Additional Payload

When providing an additional payload that is not an attack, some changes were observed in the sensory system. An additional payload was that the node sent echo requests using the ping command. Figure 6 shows the result of calculating the normal distribution function for the incoming traffic of a node on which an additional payload is rendered and a node that is operating normally.
Figure 6 shows that for the incoming traffic of node i, the normal distribution function is shifted down. This offset will affect the entropy calculation. The result of calculating the entropy is shown in Figure 7. It shows that there is a slight increase in the values for outgoing traffic.
When the value does not exceed two then, conditionally, the network operates in normal mode. In this case, a slight excess is noticeable. This excess of the entropy value can be interpreted as a change in the operating mode or additional load. As Figure 7 reveals, after increasing the traffic value, then a decrease in entropy is observed. That means that the system comes to a steady state.
Figure 8 shows the entropy result for the CPU utilization. The graph is very similar to the result of calculating the entropy for the normal state. Entropy values reach 0.1. However, this value is far from the 0.5 threshold. This suggests that some additional activity is present, but not abnormal.
Thus, only one parameter out of three showed changes exceeding the threshold, the outgoing traffic. The rest of the parameters were within the normal range, although they increased slightly.

3.3. Analysis of Node Behavior in a Denial of Service Attack—SYN Flood

In our study, the SYN flood attack did not start immediately but three minutes after the start of the experiment. Until then, the sensor system functions normally. Figure 9 shows that changes begin in the fifth time series for both inbound and outbound traffic.
The changes are accompanied not only by a sharp increase in the number of packets but also by a change in the traffic picture. If you compare the traffic pattern during an attack and during normal operation, you will notice that the graphs become more straightforward. This is because the traffic associated with the attack overlaps the useful one and other “noise” in the traffic. Figure 10 shows the result of calculating the entropy for incoming and outgoing traffic by node i relative to node j and vice versa.
The figures show a significant increase in the entropy index. In one case for incoming traffic, node j manages to identify the anomaly, and for incoming traffic, node i does so. Figure 11 shows the result of calculating the normal distribution function for incoming packets of the attacked node. At the same time, the graying of three intervals looks like a straight line, but in fact it is not. The values of the normal distribution function for the last three intervals during the attack are so small that they are difficult to see on the graph. When calculating the entropy, the results of calculating the normal distribution function are compared. Precisely because the values of the normal distribution during the attack become too small, node i when comparing them with node j, does not identify the anomaly, while in the opposite direction everything works, and node j detects an anomaly.
The CPU utilization is also significantly affected by the attack. Figure 12 shows the raw CPU utilization data. At first, a sharp jump in values is observed, and then the situation becomes like that without an attack, only for higher values.
Now we analyze the change in CPU utilization during the attack and without it; node i is under attack, but node j is not. Figure 13 compares their assessment of the load level with each other.
Figure 13 shows that, at first, there is an increase in the value of the divergence which is fixed by both nodes, and then the value remains at the same level. This is due precisely to the fact that no more abrupt changes in the CPU load are observed. This method allows us to record the fact of a change in state and the degree of these changes, which is fundamental. Estimating thresholds for CPU utilization is easier because the closer the value is to one, the more likely an attack is to occur. In this case, the value reaches 0.9. However, increasing values to 0.5 can also be viewed as a change of state.

3.4. Analysis of Node Behavior in a Denial of Service Attack—Deauthentication

During a deauthentication attack, the connection is broken, and the sensor node cannot fully exchange data with neighboring nodes. Figure 14 shows the result of calculating the entropy for node i, which was attacked. It can be seen from the figures that not only is an increase in the entropy value observed, but also there are no values for some time intervals. These gaps occur due to the fact that the entropy formula contains the logarithm of the quotient and the normal distribution function for an attacked node can take zero values, but division by zero is impossible, of course.
In general, it can be noted that the attack is readily identifiable for node i; the entropy values are quite high. Let us analyze the situation when node j is also influenced. This situation can occur if nodes are adjacent and, due to blocking of node i, node j also cannot exchange messages, like a Black Hole attack. The calculation result is shown in Figure 15.
Figure 15 shows that even though both nodes are susceptible to attacks, they both detect an anomaly, and this is evidenced by high entropy values. The attack affects each node differently, so changing the parameters is also different, which is recorded by our method. When it comes to changing the CPU load, the situation is reversed. The CPU utilization is reduced during the attack. This is because the node is not wasting power for forwarding packets. Therefore, as can be seen from Figure 16, the entropy level for the CPU load is low.
Based on the results of our experimental study, the following conclusions can be drawn about the effectiveness of our approach.
Firstly, as stated earlier, each attack has a different effect on the parameters. In this study, only three parameters were considered: incoming and outgoing traffic, and the level of CPU utilization. Nevertheless, even according to just these three parameters, it is possible to determine the type of attack and classify it.
Secondly, the entropy-based method allows us to capture the difference between the behavior of nodes by increasing the values. Thirdly, depending on the type of probability distribution that is used to normalize the parameter, the thresholds change. If the Poisson distribution is used, then the upper limit of the value is one, and anything between 0.5 and one indicates an attack. If the normal distribution is used for normalization, then there is no upper bound, and the values can be very high if an attack occurs.
Therefore, the threshold value can be set differently. As shown by numerous experiments, some of which are presented in this article, the attack is characterized by an increase in the entropy value of more than 10. If the values increase up to 10, then this may indicate a change in activity or minor changes in the sensory system. Table 2 shows the result of the analysis of the obtained values.
Thus, it can be seen from this table that if there is a sharp increase in all three parameters, which is detected by at least one of the neighboring nodes, then a SYN flood attack is carried out. If an insignificant increase in one of the parameters is observed, then a change in the operating mode or additional load on the node may occur. If there is an increase in entropy for traffic as well as erroneous values being observed, then a deauthentication attack or a break in the communication channel has occurred. If this situation is observed for both nodes, then a Black Hole attack is likely. In this case, the CPU load does not change significantly.
We also have estimated the autonomous operating time of the device considering the Raspberry Pi 3B with the installed Raspbian operating system. Its consumption current was about 200–210 mA without additional load, 210–220 mA when the program was running, and the peak value of 230–240 mA was reached during the formation and sending of packets to the neighbors. Thus, we have assumed a maximum consumption current of 240 mA for our device. In addition, a battery with a capacity of 4000 mAh was available for the Raspberry Pi 3B, so the autonomous operating time of the device has been estimated as over 16.6 h.

4. Conclusions

This article addressed the issues of detecting anomalies in sensor networks. Existing anomaly detection systems usually use machine learning methods. At the same time, previous authors mainly focus on the development and modification of classification methods and algorithms, proving their effectiveness. However, the issues of detection metrics are often omitted and not considered. Many articles present the use of off-the-shelf signature sets and datasets for classification and training. However, there remains a question about the validity of data for training from open sources, as well as the applicability of learning outcomes to ready-made systems. Some other works consider specific behavioral scenarios of nodes, especially for mobile nodes of the network, as signs of trust [36,37,38].
Our research instead focused on the assessment of cyber-physical parameters and their changes under various operating modes of the system. The measure of entropy and normalization of raw data allows data to be unified and evaluated in terms of detecting anomalies. This study examined in detail the changes in three parameters for four scenarios. Already, at this stage, using only three parameters, it is possible to determine the difference between attacks and variants of normal behavior. It is possible to evaluate not only the fact of a parameter change but also evaluate the degree of its change. At the same time, each node of the sensor network can compare its changes with the changes of neighboring nodes. Most importantly, using our method, nodes can analyze each other for evidence of attacks.
As an extension of the method, we can add a comparison of the node with itself and evaluate the changes in its own parameters over time. It is also planned to increase the number of estimated cyber-physical parameters that can be affected by an attack. In addition, it is possible to increase the number of attacks for evaluation too. Already, at this stage, anomalous behavior is unambiguously detected. Even if a specific attack scenario is unknown, it is possible to unambiguously establish which properties and which structural characteristics of the sensory system it affects.
Further research plans to use and compare intelligent methods to classify attacks based on the collected dataset, testing the method for errors of the first and second kind, as well as testing new attack scenarios and options for normal behavior for the sensory system. It is also necessary to test the method for various types of sensory systems.

Author Contributions

Conceptualization, E.B. and A.B.; methodology, E.B., A.B. and A.N.; software, E.B. and N.S.; validation, E.B., A.B., A.N., C.F., J.G. and N.S.; formal analysis, E.B. and A.B.; investigation, E.B., A.B., A.N., C.F., J.G. and N.S.; resources, E.B. and A.N.; data curation, E.B., A.B., A.N. and J.G.; writing—original draft preparation, E.B., A.B., A.N. and C.F.; writing—review and editing, E.B., A.B., A.N. and C.F.; visualization, E.B. and N.S.; supervision, E.B., A.N. and C.F.; project administration, E.B.; funding acquisition, E.B. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Russian Science Foundation grant number 21-79-00194, https://rscf.ru/project/21-79-00194/ (accessed on 28 July 2021). The APC was funded by the Russian Science Foundation grant number 21-79-00194.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data sharing not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Yar, H.; Imran, A.S.; Khan, Z.A.; Sajjad, M.; Kastrati, Z. Towards smart home automation using IoT-enabled edge-computing paradigm. Sensors 2021, 21, 4932. [Google Scholar] [CrossRef] [PubMed]
  2. Robles-Durazno, A.; Moradpoor, N.; McWhinnie, J.; Russell, G.; Porcel-Bustamante, J. Implementation and evaluation of physical, hybrid, and virtual testbeds for cybersecurity analysis of industrial control systems. Symmetry 2021, 13, 519. [Google Scholar] [CrossRef]
  3. Choudhary, A.; Kumar, S.; Gupta, S.; Gong, M.; Mahanti, A. FEHCA: A fault-tolerant energy-efficient hierarchical clustering algorithm for wireless sensor networks. Energies 2021, 14, 3935. [Google Scholar] [CrossRef]
  4. Bouteraa, Y.; Ben Abdallah, I.; Ibrahim, A.; Ahanger, T.A. Development of an IoT-based solution incorporating biofeedback and fuzzy logic control for elbow rehabilitation. Appl. Sci. 2020, 10, 7793. [Google Scholar] [CrossRef]
  5. Umran, S.M.; Lu, S.; Abduljabbar, Z.A.; Zhu, J.; Wu, J. Secure data of industrial internet of things in a cement factory based on a Blockchain technology. Appl. Sci. 2021, 11, 6376. [Google Scholar] [CrossRef]
  6. Barka, E.; Dahmane, S.; Kerrache, C.A.; Khayat, M.; Sallabi, F. STHM: A secured and trusted healthcare monitoring architecture using SDN and Blockchain. Electronics 2021, 10, 1787. [Google Scholar] [CrossRef]
  7. Chang, Y.-F.; Tai, W.-L.; Hou, P.-L.; Lai, K.-Y. A secure three-factor anonymous user authentication scheme for internet of things environments. Symmetry 2021, 13, 1121. [Google Scholar] [CrossRef]
  8. Zeng, X.; Zhang, X.; Yang, S.; Shi, Z.; Chi, C. Gait-based implicit authentication using edge computing and deep learning for mobile devices. Sensors 2021, 21, 4592. [Google Scholar] [CrossRef] [PubMed]
  9. Nikolopoulos, D.; Ostfeld, A.; Salomons, E.; Makropoulos, C. Resilience assessment of water quality sensor designs under cyber-physical attacks. Water 2021, 13, 647. [Google Scholar] [CrossRef]
  10. Yousefnezhad, N.; Malhi, A.; Främling, K. Automated IoT device identification based on full packet information using real-time network traffic. Sensors 2021, 21, 2660. [Google Scholar] [CrossRef]
  11. Gluck, T.; Kravchik, M.; Chocron, S.; Elovici, Y.; Shabtai, A. Spoofing attack on ultrasonic distance sensors using a continuous signal. Sensors 2020, 20, 6157. [Google Scholar] [CrossRef] [PubMed]
  12. Dodig, I.; Cafuta, D.; Kramberger, T.; Cesar, I. A novel software architecture solution with a focus on long-term IoT device security support. Appl. Sci. 2021, 11, 4955. [Google Scholar] [CrossRef]
  13. Stępień, K.; Poniszewska-Marańda, A. Security measures with enhanced behavior processing and footprint algorithm against sybil and bogus attacks in vehicular Ad Hoc network. Sensors 2021, 21, 3538. [Google Scholar] [CrossRef]
  14. Jiang, J.-R.; Kao, J.-B.; Li, Y.-L. Semi-supervised time series anomaly detection based on statistics and deep learning. Appl. Sci. 2021, 11, 6698. [Google Scholar] [CrossRef]
  15. Mittal, M.; de Prado, R.P.; Kawai, Y.; Nakajima, S.; Muñoz-Expósito, J.E. Machine learning techniques for energy efficiency and anomaly detection in hybrid wireless sensor networks. Energies 2021, 14, 3125. [Google Scholar] [CrossRef]
  16. Elsisi, M.; Mahmoud, K.; Lehtonen, M.; Darwish, M.M.F. Effective nonlinear model predictive control scheme tuned by improved NN for robotic manipulators. IEEE Access 2021, 9, 64278–64290. [Google Scholar] [CrossRef]
  17. Robinson, Y.H.; Julie, E.G.; Balaji, S.; Ayyasamy, A. Energy aware clustering scheme in wireless sensor network using neuro-fuzzy approach. Wirel. Pers. Commun. 2017, 95, 703–721. [Google Scholar] [CrossRef]
  18. Schneider, T.; Helwig, N.; Schütze, A. Automatic feature extraction and selection for classification of cyclical time series data. TM Tech. Mess. 2017, 84, 198–206. [Google Scholar] [CrossRef]
  19. KDD99. KDDCup1999Data. 2020. Available online: http://kddicsuciedu/databases/kddcup99/kddcup99html (accessed on 28 July 2021).
  20. Park, P.; Marco, P.D.; Shin, H.; Bang, J. Fault detection and diagnosis using combined autoencoder and long short-term memory network. Sensors 2019, 19, 4612. [Google Scholar] [CrossRef] [Green Version]
  21. Lu, C.; Wang, Z.-Y.; Qin, W.-L.; Ma, J. Fault diagnosis of rotary machinery components using a stacked denoising autoencoder-based health state identification. Signal Process. 2017, 130, 377–388. [Google Scholar] [CrossRef]
  22. Li, Z.; Li, J.; Wang, Y.; Wang, K. A deep learning approach for anomaly detection based on SAE and LSTM in mechanical equipment. Int. J. Adv. Manuf. Technol. 2019, 103, 499–510. [Google Scholar] [CrossRef]
  23. Mallak, A.; Fathi, M. Sensor and component fault detection and diagnosis for hydraulic machinery integrating LSTM autoencoder detector and diagnostic classifiers. Sensors 2021, 21, 433. [Google Scholar] [CrossRef]
  24. Mahdavi, A.; Amirzadeh, V.; Jamalizadeh, A.; Lin, T.-I. A Multivariate flexible skew-symmetric-normal distribution: Scale-shape mixtures and parameter estimation via selection representation. Symmetry 2021, 13, 1343. [Google Scholar] [CrossRef]
  25. Aljohani, N.; Bretas, A. A Bi-level model for detecting and correcting parameter cyber-attacks in power system state estimation. Appl. Sci. 2021, 11, 6540. [Google Scholar] [CrossRef]
  26. Aljohani, H.M.; Akdoğan, Y.; Cordeiro, G.M.; Afify, A.Z. The uniform Poisson–Ailamujia distribution: Actuarial measures and applications in biological science. Symmetry 2021, 13, 1258. [Google Scholar] [CrossRef]
  27. Basan, E.; Basan, A.; Nekrasov, A.; Fidge, C.; Gamec, J.; Gamcová, M. A self-diagnosis method for detecting UAV cyber attacks based on analysis of parameter changes. Sensors 2021, 21, 509. [Google Scholar] [CrossRef] [PubMed]
  28. Răstoceanu, F.; Rughiniș, R.; Ciocîrlan, Ș.-D.; Enache, M. Sensor-based entropy source analysis and validation for use in IoT environments. Electronics 2021, 10, 1173. [Google Scholar] [CrossRef]
  29. Zeng, Z.; Sun, J.; Xu, C.; Wang, H. Unknown SAR target identification method based on feature extraction network and KLD–RPA joint discrimination. Remote Sens. 2021, 13, 2901. [Google Scholar] [CrossRef]
  30. Wang, J.; Zhang, P.; He, Q.; Li, Y.; Hu, Y. Revisiting label smoothing regularization with knowledge distillation. Appl. Sci. 2021, 11, 4699. [Google Scholar] [CrossRef]
  31. Basan, E.; Basan, A.; Nekrasov, A. Method for detecting abnormal activity in a group of mobile robots. Sensors 2019, 19, 4007. [Google Scholar] [CrossRef] [Green Version]
  32. Larmo, A.; Ratilainen, A.; Saarinen, J. Impact of CoAP and MQTT on NB-IoT system performance. Sensors 2019, 19, 7. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  33. Guillen-Perez, A.; Montoya, A.-M.; Sanchez-Aarnoutse, J.-C.; Cano, M.-D. A comparative performance evaluation of routing protocols for flying Ad-Hoc networks in real conditions. Appl. Sci. 2021, 11, 4363. [Google Scholar] [CrossRef]
  34. Hsu, F.-H.; Lee, C.-H.; Wang, C.-Y.; Hung, R.-Y.; Zhuang, Y. DDoS flood and destination service changing sensor. Sensors 2021, 21, 1980. [Google Scholar] [CrossRef]
  35. Milliken, J.; Selis, V.K.; Yap, M.; Marshall, A. Impact of metric selection on wireless deauthentication DoS attack performance. IEEE Wirel. Commun. Lett. 2013, 2, 571–574. [Google Scholar] [CrossRef] [Green Version]
  36. Tancev, G. Relevance of drift components and unit-to-unit variability in the predictive maintenance of low-cost electrochemical sensor systems in air quality monitoring. Sensors 2021, 21, 3298. [Google Scholar] [CrossRef] [PubMed]
  37. Martí, L.; Sanchez-Pi, N.; Molina, J.M.; Garcia, A.C.B. Anomaly detection based on sensor data in petroleum industry applications. Sensors 2015, 15, 2774–2797. [Google Scholar] [CrossRef] [Green Version]
  38. Okamoto, T.; Ishida, Y. An immunity-based anomaly detection system with sensor agents. Sensors 2009, 9, 9175–9195. [Google Scholar] [CrossRef] [PubMed]
Figure 1. Block diagram of the adaptive protection system of the sensor node.
Figure 1. Block diagram of the adaptive protection system of the sensor node.
Sensors 21 06116 g001
Figure 2. Changes in the traffic pattern when analyzing raw data on: (a) received packets of node i and (b) packets sent from node i; (c) received packets from node j and (d) sent packets from node j during normal operation of the sensor network.
Figure 2. Changes in the traffic pattern when analyzing raw data on: (a) received packets of node i and (b) packets sent from node i; (c) received packets from node j and (d) sent packets from node j during normal operation of the sensor network.
Sensors 21 06116 g002
Figure 3. The result of calculating the entropy for: (a) received packets and (b) sent packets by node i relative to node j (marked in blue) and node j relative to node i (marked in orange).
Figure 3. The result of calculating the entropy for: (a) received packets and (b) sent packets by node i relative to node j (marked in blue) and node j relative to node i (marked in orange).
Sensors 21 06116 g003
Figure 4. Changing the CPU load when analyzing raw data: (a) for node i; and (b) for node j.
Figure 4. Changing the CPU load when analyzing raw data: (a) for node i; and (b) for node j.
Sensors 21 06116 g004
Figure 5. Result of calculating the entropy for the level of CPU utilization by node i relative to node j (marked in blue) and by node j relative to node i (marked in orange).
Figure 5. Result of calculating the entropy for the level of CPU utilization by node i relative to node j (marked in blue) and by node j relative to node i (marked in orange).
Sensors 21 06116 g005
Figure 6. The result of calculating the normal distribution function for incoming traffic of: (a) node i with additional payload; and (b) node j in normal mode.
Figure 6. The result of calculating the normal distribution function for incoming traffic of: (a) node i with additional payload; and (b) node j in normal mode.
Sensors 21 06116 g006
Figure 7. The result of calculating the entropy for: (a) received packets; and (b) sent packets by node i relative to node j (marked in blue) and by node j relative to node i (marked in orange) with additional payload.
Figure 7. The result of calculating the entropy for: (a) received packets; and (b) sent packets by node i relative to node j (marked in blue) and by node j relative to node i (marked in orange) with additional payload.
Sensors 21 06116 g007
Figure 8. The result of calculating the entropy for the level of CPU utilization by node i relative to node j (marked in blue) and by node j relative to node i (marked in orange) with an additional payload.
Figure 8. The result of calculating the entropy for the level of CPU utilization by node i relative to node j (marked in blue) and by node j relative to node i (marked in orange) with an additional payload.
Sensors 21 06116 g008
Figure 9. Changes in the traffic pattern when analyzing raw data on: (a) received packets from node i; and (b) sent packets from node i under conditions of a SYN flood attack.
Figure 9. Changes in the traffic pattern when analyzing raw data on: (a) received packets from node i; and (b) sent packets from node i under conditions of a SYN flood attack.
Sensors 21 06116 g009
Figure 10. The result of calculating the entropy for: (a) received packets; and (b) sent packets by node i relative to node j (marked in blue) and node j relative to node i (marked in orange) under conditions of a SYN flood attack.
Figure 10. The result of calculating the entropy for: (a) received packets; and (b) sent packets by node i relative to node j (marked in blue) and node j relative to node i (marked in orange) under conditions of a SYN flood attack.
Sensors 21 06116 g010
Figure 11. The result of calculating the normal distribution function for the incoming traffic of node i under conditions of a SYN flood attack.
Figure 11. The result of calculating the normal distribution function for the incoming traffic of node i under conditions of a SYN flood attack.
Sensors 21 06116 g011
Figure 12. Changing the CPU load when analyzing raw data for node i under conditions of a SYN flood attack.
Figure 12. Changing the CPU load when analyzing raw data for node i under conditions of a SYN flood attack.
Sensors 21 06116 g012
Figure 13. The result of calculating the entropy for CPU load by node i relative to node j (marked in blue) and by node j relative to node i (marked in orange) under conditions of a SYN flood attack.
Figure 13. The result of calculating the entropy for CPU load by node i relative to node j (marked in blue) and by node j relative to node i (marked in orange) under conditions of a SYN flood attack.
Sensors 21 06116 g013
Figure 14. The result of calculating the entropy for: (a) received packets; and (b) packets sent by node i relative to node j (marked in blue) and by node j relative to node i (marked in orange) under conditions of a deauthentication attack.
Figure 14. The result of calculating the entropy for: (a) received packets; and (b) packets sent by node i relative to node j (marked in blue) and by node j relative to node i (marked in orange) under conditions of a deauthentication attack.
Sensors 21 06116 g014
Figure 15. The result of calculating the entropy for received packets by node i relative to node j (marked in yellow) and by node j relative to node i (marked in orange) under conditions of a deauthentication attack.
Figure 15. The result of calculating the entropy for received packets by node i relative to node j (marked in yellow) and by node j relative to node i (marked in orange) under conditions of a deauthentication attack.
Sensors 21 06116 g015
Figure 16. The result of calculating the entropy for CPU load by node i relative to node j (marked in blue) and by node j relative to node i (marked in orange) by the impact of a deauthentication attack.
Figure 16. The result of calculating the entropy for CPU load by node i relative to node j (marked in blue) and by node j relative to node i (marked in orange) by the impact of a deauthentication attack.
Sensors 21 06116 g016
Table 1. Influence of various types of attacks on the cyber-physical parameters of the sensor system.
Table 1. Influence of various types of attacks on the cyber-physical parameters of the sensor system.
No.Cyber-Physical ParameterAttack Type
1Memory usageresource exhaustion attack, availability attack
2Power consumptionresource exhaustion attack, availability attack
3Communication channelaccessibility attack, access attack, integrity attack, confidentiality attack
4CPU loadresource exhaustion attack, availability attack
5CPU temperatureresource exhaustion attack, availability attack
6Network trafficintegrity attack,
privacy attack, accessibility attack
7Sensor/Activator Availabilityintegrity attack, availability attack, access attack
Table 2. Analysis of the ability to classify attacks by our anomaly detection method.
Table 2. Analysis of the ability to classify attacks by our anomaly detection method.
Activity TypeEntropy of Incoming TrafficEntropy of Outgoing TrafficEntropy of CPU LoadNote
Normal operationno increasesno increasesno increasesReceived packets:
−1 < DLij < 1; −1 < DLji < 1
Sent packets:
−0.5 <DLij < 0.5; −0.5 <DLji <0.5
CPU load:
−0.02 < Dij < 0; 0 < Dji < 0.02
Payloadin the normal rangeincreasesin the normal rangeReceived packets:
−1 < DLij < 1; −1 < DLji < 1
Sent packets:
−0.5 < DLij < 0.5; −0.5 < DLji < 0.5
CPU load:
−0.02 < Dij < 0; 0 < Dji < 0.02
SYN flood attacksignificant increasesignificant increasesignificant increaseReceived packets:
0 < DLij < 1; 7 < DLji < 25
Sent packets:
10 < DLij < 400; −0.5 < DLji < 1
CPU load:
−0.01 < Dij < 0; 0 < Dji < 0.9
Deauthenticationsignificant increasesignificant increasein the normal rangeReceived packets:
0 < DLij < 20; −3 < DLji < 0
Sent packets:
0 < DLij < 40; −5 < DLji < 1
CPU load:
−0.06 < Dij < 0; 0 < Dji < 0.06
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Gamec, J.; Basan, E.; Basan, A.; Nekrasov, A.; Fidge, C.; Sushkin, N. An Adaptive Protection System for Sensor Networks Based on Analysis of Neighboring Nodes. Sensors 2021, 21, 6116. https://doi.org/10.3390/s21186116

AMA Style

Gamec J, Basan E, Basan A, Nekrasov A, Fidge C, Sushkin N. An Adaptive Protection System for Sensor Networks Based on Analysis of Neighboring Nodes. Sensors. 2021; 21(18):6116. https://doi.org/10.3390/s21186116

Chicago/Turabian Style

Gamec, Ján, Elena Basan, Alexandr Basan, Alexey Nekrasov, Colin Fidge, and Nikita Sushkin. 2021. "An Adaptive Protection System for Sensor Networks Based on Analysis of Neighboring Nodes" Sensors 21, no. 18: 6116. https://doi.org/10.3390/s21186116

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop