An Adaptive Protection System for Sensor Networks Based on Analysis of Neighboring Nodes
<p>Block diagram of the adaptive protection system of the sensor node.</p> "> Figure 2
<p>Changes in the traffic pattern when analyzing raw data on: (<b>a</b>) received packets of node <span class="html-italic">i</span> and (<b>b</b>) packets sent from node <span class="html-italic">i</span>; (<b>c</b>) received packets from node <span class="html-italic">j</span> and (<b>d</b>) sent packets from node <span class="html-italic">j</span> during normal operation of the sensor network.</p> "> Figure 3
<p>The result of calculating the entropy for: (<b>a</b>) received packets and (<b>b</b>) sent packets by node <span class="html-italic">i</span> relative to node <span class="html-italic">j</span> (marked in blue) and node <span class="html-italic">j</span> relative to node <span class="html-italic">i</span> (marked in orange).</p> "> Figure 4
<p>Changing the CPU load when analyzing raw data: (<b>a</b>) for node <span class="html-italic">i</span>; and (<b>b</b>) for node <span class="html-italic">j</span>.</p> "> Figure 5
<p>Result of calculating the entropy for the level of CPU utilization by node <span class="html-italic">i</span> relative to node <span class="html-italic">j</span> (marked in blue) and by node <span class="html-italic">j</span> relative to node <span class="html-italic">i</span> (marked in orange).</p> "> Figure 6
<p>The result of calculating the normal distribution function for incoming traffic of: (<b>a</b>) node <span class="html-italic">i</span> with additional payload; and (<b>b</b>) node <span class="html-italic">j</span> in normal mode.</p> "> Figure 7
<p>The result of calculating the entropy for: (<b>a</b>) received packets; and (<b>b</b>) sent packets by node <span class="html-italic">i</span> relative to node <span class="html-italic">j</span> (marked in blue) and by node <span class="html-italic">j</span> relative to node <span class="html-italic">i</span> (marked in orange) with additional payload.</p> "> Figure 8
<p>The result of calculating the entropy for the level of CPU utilization by node <span class="html-italic">i</span> relative to node <span class="html-italic">j</span> (marked in blue) and by node <span class="html-italic">j</span> relative to node <span class="html-italic">i</span> (marked in orange) with an additional payload.</p> "> Figure 9
<p>Changes in the traffic pattern when analyzing raw data on: (<b>a</b>) received packets from node <span class="html-italic">i</span>; and (<b>b</b>) sent packets from node <span class="html-italic">i</span> under conditions of a SYN flood attack.</p> "> Figure 10
<p>The result of calculating the entropy for: (<b>a</b>) received packets; and (<b>b</b>) sent packets by node <span class="html-italic">i</span> relative to node <span class="html-italic">j</span> (marked in blue) and node <span class="html-italic">j</span> relative to node <span class="html-italic">i</span> (marked in orange) under conditions of a SYN flood attack.</p> "> Figure 11
<p>The result of calculating the normal distribution function for the incoming traffic of node <span class="html-italic">i</span> under conditions of a SYN flood attack.</p> "> Figure 12
<p>Changing the CPU load when analyzing raw data for node <span class="html-italic">i</span> under conditions of a SYN flood attack.</p> "> Figure 13
<p>The result of calculating the entropy for CPU load by node <span class="html-italic">i</span> relative to node <span class="html-italic">j</span> (marked in blue) and by node <span class="html-italic">j</span> relative to node <span class="html-italic">i</span> (marked in orange) under conditions of a SYN flood attack.</p> "> Figure 14
<p>The result of calculating the entropy for: (<b>a</b>) received packets; and (<b>b</b>) packets sent by node <span class="html-italic">i</span> relative to node <span class="html-italic">j</span> (marked in blue) and by node <span class="html-italic">j</span> relative to node <span class="html-italic">i</span> (marked in orange) under conditions of a deauthentication attack.</p> "> Figure 15
<p>The result of calculating the entropy for received packets by node <span class="html-italic">i</span> relative to node <span class="html-italic">j</span> (marked in yellow) and by node <span class="html-italic">j</span> relative to node <span class="html-italic">i</span> (marked in orange) under conditions of a deauthentication attack.</p> "> Figure 16
<p>The result of calculating the entropy for CPU load by node <span class="html-italic">i</span> relative to node <span class="html-italic">j</span> (marked in blue) and by node <span class="html-italic">j</span> relative to node <span class="html-italic">i</span> (marked in orange) by the impact of a deauthentication attack.</p> ">
Abstract
:1. Introduction
2. Materials and Methods
2.1. Threat Model
- Threat of deauthorization of an authorized wireless client. The threat is the ability to automatically disconnect a wireless access point from an authorized wireless client.
- Threat of unauthorized access to the system via wireless channels. The threat lies in the possibility of an intruder gaining access to the resources of the entire discredited information system through the wireless data transmission channels used in its composition.
- Threat of exploiting weaknesses in network/local communication protocols. The threat lies in the possibility of an intruder’s unauthorized access to information due to a destructive effect on the protocols of network/local data exchange in the system.
- Threat of remote consumption of sensor nodes resources. The threat is that an attacker can influence the consumed unit of energy resources (i.e., the amount of energy consumed per unit of time) by continuing to send packets to them, but also without allowing nodes to go into sleep mode.
- Threat of blocking wireless communication channels between nodes. The threat lies in the possibility of noise or blocking of one of the nodes participating in the network exchange, which leads to blocking of the communication line.
2.2. Architecture of the Sensor Network Adaptive Protection System
- Detection of anomalies through analysis of the system node’s parameters;
- Timely notification of the operator and neighboring nodes about a possible incident; and
- Determination of the type of attack.
2.2.1. Sensor Node Data Analysis Module
- The ability to transfer collected and normalized data to other subsystems; and
- The ability to present the collected data in a simple format convenient for analysis.
2.2.2. Cyber-Physical Parameters for Analysis
2.2.3. Sensor Node Adaptive Protection System
- Detecting anomalies and establishing a correlation between an anomaly and an attack; and
- Exchanging information with other modules in the protection system.
2.2.4. Alert Notification Module
2.3. Method for Determining the Abnormal Activity of the Sensor System
2.3.1. Technique for Processing and Normalizing Data
2.3.2. The Method of Detecting Anomalies Based on Entropy in the Sensor System
3. Results and Discussion
- confirmation of the effectiveness of the method for detecting anomalies of the sensor system;
- collecting data to form a data set for training a neural network, to classify attacks; and
- analysis of the boundaries of divergence values for making decisions about the presence of anomalies and attacks in the sensory system.
- Recording the normal operation of the sensor system, when the nodes exchange information according to a given algorithm using the User Datagram Protocol (UDP) [32], and when the Optimized Link State Routing (OLSR) protocol [33] is used between the nodes. In this case, there is no additional effect on the sensory system.
- Adding a payload to normal node operation. The Internet Control Message Protocol (ICMP) was used as the payload and the request/response messages were sent to the neighboring node.
- A denial-of-service attack aimed at overloading a node. To implement this scenario, a SYN flood attack was used, the victim’s open port was attacked, in this case, Port 22 [34]. During the attack, the victim node received many connection requests, because of which the message queue overflowed, and the node was blocked, while the network remained available.
- A denial-of-service attack aimed at blocking a channel. To implement this scenario, a deauthentication attack was used. When one of the nodes was blocked and its connection with other corners was lost, packets were not transmitted between neighboring nodes [35]. At the same time, the work of the node itself was not blocked, but it simply could not receive a response to the messages transmitted to it.
3.1. Analysis of Node Behavior during Normal Operation
3.2. Analysis of Node Behavior with Additional Payload
3.3. Analysis of Node Behavior in a Denial of Service Attack—SYN Flood
3.4. Analysis of Node Behavior in a Denial of Service Attack—Deauthentication
4. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Yar, H.; Imran, A.S.; Khan, Z.A.; Sajjad, M.; Kastrati, Z. Towards smart home automation using IoT-enabled edge-computing paradigm. Sensors 2021, 21, 4932. [Google Scholar] [CrossRef] [PubMed]
- Robles-Durazno, A.; Moradpoor, N.; McWhinnie, J.; Russell, G.; Porcel-Bustamante, J. Implementation and evaluation of physical, hybrid, and virtual testbeds for cybersecurity analysis of industrial control systems. Symmetry 2021, 13, 519. [Google Scholar] [CrossRef]
- Choudhary, A.; Kumar, S.; Gupta, S.; Gong, M.; Mahanti, A. FEHCA: A fault-tolerant energy-efficient hierarchical clustering algorithm for wireless sensor networks. Energies 2021, 14, 3935. [Google Scholar] [CrossRef]
- Bouteraa, Y.; Ben Abdallah, I.; Ibrahim, A.; Ahanger, T.A. Development of an IoT-based solution incorporating biofeedback and fuzzy logic control for elbow rehabilitation. Appl. Sci. 2020, 10, 7793. [Google Scholar] [CrossRef]
- Umran, S.M.; Lu, S.; Abduljabbar, Z.A.; Zhu, J.; Wu, J. Secure data of industrial internet of things in a cement factory based on a Blockchain technology. Appl. Sci. 2021, 11, 6376. [Google Scholar] [CrossRef]
- Barka, E.; Dahmane, S.; Kerrache, C.A.; Khayat, M.; Sallabi, F. STHM: A secured and trusted healthcare monitoring architecture using SDN and Blockchain. Electronics 2021, 10, 1787. [Google Scholar] [CrossRef]
- Chang, Y.-F.; Tai, W.-L.; Hou, P.-L.; Lai, K.-Y. A secure three-factor anonymous user authentication scheme for internet of things environments. Symmetry 2021, 13, 1121. [Google Scholar] [CrossRef]
- Zeng, X.; Zhang, X.; Yang, S.; Shi, Z.; Chi, C. Gait-based implicit authentication using edge computing and deep learning for mobile devices. Sensors 2021, 21, 4592. [Google Scholar] [CrossRef] [PubMed]
- Nikolopoulos, D.; Ostfeld, A.; Salomons, E.; Makropoulos, C. Resilience assessment of water quality sensor designs under cyber-physical attacks. Water 2021, 13, 647. [Google Scholar] [CrossRef]
- Yousefnezhad, N.; Malhi, A.; Främling, K. Automated IoT device identification based on full packet information using real-time network traffic. Sensors 2021, 21, 2660. [Google Scholar] [CrossRef]
- Gluck, T.; Kravchik, M.; Chocron, S.; Elovici, Y.; Shabtai, A. Spoofing attack on ultrasonic distance sensors using a continuous signal. Sensors 2020, 20, 6157. [Google Scholar] [CrossRef] [PubMed]
- Dodig, I.; Cafuta, D.; Kramberger, T.; Cesar, I. A novel software architecture solution with a focus on long-term IoT device security support. Appl. Sci. 2021, 11, 4955. [Google Scholar] [CrossRef]
- Stępień, K.; Poniszewska-Marańda, A. Security measures with enhanced behavior processing and footprint algorithm against sybil and bogus attacks in vehicular Ad Hoc network. Sensors 2021, 21, 3538. [Google Scholar] [CrossRef]
- Jiang, J.-R.; Kao, J.-B.; Li, Y.-L. Semi-supervised time series anomaly detection based on statistics and deep learning. Appl. Sci. 2021, 11, 6698. [Google Scholar] [CrossRef]
- Mittal, M.; de Prado, R.P.; Kawai, Y.; Nakajima, S.; Muñoz-Expósito, J.E. Machine learning techniques for energy efficiency and anomaly detection in hybrid wireless sensor networks. Energies 2021, 14, 3125. [Google Scholar] [CrossRef]
- Elsisi, M.; Mahmoud, K.; Lehtonen, M.; Darwish, M.M.F. Effective nonlinear model predictive control scheme tuned by improved NN for robotic manipulators. IEEE Access 2021, 9, 64278–64290. [Google Scholar] [CrossRef]
- Robinson, Y.H.; Julie, E.G.; Balaji, S.; Ayyasamy, A. Energy aware clustering scheme in wireless sensor network using neuro-fuzzy approach. Wirel. Pers. Commun. 2017, 95, 703–721. [Google Scholar] [CrossRef]
- Schneider, T.; Helwig, N.; Schütze, A. Automatic feature extraction and selection for classification of cyclical time series data. TM Tech. Mess. 2017, 84, 198–206. [Google Scholar] [CrossRef]
- KDD99. KDDCup1999Data. 2020. Available online: http://kddicsuciedu/databases/kddcup99/kddcup99html (accessed on 28 July 2021).
- Park, P.; Marco, P.D.; Shin, H.; Bang, J. Fault detection and diagnosis using combined autoencoder and long short-term memory network. Sensors 2019, 19, 4612. [Google Scholar] [CrossRef] [Green Version]
- Lu, C.; Wang, Z.-Y.; Qin, W.-L.; Ma, J. Fault diagnosis of rotary machinery components using a stacked denoising autoencoder-based health state identification. Signal Process. 2017, 130, 377–388. [Google Scholar] [CrossRef]
- Li, Z.; Li, J.; Wang, Y.; Wang, K. A deep learning approach for anomaly detection based on SAE and LSTM in mechanical equipment. Int. J. Adv. Manuf. Technol. 2019, 103, 499–510. [Google Scholar] [CrossRef]
- Mallak, A.; Fathi, M. Sensor and component fault detection and diagnosis for hydraulic machinery integrating LSTM autoencoder detector and diagnostic classifiers. Sensors 2021, 21, 433. [Google Scholar] [CrossRef]
- Mahdavi, A.; Amirzadeh, V.; Jamalizadeh, A.; Lin, T.-I. A Multivariate flexible skew-symmetric-normal distribution: Scale-shape mixtures and parameter estimation via selection representation. Symmetry 2021, 13, 1343. [Google Scholar] [CrossRef]
- Aljohani, N.; Bretas, A. A Bi-level model for detecting and correcting parameter cyber-attacks in power system state estimation. Appl. Sci. 2021, 11, 6540. [Google Scholar] [CrossRef]
- Aljohani, H.M.; Akdoğan, Y.; Cordeiro, G.M.; Afify, A.Z. The uniform Poisson–Ailamujia distribution: Actuarial measures and applications in biological science. Symmetry 2021, 13, 1258. [Google Scholar] [CrossRef]
- Basan, E.; Basan, A.; Nekrasov, A.; Fidge, C.; Gamec, J.; Gamcová, M. A self-diagnosis method for detecting UAV cyber attacks based on analysis of parameter changes. Sensors 2021, 21, 509. [Google Scholar] [CrossRef] [PubMed]
- Răstoceanu, F.; Rughiniș, R.; Ciocîrlan, Ș.-D.; Enache, M. Sensor-based entropy source analysis and validation for use in IoT environments. Electronics 2021, 10, 1173. [Google Scholar] [CrossRef]
- Zeng, Z.; Sun, J.; Xu, C.; Wang, H. Unknown SAR target identification method based on feature extraction network and KLD–RPA joint discrimination. Remote Sens. 2021, 13, 2901. [Google Scholar] [CrossRef]
- Wang, J.; Zhang, P.; He, Q.; Li, Y.; Hu, Y. Revisiting label smoothing regularization with knowledge distillation. Appl. Sci. 2021, 11, 4699. [Google Scholar] [CrossRef]
- Basan, E.; Basan, A.; Nekrasov, A. Method for detecting abnormal activity in a group of mobile robots. Sensors 2019, 19, 4007. [Google Scholar] [CrossRef] [Green Version]
- Larmo, A.; Ratilainen, A.; Saarinen, J. Impact of CoAP and MQTT on NB-IoT system performance. Sensors 2019, 19, 7. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Guillen-Perez, A.; Montoya, A.-M.; Sanchez-Aarnoutse, J.-C.; Cano, M.-D. A comparative performance evaluation of routing protocols for flying Ad-Hoc networks in real conditions. Appl. Sci. 2021, 11, 4363. [Google Scholar] [CrossRef]
- Hsu, F.-H.; Lee, C.-H.; Wang, C.-Y.; Hung, R.-Y.; Zhuang, Y. DDoS flood and destination service changing sensor. Sensors 2021, 21, 1980. [Google Scholar] [CrossRef]
- Milliken, J.; Selis, V.K.; Yap, M.; Marshall, A. Impact of metric selection on wireless deauthentication DoS attack performance. IEEE Wirel. Commun. Lett. 2013, 2, 571–574. [Google Scholar] [CrossRef] [Green Version]
- Tancev, G. Relevance of drift components and unit-to-unit variability in the predictive maintenance of low-cost electrochemical sensor systems in air quality monitoring. Sensors 2021, 21, 3298. [Google Scholar] [CrossRef] [PubMed]
- Martí, L.; Sanchez-Pi, N.; Molina, J.M.; Garcia, A.C.B. Anomaly detection based on sensor data in petroleum industry applications. Sensors 2015, 15, 2774–2797. [Google Scholar] [CrossRef] [Green Version]
- Okamoto, T.; Ishida, Y. An immunity-based anomaly detection system with sensor agents. Sensors 2009, 9, 9175–9195. [Google Scholar] [CrossRef] [PubMed]
No. | Cyber-Physical Parameter | Attack Type |
---|---|---|
1 | Memory usage | resource exhaustion attack, availability attack |
2 | Power consumption | resource exhaustion attack, availability attack |
3 | Communication channel | accessibility attack, access attack, integrity attack, confidentiality attack |
4 | CPU load | resource exhaustion attack, availability attack |
5 | CPU temperature | resource exhaustion attack, availability attack |
6 | Network traffic | integrity attack, privacy attack, accessibility attack |
7 | Sensor/Activator Availability | integrity attack, availability attack, access attack |
Activity Type | Entropy of Incoming Traffic | Entropy of Outgoing Traffic | Entropy of CPU Load | Note |
---|---|---|---|---|
Normal operation | no increases | no increases | no increases | Received packets: −1 < DLij < 1; −1 < DLji < 1 Sent packets: −0.5 <DLij < 0.5; −0.5 <DLji <0.5 CPU load: −0.02 < Dij < 0; 0 < Dji < 0.02 |
Payload | in the normal range | increases | in the normal range | Received packets: −1 < DLij < 1; −1 < DLji < 1 Sent packets: −0.5 < DLij < 0.5; −0.5 < DLji < 0.5 CPU load: −0.02 < Dij < 0; 0 < Dji < 0.02 |
SYN flood attack | significant increase | significant increase | significant increase | Received packets: 0 < DLij < 1; 7 < DLji < 25 Sent packets: 10 < DLij < 400; −0.5 < DLji < 1 CPU load: −0.01 < Dij < 0; 0 < Dji < 0.9 |
Deauthentication | significant increase | significant increase | in the normal range | Received packets: 0 < DLij < 20; −3 < DLji < 0 Sent packets: 0 < DLij < 40; −5 < DLji < 1 CPU load: −0.06 < Dij < 0; 0 < Dji < 0.06 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Gamec, J.; Basan, E.; Basan, A.; Nekrasov, A.; Fidge, C.; Sushkin, N. An Adaptive Protection System for Sensor Networks Based on Analysis of Neighboring Nodes. Sensors 2021, 21, 6116. https://doi.org/10.3390/s21186116
Gamec J, Basan E, Basan A, Nekrasov A, Fidge C, Sushkin N. An Adaptive Protection System for Sensor Networks Based on Analysis of Neighboring Nodes. Sensors. 2021; 21(18):6116. https://doi.org/10.3390/s21186116
Chicago/Turabian StyleGamec, Ján, Elena Basan, Alexandr Basan, Alexey Nekrasov, Colin Fidge, and Nikita Sushkin. 2021. "An Adaptive Protection System for Sensor Networks Based on Analysis of Neighboring Nodes" Sensors 21, no. 18: 6116. https://doi.org/10.3390/s21186116