WSN中恶意活动检测与预防的跨层与管理平面集成方法

B. M. Devaraju, G. Raju
{"title":"WSN中恶意活动检测与预防的跨层与管理平面集成方法","authors":"B. M. Devaraju, G. Raju","doi":"10.1109/ICEECCOT43722.2018.9001301","DOIUrl":null,"url":null,"abstract":"Wireless Sensor Networks (WSNs) are the next generation envision and have several applications in military, infrastructure monitoring, healthcare, environment monitoring, manufacturing and Internet of Things (IoT) applications. WSN is basically a collection of sensor nodes that are deployed without infrastructure deployed anywhere, anytime, without administrator and every node works as host and router. Sensor nodes are more susceptible to failure because they are deployed in open areas, may be tampered by intruders. Malicious attacks like, Denial of Service (DoS), Sybil attack, Blackhole/Sinkhole attack, Hello Flood attack, Wormhole attacks may modify sensitive information results in performance degradation. The next emerging technology is WSN with IoT, wherein billions of devices are connected with internet and every day millions of new hackers and malicious activities are identified. Hence it has become essential to propose different approaches and different measurements to identify malicious activities and to avoid them is big challenge in WSN. Several researchers have proposed cross layer design to improve QoS by reducing latency and computation overhead. But these proposed ideas have not been standardized in global level networking. So there is a need for designing security models for various devices and conform National Information Security Framework (NISF) policies. One way to detect and identify malicious activities is through analyzing nodes activities pattern in the network. This paper proposes a cross layer and management plane integration approach for detection and prevention of malicious activities in Wireless Sensor Networks","PeriodicalId":254272,"journal":{"name":"2018 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT)","volume":"271 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Cross Layer and Management Plane Integration Approach for Detection and Prevention of Malicious Activities in WSN\",\"authors\":\"B. M. Devaraju, G. Raju\",\"doi\":\"10.1109/ICEECCOT43722.2018.9001301\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Wireless Sensor Networks (WSNs) are the next generation envision and have several applications in military, infrastructure monitoring, healthcare, environment monitoring, manufacturing and Internet of Things (IoT) applications. WSN is basically a collection of sensor nodes that are deployed without infrastructure deployed anywhere, anytime, without administrator and every node works as host and router. Sensor nodes are more susceptible to failure because they are deployed in open areas, may be tampered by intruders. Malicious attacks like, Denial of Service (DoS), Sybil attack, Blackhole/Sinkhole attack, Hello Flood attack, Wormhole attacks may modify sensitive information results in performance degradation. The next emerging technology is WSN with IoT, wherein billions of devices are connected with internet and every day millions of new hackers and malicious activities are identified. Hence it has become essential to propose different approaches and different measurements to identify malicious activities and to avoid them is big challenge in WSN. Several researchers have proposed cross layer design to improve QoS by reducing latency and computation overhead. But these proposed ideas have not been standardized in global level networking. So there is a need for designing security models for various devices and conform National Information Security Framework (NISF) policies. One way to detect and identify malicious activities is through analyzing nodes activities pattern in the network. This paper proposes a cross layer and management plane integration approach for detection and prevention of malicious activities in Wireless Sensor Networks\",\"PeriodicalId\":254272,\"journal\":{\"name\":\"2018 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT)\",\"volume\":\"271 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICEECCOT43722.2018.9001301\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICEECCOT43722.2018.9001301","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

无线传感器网络(wsn)是下一代设想,在军事,基础设施监测,医疗保健,环境监测,制造和物联网(IoT)应用中有多种应用。WSN基本上是传感器节点的集合,这些节点无需基础设施,随时随地部署,无需管理员,每个节点都充当主机和路由器。传感器节点更容易发生故障,因为它们部署在开放区域,可能被入侵者篡改。拒绝服务(DoS)、Sybil攻击、黑洞/天坑攻击、Hello Flood攻击、虫洞攻击等恶意攻击可能会修改敏感信息,导致性能下降。下一个新兴技术是无线传感器网络与物联网,其中数十亿设备与互联网连接,每天都有数百万新的黑客和恶意活动被识别出来。因此,提出不同的方法和措施来识别和避免恶意活动是无线传感器网络的一大挑战。一些研究人员提出了跨层设计,通过减少延迟和计算开销来提高QoS。但这些提出的想法尚未在全球层面的网络中标准化。因此,有必要为各种设备设计安全模型,并符合国家信息安全框架(NISF)策略。通过分析网络中节点的活动模式,是检测和识别恶意活动的一种方法。本文提出了一种跨层和管理平面集成的无线传感器网络恶意活动检测和预防方法
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Cross Layer and Management Plane Integration Approach for Detection and Prevention of Malicious Activities in WSN
Wireless Sensor Networks (WSNs) are the next generation envision and have several applications in military, infrastructure monitoring, healthcare, environment monitoring, manufacturing and Internet of Things (IoT) applications. WSN is basically a collection of sensor nodes that are deployed without infrastructure deployed anywhere, anytime, without administrator and every node works as host and router. Sensor nodes are more susceptible to failure because they are deployed in open areas, may be tampered by intruders. Malicious attacks like, Denial of Service (DoS), Sybil attack, Blackhole/Sinkhole attack, Hello Flood attack, Wormhole attacks may modify sensitive information results in performance degradation. The next emerging technology is WSN with IoT, wherein billions of devices are connected with internet and every day millions of new hackers and malicious activities are identified. Hence it has become essential to propose different approaches and different measurements to identify malicious activities and to avoid them is big challenge in WSN. Several researchers have proposed cross layer design to improve QoS by reducing latency and computation overhead. But these proposed ideas have not been standardized in global level networking. So there is a need for designing security models for various devices and conform National Information Security Framework (NISF) policies. One way to detect and identify malicious activities is through analyzing nodes activities pattern in the network. This paper proposes a cross layer and management plane integration approach for detection and prevention of malicious activities in Wireless Sensor Networks
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信