Proceedings of the 1st international conference on Embedded networked sensor systems
SIGF: a family of configurable, secure routing protocols for wireless sensor networks
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
Linear-Time Computation of Similarity Measures for Sequential Data
The Journal of Machine Learning Research
Attacks and defenses of ubiquitous sensor networks
Attacks and defenses of ubiquitous sensor networks
INSENS: Intrusion-tolerant routing for wireless sensor networks
Computer Communications
Intrusion detection in sensor networks using clustering and immune systems
IDEAL'09 Proceedings of the 10th international conference on Intelligent data engineering and automated learning
Integrated Computer-Aided Engineering
Exploring message authentication in sensor networks
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
Protecting the WSN zones of a critical infrastructure via enhanced SIEM technology
SAFECOMP'12 Proceedings of the 2012 international conference on Computer Safety, Reliability, and Security
Hi-index | 0.00 |
The specific nature of routing in sensor networks has made possible new sorts of attacks that can have closer insight and effect on the networks packets, the most important being the packet tampering. Routing attacks on the network level are the first step in tampering with the packets. In this work we propose a solution for detecting and eliminating these attacks that couples reputation systems with clustering techniques, namely unsupervised genetic algorithm and self-organizing maps, trained for detecting outliers in data. The algorithms use the feature space based on sequences of routing hops that provides ability of detecting wide range of attacks. We further present a flexible way of integrating the solution into targeted sensor network that can easily adapt its computational requirements to the existing network resources. The solution offers many benefits: scalable solution, fast response to adversarial activities, ability to detect unknown attacks, high adaptability, flexible integration, and high ability in detecting and confining attacks.