Wireless sensor network (WSN) technology is being increasingly used for data collection in critical infrastructures (CIs). This paper presents an intrusion detection system (IDS), which is able to protect a CI from attacks directed to its WSN-based parts. By providing accurate and timely detection of malicious activities, the proposed IDS solution ultimately results in a dramatic improvement in terms of protection, since opportunities are given for performing proper remediation/reconfiguration actions, which counter the attack and/or allow the system to tolerate it. The proposed solution has the important advantage of exploiting the high accuracy of hidden Markov models as an effective means of detecting malicious activities. We present the basic ideas, discuss the main implementation issues, and perform a preliminary experimental campaign, with respect to sinkhole attacks, one of the most serious attacks to WSNs. Copyright © 2012 Inderscience Enterprises Ltd.
A hidden Markov model based intrusion detection system for wireless sensor networks / L. Coppolino; L. Romano; A. Bondavalli; A. Daidone. - In: INTERNATIONAL JOURNAL OF CRITICAL COMPUTER-BASED SYSTEMS. - ISSN 1757-8779. - STAMPA. - 3:(2012), pp. 210-228. [10.1504/IJCCBS.2012.050305]
A hidden Markov model based intrusion detection system for wireless sensor networks
BONDAVALLI, ANDREA;DAIDONE, ALESSANDRO
2012
Abstract
Wireless sensor network (WSN) technology is being increasingly used for data collection in critical infrastructures (CIs). This paper presents an intrusion detection system (IDS), which is able to protect a CI from attacks directed to its WSN-based parts. By providing accurate and timely detection of malicious activities, the proposed IDS solution ultimately results in a dramatic improvement in terms of protection, since opportunities are given for performing proper remediation/reconfiguration actions, which counter the attack and/or allow the system to tolerate it. The proposed solution has the important advantage of exploiting the high accuracy of hidden Markov models as an effective means of detecting malicious activities. We present the basic ideas, discuss the main implementation issues, and perform a preliminary experimental campaign, with respect to sinkhole attacks, one of the most serious attacks to WSNs. Copyright © 2012 Inderscience Enterprises Ltd.File | Dimensione | Formato | |
---|---|---|---|
IJCCBS030304 COPPOLINO.pdf
Accesso chiuso
Tipologia:
Versione finale referata (Postprint, Accepted manuscript)
Licenza:
DRM non definito
Dimensione
549.7 kB
Formato
Adobe PDF
|
549.7 kB | Adobe PDF | Richiedi una copia |
I documenti in FLORE sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.