首页> 外文会议>Evolutionary and bio-inspired computation: Theory and applications IV >Neural methods based on modified reputation rules for detection and identification of intrusion attacks in wireless ad hoc sensor networks
【24h】

Neural methods based on modified reputation rules for detection and identification of intrusion attacks in wireless ad hoc sensor networks

机译:基于修改后的信誉规则的神经方法,用于在无线自组织传感器网络中检测和识别入侵攻击

获取原文
获取原文并翻译 | 示例

摘要

Determining methods to secure the process of data fusion against attacks by compromised nodes in wireless sensor networks (WSNs) and to quantify the uncertainty that may exist in the aggregation results is a critical issue in mitigating the effects of intrusion attacks. Published research has introduced the concept of the trustworthiness (reputation) of a single sensor node. Reputation is evaluated using an information-theoretic concept, the Kullback-Leibler (KL) distance. Reputation is added to the set of security features. In data aggregation, an opinion, a metric of the degree of belief, is generated to represent the uncertainty in the aggregation result. As aggregate information is disseminated along routes to the sink node(s), its corresponding opinion is propagated and regulated by Josang's belief model. By applying subjective logic on the opinion to manage trust propagation, the uncertainty inherent in aggregation results can be quantified for use in decision making. The concepts of reputation and opinion are modified to allow their application to a class of dynamic WSNs. Using reputation as a factor in determining interim aggregate information is equivalent to implementation of a reputation-based security filter at each processing stage of data fusion, thereby improving the intrusion detection and identification results based on unsupervised techniques. In particular, the reputation-based version of the probabilistic neural network (PNN) learns the signature of normal network traffic with the random probability weights normally used in the PNN replaced by the trust-based quantified reputations of sensor data or subsequent aggregation results generated by the sequential implementation of a version of Josang's belief model. A two-stage, intrusion detection and identification algorithm is implemented to overcome the problems of large sensor data loads and resource restrictions in WSNs. Performance of the two-stage algorithm is assessed in simulations of WSN scenarios with multiple sensors at edge nodes for known intrusion attacks. Simulation results show improved robustness of the two-stage design based on reputation-based NNs to intrusion anomalies from compromised nodes and external intrusion attacks.
机译:确定方法以确保数据融合过程不受无线传感器网络(WSN)中受损节点的攻击并量化聚合结果中可能存在的不确定性,这是缓解入侵攻击影响的关键问题。已发表的研究介绍了单个传感器节点的可信度(信誉)的概念。声誉是使用信息理论概念(Kullback-Leibler(KL)距离)进行评估的。将信誉添加到安全功能集。在数据聚合中,会生成一种观点(即置信度的度量)来表示聚合结果中的不确定性。随着聚集信息沿着到汇聚节点的路由传播,其对应的观点将由Josang的信念模型传播和控制。通过对意见应用主观逻辑来管理信任传播,可以量化聚合结果中固有的不确定性,以用于决策。对信誉和意见的概念进行了修改,以允许将其应用于一类动态WSN。使用信誉作为确定临时汇总信息的因素等效于在数据融合的每个处理阶段实施基于信誉的安全过滤器,从而基于无监督技术改进入侵检测和识别结果。尤其是,概率神经网络(PNN)的基于信誉的版本将学习正常网络流量的签名,并使用PNN中通常使用的随机概率权重替换为传感器数据的基于信任的量化信誉或由以下各项生成的后续聚合结果Josang信念模型版本的顺序实现。为了解决无线传感器网络中传感器数据量大和资源受限的问题,本文提出了一种两阶段的入侵检测与识别算法。在WSN场景的模拟中评估了两阶段算法的性能,在边缘节点上使用多个传感器进行了已知的入侵攻击。仿真结果表明,基于信誉的神经网络的两阶段设计具有更高的鲁棒性,可以抵御来自受感染节点和外部入侵攻击的入侵异常。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号