Faculty of Electrical Engineering and Informatics, Technical University of Košice, Letná 9, 04200 Košice, Slovakia.
Institute for Computer Technologies and Information Security, Southern Federal University, Chekhova 2, 347922 Taganrog, Russia.
Sensors (Basel). 2021 Sep 12;21(18):6116. doi: 10.3390/s21186116.
Creation and operation of sensor systems is a complex challenge not only for industrial and military purposes but also for consumer services ("smart city", "smart home") and other applications such as agriculture ("smart farm", "smart greenhouse"). The use of such systems gives a positive economic effect and provides additional benefits from various points of view. At the same time, due to a large number of threats and challenges to cyber security, it is necessary to detect attacks on sensor systems in a timely manner. Here we present an anomaly detection method in which sensor nodes observe their neighbors and detect obvious deviations in their behavior. In this way, the community of neighboring nodes works collectively to protect one another. The nodes record only those parameters and attributes that are inherent in any node. Regardless of the node's functionality, such parameters include the amount of traffic passing through the node, its Central Processing Unit (CPU) load, as well as the presence and number of packets dropped by the node. Our method's main goal is to implement protection against the active influence of an internal attacker on the whole sensor network. We present the anomaly detection method, a dataset collection strategy, and experimental results that show how different types of attacks can be distinguished in the data produced by the nodes.
传感器系统的创建和运行不仅对工业和军事领域具有挑战性,而且对消费者服务(“智慧城市”、“智能家居”)和其他应用领域(如农业“智能农场”、“智能温室”)也具有挑战性。此类系统的使用不仅会产生积极的经济效果,而且还会从各个角度带来额外的好处。同时,由于网络安全受到大量威胁和挑战,因此需要及时检测传感器系统的攻击。在这里,我们提出了一种异常检测方法,其中传感器节点观察其邻居,并检测其行为明显偏离。通过这种方式,相邻节点的社区可以集体保护彼此。节点仅记录任何节点固有的参数和属性。无论节点的功能如何,这些参数都包括通过节点的流量、中央处理单元 (CPU) 负载,以及节点丢弃的数据包的存在和数量。我们方法的主要目标是实施针对整个传感器网络内部攻击者主动影响的保护。我们提出了异常检测方法、数据集收集策略和实验结果,展示了如何在节点生成的数据中区分不同类型的攻击。