Skip to main content

Development of Methodology for Counteraction to Cyber-Attacks in Wireless Sensor Networks

  • Conference paper
  • First Online:
Theory and Applications of Dependable Computer Systems (DepCoS-RELCOMEX 2020)

Abstract

The study analyzes the physical characteristics of devices that can be targeted. A method of detecting a malicious device with a violation of the physical characteristics of the network node is developed. The proposed method is based on the use of probabilistic functions, the calculation of the confidence interval and the probability of deviation of the current indicators from the confidence interval. Approaches to the control of the output sequences of the encryption algorithm using dynamic chaos and the method of singular spectral analysis are considered. A comparative analysis of the parameters of the input and output sequences of the developed algorithm of encryption based on dynamic chaos and standard algorithms of data encryption is carried out. It is found that the parameters of the output sequences of the encryption algorithm using dynamic chaos and standard encryption algorithms are almost identical. As a result of the study, a method for estimating node load indicators was developed. Evaluation of these indicators using threshold analysis, when the current values of the node fall within the confidence interval, is used to detect deviations in the behavior of the node during a cyber-attack.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Artyshchuk, I., Belej, O., Nestor, N.: Designing a generator of random electronic message based on chaotic algorithm. In: IEEE 15th International Conference on the Experience of Designing and Application of CAD Systems, Polyana on Proceedings, Ukraine, pp. 1–5 (2019)

    Google Scholar 

  2. Belej, O., Artyshchuk, I., Sitek, W.: The controlling of transmission of chaotic signals in communication systems based on dynamic models. In: CEUR Workshop Proceedings, vol. 2353, pp. 1–15 (2019)

    Google Scholar 

  3. Govindan, K., Mohapatra, P: Trust computations and trust dynamics in mobile Adhoc networks. In: IEEE Communications Surveys & Tutorials Proceedings, vol. 14, no. 2, pp. 279–298 (2018)

    Google Scholar 

  4. Deepali, V., Manas, H., Shringarica, C.: Exponential trust-based mechanism to detect black hole attack in wireless sensor network. Int. J. Soft Comput. Eng. (IJSCE) Proc., 14–16 (2014)

    Google Scholar 

  5. Mohammad, M.: Bayesian fusion algorithm for inferring trust in wireless sensor networks. J. Netw. 5(7), 815–822 (2010)

    Google Scholar 

  6. Schoch, E., Feiri, M., Kargl, F., Weber, M.: Simulation of ad hoc networks: ns–2 compared to JiST/SWANS, SIMUTools, Marseille, France (2008)

    Google Scholar 

  7. Shelby, Z., Bormann, C.: 6LoWPAN: the wireless embedded internet. Wiley Ser. Commun. Network. Distrib. Syst., 245 (2010)

    Google Scholar 

  8. Ho, J.W.: Zone-based trust management in sensor networks. In: IEEE International Conference on Pervasive Computing and Communications Proceedings, pp. 1–2 (2009)

    Google Scholar 

  9. Belej, O., Lohutova, T., Banaś, M.: Algorithm for image transfer using dynamic chaos. In: IEEE 15th International Conference on the Experience of Designing and Application of CAD Systems (CADSM) Proceedings, Polyana, Ukraine, pp. 1–5 (2019)

    Google Scholar 

  10. Oreku, G.S., Pazynyuk, T.: Security in Wireless Sensor Networks. Springer, Cham (2016)

    Book  Google Scholar 

  11. Li, J., Ma, H., Li, K., Cui, L., Sun, L., Zhao, Z., Wang, X.: Wireless sensor networks. In: Revised Selected Papers of 11th China Wireless Sensor Network Conference, CWSN 2017, Tianjin, China (2017)

    Google Scholar 

  12. Sun, L., Ma, H., Fang, D., Niu, J., Wang, W.: Advances in wireless sensor networks. In: Revised Selected Papers of the 8th China Conference, CWSN 2014, Xi’an, China. Springer, Heidelberg (2015)

    Google Scholar 

  13. Guo, S., Liu, K., Chen, C., Huang, H.: Wireless Sensor Networks. In: Proceedings of the 13th China Conference on Wireless Sensor Networks (CWSN 2019), held in Chongqing, China (2019)

    Google Scholar 

  14. Becker, M.: Services in Wireless Sensor Networks. Modeling and Optimisation for the Efficient Discovery of Services. Springer Fachmedien Wiesbaden, Wiesbaden (2014)

    Chapter  Google Scholar 

Download references

Acknowledgment

This paper has been written as a result of the realization of the “International Academic Partnerships Program”. The project is funded by The Polish National Agency for Academic Exchange (NAWA), the contract for refinancing no. PPI/APM/2018/1/00031/U/001.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Olexander Belej .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Belej, O., Staniec, K., Więckowski, T., Lobur, M., Matviykiv, O., Shcherbovskykh, S. (2020). Development of Methodology for Counteraction to Cyber-Attacks in Wireless Sensor Networks. In: Zamojski, W., Mazurkiewicz, J., Sugier, J., Walkowiak, T., Kacprzyk, J. (eds) Theory and Applications of Dependable Computer Systems. DepCoS-RELCOMEX 2020. Advances in Intelligent Systems and Computing, vol 1173. Springer, Cham. https://doi.org/10.1007/978-3-030-48256-5_5

Download citation

Publish with us

Policies and ethics