2013
DOI: 10.1109/jsyst.2012.2223531
|View full text |Cite
|
Sign up to set email alerts
|

Anomaly Detection Based Secure In-Network Aggregation for Wireless Sensor Networks

Abstract: -Secure in-network aggregation in Wireless Sensor Networks (WSNs) is a necessary and challenging task. In this paper, we first propose integration of system monitoring modules and intrusion detection modules in the context of WSNs. We propose an Extended Kalman Filter (EKF) based mechanism to detect false injected data. Specifically, by monitoring behaviors of its neighbors and using EKF to predict their future states (actual in-network aggregated values), each node aims at setting up a normal range of the nei… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
50
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 79 publications
(50 citation statements)
references
References 34 publications
0
50
0
Order By: Relevance
“…This is not surprising as finding real attack data in existing WSN deployments is difficult. In fact, two approaches have been broadly adopted to evaluate the algorithms for detection of malicious data injections: simulation [Sun et al 2013;Liu et al 2007;Rezvani et al 2013;Atakli et al 2008;Bankovic et al 2010;Oh et al 2012;Bao et al 2012;Lim and Choi 2013] and injection of attacks in real datasets [Tanachaiwiwat and Helmy 2005;Chatzigiannakis and Papavassiliou 2007].…”
Section: Comparing Reported Evaluation Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…This is not surprising as finding real attack data in existing WSN deployments is difficult. In fact, two approaches have been broadly adopted to evaluate the algorithms for detection of malicious data injections: simulation [Sun et al 2013;Liu et al 2007;Rezvani et al 2013;Atakli et al 2008;Bankovic et al 2010;Oh et al 2012;Bao et al 2012;Lim and Choi 2013] and injection of attacks in real datasets [Tanachaiwiwat and Helmy 2005;Chatzigiannakis and Papavassiliou 2007].…”
Section: Comparing Reported Evaluation Resultsmentioning
confidence: 99%
“…Detection of malicious data injections has been addressed with two main approaches so far: anomaly detection (e.g., [Tanachaiwiwat and Helmy 2005;Liu et al 2007;Sun et al 2013]) and trust management (e.g., [Atakli et al 2008;Bao et al 2012;Oh et al 2012]). While anomaly detection defines normal behaviours to infer the presence of anomalies, trust management evaluates the confidence level (trustworthiness) that a sensor's behaviour is normal.…”
Section: Relationship To Anomaly Detection and Trust Managementmentioning
confidence: 99%
See 2 more Smart Citations
“…The communication overhead is considerably reduced by avoiding the verification of aggregation integrity. Sun et al (2013) proposed a secure in-network data aggregation with anomaly detection in WSNs. The false injected data are detected using Extended Kalman Filter (EKF) based mechanism.…”
Section: Related Workmentioning
confidence: 99%