CFP last date
20 January 2025
Reseach Article

Traffic Analysis, a Wise Approach to Detect Compromised Nodes in Wireless Sensor Networks

by Mehdi Harizi, Mehdi Mohtasham Zadeh, Aref Saiahi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 97 - Number 14
Year of Publication: 2014
Authors: Mehdi Harizi, Mehdi Mohtasham Zadeh, Aref Saiahi
10.5120/17073-7511

Mehdi Harizi, Mehdi Mohtasham Zadeh, Aref Saiahi . Traffic Analysis, a Wise Approach to Detect Compromised Nodes in Wireless Sensor Networks. International Journal of Computer Applications. 97, 14 ( July 2014), 6-9. DOI=10.5120/17073-7511

@article{ 10.5120/17073-7511,
author = { Mehdi Harizi, Mehdi Mohtasham Zadeh, Aref Saiahi },
title = { Traffic Analysis, a Wise Approach to Detect Compromised Nodes in Wireless Sensor Networks },
journal = { International Journal of Computer Applications },
issue_date = { July 2014 },
volume = { 97 },
number = { 14 },
month = { July },
year = { 2014 },
issn = { 0975-8887 },
pages = { 6-9 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume97/number14/17073-7511/ },
doi = { 10.5120/17073-7511 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:24:05.344980+05:30
%A Mehdi Harizi
%A Mehdi Mohtasham Zadeh
%A Aref Saiahi
%T Traffic Analysis, a Wise Approach to Detect Compromised Nodes in Wireless Sensor Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 97
%N 14
%P 6-9
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Existence of self-similarity and repeated patterns in network traffic makes it possible to predict network parameters. This phenomenon can also be seen in behavior of wireless sensor networks. Self-similarity can be used to propose security solutions in computer and sensor networks. However, sensor networks suffer from several constraints such as limited energy, storage capacity and computing power which make it impossible to take advantage of an overwhelming proportion of tested, evaluated and improved mechanisms which are used in computer networks. Kalman filter is a mathematical tool for estimating control system status with low level of computational overhead. Considering network condition in the past time, Kalman filter can estimate network parameters in future. According to accurate and low cost estimations of Kalman filter, it is compatible with constraints of sensor networks. In this research we have used this concept to present an attack detection mechanism. To this end, Kalman filter make decisions base on traffic volumes produced by different nodes. It can be deduced from results that majority of attacks and abnormal conditions can be marked using the proposed mechanism.

References
  1. W. Wei Beng. ANALYSIS AND CLASSIFICATION OF TRAFFIC IN WIRELESS SENSOR NETWORKS, PhD thesis, Naval postgraduate school, Monterey, California, 2007.
  2. Q. Liang. Energy Efficient Wireless Sensor Networks Using Fuzzy Logic, Bi-annual (12/2004-05/2005) Performance/Technical Report for ONR YIP Award, 2005.
  3. L. Heng and W. Yan. An adaptive proportional integral active queue management algorithm based on self-similar traffic rate estimation in WSN, Journal of Korean Society for Internet Information, Vol. 5, No. 11, 2011.
  4. Y. Jiao Wang and H. Yun Lin. A Kind of Improved RED Algorithm of WSN Oriented to Self-Similar Traffic, Advanced Materials Research, Vol. 214, 2011.
  5. B. Sun, L et al. Integration of Secure In-Network Aggregation and System Monitoring for Wireless Sensor Networks. IEEE ICC '07, Glasgow, U. K. , June 2007.
  6. K. Park and W. Willinger, SELF-SIMILAR NETWORK TRAFFIC AND PERFORMANCE EVALUATION, John Wiley, 2000.
  7. K. Park, and T. Tuan, "Performance evaluation of multiple time-scale TCP under self similar traffic condition," ACM transaction on modeling and computer simulation, Vol. 10, No. 2, pp. 152-177, April 2000.
Index Terms

Computer Science
Information Sciences

Keywords

Wireless sensor network Attack detection Long range dependency of data Kalman filter.