Abstract
The study analyzes the physical characteristics of devices that can be targeted. A method of detecting a malicious device with a violation of the physical characteristics of the network node is developed. The proposed method is based on the use of probabilistic functions, the calculation of the confidence interval and the probability of deviation of the current indicators from the confidence interval. Approaches to the control of the output sequences of the encryption algorithm using dynamic chaos and the method of singular spectral analysis are considered. A comparative analysis of the parameters of the input and output sequences of the developed algorithm of encryption based on dynamic chaos and standard algorithms of data encryption is carried out. It is found that the parameters of the output sequences of the encryption algorithm using dynamic chaos and standard encryption algorithms are almost identical. As a result of the study, a method for estimating node load indicators was developed. Evaluation of these indicators using threshold analysis, when the current values of the node fall within the confidence interval, is used to detect deviations in the behavior of the node during a cyber-attack.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Artyshchuk, I., Belej, O., Nestor, N.: Designing a generator of random electronic message based on chaotic algorithm. In: IEEE 15th International Conference on the Experience of Designing and Application of CAD Systems, Polyana on Proceedings, Ukraine, pp. 1–5 (2019)
Belej, O., Artyshchuk, I., Sitek, W.: The controlling of transmission of chaotic signals in communication systems based on dynamic models. In: CEUR Workshop Proceedings, vol. 2353, pp. 1–15 (2019)
Govindan, K., Mohapatra, P: Trust computations and trust dynamics in mobile Adhoc networks. In: IEEE Communications Surveys & Tutorials Proceedings, vol. 14, no. 2, pp. 279–298 (2018)
Deepali, V., Manas, H., Shringarica, C.: Exponential trust-based mechanism to detect black hole attack in wireless sensor network. Int. J. Soft Comput. Eng. (IJSCE) Proc., 14–16 (2014)
Mohammad, M.: Bayesian fusion algorithm for inferring trust in wireless sensor networks. J. Netw. 5(7), 815–822 (2010)
Schoch, E., Feiri, M., Kargl, F., Weber, M.: Simulation of ad hoc networks: ns–2 compared to JiST/SWANS, SIMUTools, Marseille, France (2008)
Shelby, Z., Bormann, C.: 6LoWPAN: the wireless embedded internet. Wiley Ser. Commun. Network. Distrib. Syst., 245 (2010)
Ho, J.W.: Zone-based trust management in sensor networks. In: IEEE International Conference on Pervasive Computing and Communications Proceedings, pp. 1–2 (2009)
Belej, O., Lohutova, T., Banaś, M.: Algorithm for image transfer using dynamic chaos. In: IEEE 15th International Conference on the Experience of Designing and Application of CAD Systems (CADSM) Proceedings, Polyana, Ukraine, pp. 1–5 (2019)
Oreku, G.S., Pazynyuk, T.: Security in Wireless Sensor Networks. Springer, Cham (2016)
Li, J., Ma, H., Li, K., Cui, L., Sun, L., Zhao, Z., Wang, X.: Wireless sensor networks. In: Revised Selected Papers of 11th China Wireless Sensor Network Conference, CWSN 2017, Tianjin, China (2017)
Sun, L., Ma, H., Fang, D., Niu, J., Wang, W.: Advances in wireless sensor networks. In: Revised Selected Papers of the 8th China Conference, CWSN 2014, Xi’an, China. Springer, Heidelberg (2015)
Guo, S., Liu, K., Chen, C., Huang, H.: Wireless Sensor Networks. In: Proceedings of the 13th China Conference on Wireless Sensor Networks (CWSN 2019), held in Chongqing, China (2019)
Becker, M.: Services in Wireless Sensor Networks. Modeling and Optimisation for the Efficient Discovery of Services. Springer Fachmedien Wiesbaden, Wiesbaden (2014)
Acknowledgment
This paper has been written as a result of the realization of the “International Academic Partnerships Program”. The project is funded by The Polish National Agency for Academic Exchange (NAWA), the contract for refinancing no. PPI/APM/2018/1/00031/U/001.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Belej, O., Staniec, K., Więckowski, T., Lobur, M., Matviykiv, O., Shcherbovskykh, S. (2020). Development of Methodology for Counteraction to Cyber-Attacks in Wireless Sensor Networks. In: Zamojski, W., Mazurkiewicz, J., Sugier, J., Walkowiak, T., Kacprzyk, J. (eds) Theory and Applications of Dependable Computer Systems. DepCoS-RELCOMEX 2020. Advances in Intelligent Systems and Computing, vol 1173. Springer, Cham. https://doi.org/10.1007/978-3-030-48256-5_5
Download citation
DOI: https://doi.org/10.1007/978-3-030-48256-5_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-48255-8
Online ISBN: 978-3-030-48256-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)