2nd International ICST Conference on Communications and Networking in China

Research Article

Anomaly Detection Based on Data-Mining for Routing Attacks in Wireless Sensor Networks

  • @INPROCEEDINGS{10.1109/CHINACOM.2007.4469386,
        author={SONG Jian-hua and Ma Chuan-Xiang},
        title={Anomaly Detection Based on Data-Mining for Routing Attacks in Wireless Sensor Networks},
        proceedings={2nd International ICST Conference on Communications and Networking in China},
        publisher={IEEE},
        proceedings_a={CHINACOM},
        year={2008},
        month={3},
        keywords={anomaly detection routing attacks data-mining wireless sensor networks},
        doi={10.1109/CHINACOM.2007.4469386}
    }
    
  • SONG Jian-hua
    Ma Chuan-Xiang
    Year: 2008
    Anomaly Detection Based on Data-Mining for Routing Attacks in Wireless Sensor Networks
    CHINACOM
    IEEE
    DOI: 10.1109/CHINACOM.2007.4469386
SONG Jian-hua1, Ma Chuan-Xiang1
  • 1: School of Mathematics and Computer Science, Hubei University, Wuhan 430062, Hubei, China

Abstract

With the increasing deployment of wireless sensor devices and networks, security becomes a critical challenge for sensor networks. In this paper, a scheme using association algorithm and clustering algorithm is proposed for routing anomaly detection in wireless sensor networks. The scheme uses the Apriori algorithm to extract traffic patterns from both routing table and network traffic packets and subsequently the K-means cluster algorithm adaptively generates a detection model. Through the combination of these two algorithms, routing attacks can be detected effectively and automatically. The main advantage of the proposed approach is that it is able to detect new attacks that have not previously been seen. Moreover, the proposed detection scheme is based on no priori knowledge and then can be applied to a wide range of different sensor networks for a variety of routing attacks.