Improving Robustness of a Popular Probabilistic Clustering Algorithm Against Insider Attacks | SpringerLink
Skip to main content

Improving Robustness of a Popular Probabilistic Clustering Algorithm Against Insider Attacks

  • Conference paper
  • First Online:
Security and Privacy in Communication Networks (SecureComm 2020)

Abstract

Many clustering algorithms for mesh, ad hoc and Wireless Sensor Networks have been proposed. Probabilistic approaches are a popular class of such algorithms. However, it is essential to analyze their robustness against security compromise. We study the robustness of EEHCA, a popular energy efficient clustering algorithm as an example of probabilistic class in terms of security compromise. In this paper, we investigate attacks on EEHCA through analysis and experimental simulations. We analytically characterize two different attack models. In the first attack model, the attacker aims to gain control over the network by stealing network traffic, or by disrupting the data aggregation process (integrity attack). In the second attack model, the inducement of the attacker is to abridge the network lifetime (denial of service attack). We assume the clustering algorithm is running periodically and propose a detection solution by exploiting Bernoulli CUSUM charts.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 11439
Price includes VAT (Japan)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 14299
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    To find such a \(p_{1,a}\), Newton-Raphson method with starting point of \(p_1\) for solving the nonlinear equation quickly converges to a solution.

  2. 2.

    Newton-Raphson method with starting point \(h_0^*\) in the range \(4 \le h_0^*\le 8\) for increase detection scenario or starting point \(h_0^*\) in \(-4 \le h_0^*\le -8\) for decrease detection case can be adopted to solve the nonlinear equation.

References

  1. Abbasi, A.A., Younis, M.: A survey on clustering algorithms for wireless sensor networks. Comput. Commun. 30(14), 2826–2841 (2007)

    Article  Google Scholar 

  2. Agresti, A.: An Introduction to Categorical Data Analysis. Wiley Series in Probability and Statistics. Wiley, Hoboken (2007)

    Book  Google Scholar 

  3. Al-Karaki, J.N., Kamal, A.E.: Routing techniques in wireless sensor networks: a survey. Wireless Commun. 11(6), 6–28 (2004)

    Article  Google Scholar 

  4. Andersson, E., Bock, D., Frisén, M.: Some statistical aspects of methods for detection of turning points in business cycles. J. Appl. Stat. 33(3), 257–278 (2006)

    Article  MathSciNet  Google Scholar 

  5. Baccelli, F., Zuyev, S.: Poisson-Voronoi spanning trees with applications to the optimization of communication networks. Oper. Res. 47(4), 619–631 (1999)

    Article  Google Scholar 

  6. Bandyopadhyay, S., Coyle, E.J.: An energy efficient hierarchical clustering algorithm for wireless sensor networks. In: INFOCOM 2003, Twenty-Second Annual Joint Conference of the IEEE Computer and Communications, IEEE Societies, vol. 3, pp. 1713–1723. IEEE (2003)

    Google Scholar 

  7. Chiu, S.N., Stoyan, D., Kendall, W.S., Mecke, J.: Stochastic Geometry and Its Applications. Wiley, Hoboken (2013)

    Book  Google Scholar 

  8. Choi, J., Lee, C.: Energy consumption and lifetime analysis in clustered multi-hop wireless sensor networks using the probabilistic cluster-head selection method. EURASIP J. Wireless Commun. Netw. 2011(1), 1–13 (2011)

    Article  Google Scholar 

  9. Hawkins, D.M., Olwell, D.H.: Cumulative Sum Charts and Charting for Quality Improvement. Statistics for Engineering and Physical Science. Springer, New York (1998). https://doi.org/10.1007/978-1-4612-1686-5

    Book  MATH  Google Scholar 

  10. Heinzelman, W.R., Chandrakasan, A., Balakrishnan, H.: Energy-efficient communication protocol for wireless microsensor networks. In: Proceedings of the 33rd Annual Hawaii International Conference on System Sciences 2000, p. 10. IEEE (2000)

    Google Scholar 

  11. Kang, C.W., Kvam, P.H.: Shewhart control charts. In: Basic Statistical Tools for Improving Quality, pp. 97–124 (2011)

    Google Scholar 

  12. Liu, F., Cheng, X., Chen, D.: Insider attacker detection in wireless sensor networks. In: INFOCOM 2007, 26th IEEE International Conference on Computer Communications, pp. 1937–1945. IEEE (2007)

    Google Scholar 

  13. Liu, X.: A survey on clustering routing protocols in wireless sensor networks. Sensors 12(8), 11113–11153 (2012)

    Article  Google Scholar 

  14. Page, E.: Continuous inspection schemes. Biometrika 41, 100–115 (1954)

    Article  MathSciNet  Google Scholar 

  15. Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: SPINS: security protocols for sensor networks. Wireless Netw. 8(5), 521–534 (2002). https://doi.org/10.1023/A:1016598314198

    Article  MATH  Google Scholar 

  16. Poor, H.V., Hadjiliadis, O.: Quickest Detection, vol. 40. Cambridge University Press, Cambridge (2009)

    MATH  Google Scholar 

  17. Reynolds, M.R.: The Bernoulli CUSUM chart for detecting decreases in a proportion. Qual. Reliab. Eng. Int. 29(4), 529–534 (2013)

    Article  Google Scholar 

  18. Reynolds, M.R., Stoumbos, Z.G.: A general approach to modeling CUSUM charts for a proportion. IIE Trans. 32(6), 515–535 (2000)

    Google Scholar 

  19. Reynolds Jr., M.R., Stoumbos, Z.G.: A CUSUM chart for monitoring a proportion when inspecting continuously. J. Qual. Technol. 31(1), 87–108 (1999)

    Article  Google Scholar 

  20. Sego, L.H.: Applications of control charts in medicine and epidemiology. Ph.D. thesis, Virginia Polytechnic Institute and State University (2006)

    Google Scholar 

  21. Stoto, M.A., et al.: Evaluating statistical methods for syndromic surveillance. In: Wilson, A.G., Wilson, G.D., Olwell, D.H. (eds.) Statistical Methods in Counterterrorism, pp. 141–172. Springer, New York (2006). https://doi.org/10.1007/0-387-35209-0_9

    Chapter  Google Scholar 

  22. Tartakovsky, A.G., Rozovskii, B.L., Shah, K.: A nonparametric multichart CUSUM test for rapid intrusion detection. In: Proceedings Joint Statistical Meetings, 7–11 August 2005

    Google Scholar 

  23. Wang, H., Sheng, B., Li, Q.: Elliptic curve cryptography-based access control in sensor networks. Int. J. Secur. Netw. 1(3–4), 127–137 (2006)

    Article  Google Scholar 

  24. Xie, M., Han, S., Tian, B., Parvin, S.: Anomaly detection in wireless sensor networks: a survey. J. Netw. Comput. Appl. 34(4), 1302–1325 (2011)

    Article  Google Scholar 

  25. Younis, O., Fahmy, S.: HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks. IEEE Trans. Mob. Comput. 3(4), 366–379 (2004)

    Article  Google Scholar 

  26. Zhang, Y., Yang, L.T., Chen, J.: RFID and Sensor Networks: Architectures, Protocols, Security, and Integrations. CRC Press, Boca Raton (2009)

    Book  Google Scholar 

Download references

Acknowledgments

Research was sponsored by the Army Research Laboratory and was accomplished under Cooperative Agreement Number W911NF-13-2-0045 (ARL Cyber Security CRA). The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the Army Research Laboratory or the U.S. Government. The U.S. Government is authorized to reproduce and distribute reprints for Government purposes notwithstanding any copyright notation herein.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sayed M. Saghaian N. E. .

Editor information

Editors and Affiliations

Appendices

A Proof of Theorem 1

Proof

Suppose a realization of the random point process \(\varPhi _b\) with number of nodes equal to \(N=n\) is given. Arbitrarily compromise m nodes independent of location and each other under attack model 1. One can consider compromising nodes as a p-thinning operation with \(p_r = 1- \frac{m}{n}\). As a result, legitimate nodes and malicious nodes are distributed independently according to a homogeneous spatial Poisson point processes (PPP):

$$\begin{aligned} PPP_{leg}: \lambda _{leg} = p_r \lambda _b \end{aligned}$$
(12)
$$\begin{aligned} PPP_{mal}: \lambda _{mal} = (1-p_r)\lambda _b \end{aligned}$$
(13)

Legitimate nodes become volunteer clusterheads with probability of \(p_{opt}\). Hence, legitimate clusterheads and legitimate ordinary nodes are distributed as independent homogeneous spatial Poisson point processes:

$$\begin{aligned} PPP_{CH,leg}: \lambda _{CH,leg} = p_{opt} \lambda _{leg} \end{aligned}$$
(14)
$$\begin{aligned} PPP_{Ord,leg}: \lambda _{Ord,leg} = (1-p_{opt}) \lambda _{leg} \end{aligned}$$
(15)

Malicious nodes become volunteer clusterheads with probability of \(p_m\) and therefore, malicious clusterheads are distributed as a homogeneous spatial Poisson point process:

$$\begin{aligned} PPP_{CH,mal}: \lambda _{CH,mal} = p_m\lambda _{mal} \end{aligned}$$
(16)

It should be noted that \(PPP_{mal}\) and \(PPP_{leg}\) are non-overlapping and independent and hence, \(PPP_{CH,mal}\) and \(PPP_{CH,leg}\) are independent non-overlapping point processes. Consequently, one can apply the Superposition operation and define:

$$\begin{aligned} PPP_{CH} = PPP_{CH,leg} \cup PPP_{CH,mal} \end{aligned}$$
(17)

which is a spatial Poisson point process with intensity of:

$$\begin{aligned} \lambda _{CH}&= \lambda _{CH,leg} + \lambda _{CH,mal} = p_{opt}(1- \frac{m}{n})\lambda _b + p_m \frac{m}{n} \lambda _b \end{aligned}$$
(18)

Similarly, one can derive the intensity of \(PPP_{Ord,leg}\) as

$$\begin{aligned} \lambda _{Ord,leg} = (1-p_{opt})(1- \frac{m}{n}) \lambda _b \end{aligned}$$
(19)

Denoting the number of \(PPP_{Ord,leg}\) process points in each Voronoi cell by the random variable \(N_{Ord,leg}\) and applying the results of [5], we get:

$$\begin{aligned} \mathbb {E}[N_{Ord,leg}|N=n]&\approx \mathbb {E}[N_{Ord,leg}] = \frac{\lambda _{Ord,leg}}{\lambda _{CH} } =\frac{(1-p_{opt})(n-m) }{ p_{opt}(n-m) + mp_m} \end{aligned}$$
(20)

where \(\mathbb {E}\) denotes expected value operation.

Since there are m malicious nodes and each of them becomes a clusterhead with probability \(p_m\), there are on expectation \(mp_m\) cells having a malicious clusterhead. As a result, the expected number of legitimate ordinary nodes belonging to clusters with a malicious clusterhead is:

$$\begin{aligned} L_m = mp_m\mathbb {E}[N_{Ord,leg}|N=n] \end{aligned}$$
(21)

On the other hand, there are a total of \(L_{leg} = (n-m)(1-p_{opt})\) legitimate ordinary nodes on expectation. Hence, one can compute the percentage of legitimate ordinary nodes served by a malicious clusterhead under attack model 1 from:

$$\begin{aligned} q_{affected} = \frac{L_m}{L_{leg}} = \frac{mp_m }{ p_{opt}(n-m) + mp_m} \end{aligned}$$
(22)

From (22), more than \(50\%\) of legitimate ordinary nodes would belong to clusters with malicious clusterheads if the fraction of the compromised nodes satisfies:

$$\begin{aligned} \frac{m}{n} \ge \frac{p_{opt}}{p_m+p_{opt}} \end{aligned}$$
(23)

Alternatively, for a given n and m, an adversary causes more than \(50\%\) of legitimate ordinary nodes to belong to clusters with malicious clusterheads if it sets its probability of becoming volunteer clusterhead to:

$$\begin{aligned} p_m \ge (\frac{n}{m}-1)p_{opt} \end{aligned}$$
(24)

B Proof of Theorem 2

Proof

Before any attack has been launched (i.e. nodes become clusterhead with probability of \(p_{opt}\)), clusterheads and ordinary nodes form two homogeneous, independent, non-overlapping spatial Poisson point processes with intensities of \(p_{opt}\lambda _b\) and \( (1-p_{opt})\lambda _b\), respectively. Consequently, one can derive the expected number of ordinary nodes in each cluster in an attack-free system from [5]:

$$\begin{aligned} \mathbb {E}[N_{Ord,Afree}|N=n] \approx \frac{\lambda _{Ord,Afree}}{\lambda _{CH,Afree} }= \frac{(1-p_{opt})}{ p_{opt}} \end{aligned}$$
(25)

Now consider a system under attack model 2. Similar to the analysis presented in Appendix A, legitimate clusterheads form a spatial Poisson process:

$$\begin{aligned} PPP_{CH,leg}: \lambda _{CH,leg} = p_{opt} (1- \frac{m}{n})\lambda _{b} \end{aligned}$$
(26)

Legitimate ordinary nodes and malicious ordinary nodes are two independent non-overlapping point processes, and hence, their union is also a spatial Poisson point process, \(PPP_{ord}\):

$$\begin{aligned} PPP_{ord} = PPP_{ord,leg} \cup PPP_{ord,mal} \end{aligned}$$
(27)

And hence:

$$\begin{aligned} \lambda _{Ord} = \lambda _{ord,leg} + \lambda _{ord,mal} = (1-p_{opt})(1- \frac{m}{n})\lambda _b + (1- p_m) \frac{m}{n} \lambda _b \end{aligned}$$
(28)

Denote the number of ordinary nodes in each cluster under attack model 2 by the random variable \(N_{Ord,Amodel2}\). Then:

$$\begin{aligned} \mathbb {E}[N_{Ord,Amodel2}|N=n] \approx \frac{\lambda _{Ord}}{\lambda _{CH,leg} }= \frac{(1-p_{opt})(n-m)+(1-p_m)m}{ p_{opt}(n-m)} \end{aligned}$$
(29)

Therefore, the ratio is computed from:

$$\begin{aligned} \frac{\mathbb {E}[N_{Ord,Amodel2}|N=n]}{ \mathbb {E}[N_{Ord,Afree}|N=n] }= \frac{(n-m)+(1-p_m)m}{(n-m)} \end{aligned}$$
(30)

According to [6], \(p_{opt}\) is very small for networks with density higher than 10. Since the attacker selects a \(p_m\) even smaller than \(p_{opt}\) under attack model 2, one can approximate this ratio by:

$$\begin{aligned} \frac{\mathbb {E}[N_{Ord,Amodel2}|N=n]}{ \mathbb {E}[N_{Ord,Afree}|N=n] }\approx \frac{1}{(1-\frac{m}{n})}, \quad m\ne n \end{aligned}$$
(31)

C Proof of Theorem 3

Proof

By applying the results of [6], the total energy to send 1 unit of data to the clusterhead by ordinary nodes of a Voronoi cell in an attack-free system (\(C_1^{Afree}\)) is computed from:

$$\begin{aligned} \mathbb {E}[C_1^{Afree}|N=n] \approx \frac{\lambda _{Ord,Afree}}{2r\lambda _{CH,Afree}^{3/2}} = \frac{(1-p_{opt})}{2rp_{opt}^{3/2}\lambda _b^{1/2}} \end{aligned}$$
(32)

Likewise, for a system under attack model 2, one can calculate the expected value of the total energy spent by legitimate ordinary nodes in a cluster to send a unit of data to the clusterhead, \(C_1^{Amodel2}\) by:

$$\begin{aligned} \mathbb {E}[C_1^{Amodel2}|N=n] \approx \frac{\lambda _{Ord,leg}}{2r\lambda _{CH}^{3/2}} = \frac{(1-p_{opt})(1-\frac{m}{n})}{2r(p_{opt}(1-\frac{m}{n}) + p_m\frac{m}{n})^{3/2}\lambda _b^{1/2}} \end{aligned}$$
(33)

By assuming \(p_m\) is much smaller than \(p_{opt}\), we approximate the total energy spent by legitimate ordinary nodes in a cluster under attack model 2 by:

$$\begin{aligned} \mathbb {E}[C_1^{Amodel2}|N=n] \approx \frac{(1-p_{opt})}{2rp_{opt}^{3/2}[(1-\frac{m}{n})\lambda _b]^{1/2}} \end{aligned}$$
(34)

Hence, the ratio of \(\mathbb {E}[C_1^{Amodel2}|N=n]\) to \(\mathbb {E}[C_1^{Afree}|N=n]\) is computed from:

$$\begin{aligned} \frac{\mathbb {E}[C_1^{Amodel2}|N=n]}{ \mathbb {E}[C_1^{Afree}|N=n]} \approx \frac{1}{(1-\frac{m}{n})^{1/2}}, \quad m\ne n \end{aligned}$$
(35)

Rights and permissions

Reprints and permissions

Copyright information

© 2020 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Saghaian N. E., S.M., La Porta, T., Silvestri, S., McDaniel, P. (2020). Improving Robustness of a Popular Probabilistic Clustering Algorithm Against Insider Attacks. In: Park, N., Sun, K., Foresti, S., Butler, K., Saxena, N. (eds) Security and Privacy in Communication Networks. SecureComm 2020. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 335. Springer, Cham. https://doi.org/10.1007/978-3-030-63086-7_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-63086-7_21

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-63085-0

  • Online ISBN: 978-3-030-63086-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics