Abstract
Many clustering algorithms for mesh, ad hoc and Wireless Sensor Networks have been proposed. Probabilistic approaches are a popular class of such algorithms. However, it is essential to analyze their robustness against security compromise. We study the robustness of EEHCA, a popular energy efficient clustering algorithm as an example of probabilistic class in terms of security compromise. In this paper, we investigate attacks on EEHCA through analysis and experimental simulations. We analytically characterize two different attack models. In the first attack model, the attacker aims to gain control over the network by stealing network traffic, or by disrupting the data aggregation process (integrity attack). In the second attack model, the inducement of the attacker is to abridge the network lifetime (denial of service attack). We assume the clustering algorithm is running periodically and propose a detection solution by exploiting Bernoulli CUSUM charts.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
To find such a \(p_{1,a}\), Newton-Raphson method with starting point of \(p_1\) for solving the nonlinear equation quickly converges to a solution.
- 2.
Newton-Raphson method with starting point \(h_0^*\) in the range \(4 \le h_0^*\le 8\) for increase detection scenario or starting point \(h_0^*\) in \(-4 \le h_0^*\le -8\) for decrease detection case can be adopted to solve the nonlinear equation.
References
Abbasi, A.A., Younis, M.: A survey on clustering algorithms for wireless sensor networks. Comput. Commun. 30(14), 2826–2841 (2007)
Agresti, A.: An Introduction to Categorical Data Analysis. Wiley Series in Probability and Statistics. Wiley, Hoboken (2007)
Al-Karaki, J.N., Kamal, A.E.: Routing techniques in wireless sensor networks: a survey. Wireless Commun. 11(6), 6–28 (2004)
Andersson, E., Bock, D., Frisén, M.: Some statistical aspects of methods for detection of turning points in business cycles. J. Appl. Stat. 33(3), 257–278 (2006)
Baccelli, F., Zuyev, S.: Poisson-Voronoi spanning trees with applications to the optimization of communication networks. Oper. Res. 47(4), 619–631 (1999)
Bandyopadhyay, S., Coyle, E.J.: An energy efficient hierarchical clustering algorithm for wireless sensor networks. In: INFOCOM 2003, Twenty-Second Annual Joint Conference of the IEEE Computer and Communications, IEEE Societies, vol. 3, pp. 1713–1723. IEEE (2003)
Chiu, S.N., Stoyan, D., Kendall, W.S., Mecke, J.: Stochastic Geometry and Its Applications. Wiley, Hoboken (2013)
Choi, J., Lee, C.: Energy consumption and lifetime analysis in clustered multi-hop wireless sensor networks using the probabilistic cluster-head selection method. EURASIP J. Wireless Commun. Netw. 2011(1), 1–13 (2011)
Hawkins, D.M., Olwell, D.H.: Cumulative Sum Charts and Charting for Quality Improvement. Statistics for Engineering and Physical Science. Springer, New York (1998). https://doi.org/10.1007/978-1-4612-1686-5
Heinzelman, W.R., Chandrakasan, A., Balakrishnan, H.: Energy-efficient communication protocol for wireless microsensor networks. In: Proceedings of the 33rd Annual Hawaii International Conference on System Sciences 2000, p. 10. IEEE (2000)
Kang, C.W., Kvam, P.H.: Shewhart control charts. In: Basic Statistical Tools for Improving Quality, pp. 97–124 (2011)
Liu, F., Cheng, X., Chen, D.: Insider attacker detection in wireless sensor networks. In: INFOCOM 2007, 26th IEEE International Conference on Computer Communications, pp. 1937–1945. IEEE (2007)
Liu, X.: A survey on clustering routing protocols in wireless sensor networks. Sensors 12(8), 11113–11153 (2012)
Page, E.: Continuous inspection schemes. Biometrika 41, 100–115 (1954)
Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: SPINS: security protocols for sensor networks. Wireless Netw. 8(5), 521–534 (2002). https://doi.org/10.1023/A:1016598314198
Poor, H.V., Hadjiliadis, O.: Quickest Detection, vol. 40. Cambridge University Press, Cambridge (2009)
Reynolds, M.R.: The Bernoulli CUSUM chart for detecting decreases in a proportion. Qual. Reliab. Eng. Int. 29(4), 529–534 (2013)
Reynolds, M.R., Stoumbos, Z.G.: A general approach to modeling CUSUM charts for a proportion. IIE Trans. 32(6), 515–535 (2000)
Reynolds Jr., M.R., Stoumbos, Z.G.: A CUSUM chart for monitoring a proportion when inspecting continuously. J. Qual. Technol. 31(1), 87–108 (1999)
Sego, L.H.: Applications of control charts in medicine and epidemiology. Ph.D. thesis, Virginia Polytechnic Institute and State University (2006)
Stoto, M.A., et al.: Evaluating statistical methods for syndromic surveillance. In: Wilson, A.G., Wilson, G.D., Olwell, D.H. (eds.) Statistical Methods in Counterterrorism, pp. 141–172. Springer, New York (2006). https://doi.org/10.1007/0-387-35209-0_9
Tartakovsky, A.G., Rozovskii, B.L., Shah, K.: A nonparametric multichart CUSUM test for rapid intrusion detection. In: Proceedings Joint Statistical Meetings, 7–11 August 2005
Wang, H., Sheng, B., Li, Q.: Elliptic curve cryptography-based access control in sensor networks. Int. J. Secur. Netw. 1(3–4), 127–137 (2006)
Xie, M., Han, S., Tian, B., Parvin, S.: Anomaly detection in wireless sensor networks: a survey. J. Netw. Comput. Appl. 34(4), 1302–1325 (2011)
Younis, O., Fahmy, S.: HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks. IEEE Trans. Mob. Comput. 3(4), 366–379 (2004)
Zhang, Y., Yang, L.T., Chen, J.: RFID and Sensor Networks: Architectures, Protocols, Security, and Integrations. CRC Press, Boca Raton (2009)
Acknowledgments
Research was sponsored by the Army Research Laboratory and was accomplished under Cooperative Agreement Number W911NF-13-2-0045 (ARL Cyber Security CRA). The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the Army Research Laboratory or the U.S. Government. The U.S. Government is authorized to reproduce and distribute reprints for Government purposes notwithstanding any copyright notation herein.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Appendices
A Proof of Theorem 1
Proof
Suppose a realization of the random point process \(\varPhi _b\) with number of nodes equal to \(N=n\) is given. Arbitrarily compromise m nodes independent of location and each other under attack model 1. One can consider compromising nodes as a p-thinning operation with \(p_r = 1- \frac{m}{n}\). As a result, legitimate nodes and malicious nodes are distributed independently according to a homogeneous spatial Poisson point processes (PPP):
Legitimate nodes become volunteer clusterheads with probability of \(p_{opt}\). Hence, legitimate clusterheads and legitimate ordinary nodes are distributed as independent homogeneous spatial Poisson point processes:
Malicious nodes become volunteer clusterheads with probability of \(p_m\) and therefore, malicious clusterheads are distributed as a homogeneous spatial Poisson point process:
It should be noted that \(PPP_{mal}\) and \(PPP_{leg}\) are non-overlapping and independent and hence, \(PPP_{CH,mal}\) and \(PPP_{CH,leg}\) are independent non-overlapping point processes. Consequently, one can apply the Superposition operation and define:
which is a spatial Poisson point process with intensity of:
Similarly, one can derive the intensity of \(PPP_{Ord,leg}\) as
Denoting the number of \(PPP_{Ord,leg}\) process points in each Voronoi cell by the random variable \(N_{Ord,leg}\) and applying the results of [5], we get:
where \(\mathbb {E}\) denotes expected value operation.
Since there are m malicious nodes and each of them becomes a clusterhead with probability \(p_m\), there are on expectation \(mp_m\) cells having a malicious clusterhead. As a result, the expected number of legitimate ordinary nodes belonging to clusters with a malicious clusterhead is:
On the other hand, there are a total of \(L_{leg} = (n-m)(1-p_{opt})\) legitimate ordinary nodes on expectation. Hence, one can compute the percentage of legitimate ordinary nodes served by a malicious clusterhead under attack model 1 from:
From (22), more than \(50\%\) of legitimate ordinary nodes would belong to clusters with malicious clusterheads if the fraction of the compromised nodes satisfies:
Alternatively, for a given n and m, an adversary causes more than \(50\%\) of legitimate ordinary nodes to belong to clusters with malicious clusterheads if it sets its probability of becoming volunteer clusterhead to:
B Proof of Theorem 2
Proof
Before any attack has been launched (i.e. nodes become clusterhead with probability of \(p_{opt}\)), clusterheads and ordinary nodes form two homogeneous, independent, non-overlapping spatial Poisson point processes with intensities of \(p_{opt}\lambda _b\) and \( (1-p_{opt})\lambda _b\), respectively. Consequently, one can derive the expected number of ordinary nodes in each cluster in an attack-free system from [5]:
Now consider a system under attack model 2. Similar to the analysis presented in Appendix A, legitimate clusterheads form a spatial Poisson process:
Legitimate ordinary nodes and malicious ordinary nodes are two independent non-overlapping point processes, and hence, their union is also a spatial Poisson point process, \(PPP_{ord}\):
And hence:
Denote the number of ordinary nodes in each cluster under attack model 2 by the random variable \(N_{Ord,Amodel2}\). Then:
Therefore, the ratio is computed from:
According to [6], \(p_{opt}\) is very small for networks with density higher than 10. Since the attacker selects a \(p_m\) even smaller than \(p_{opt}\) under attack model 2, one can approximate this ratio by:
C Proof of Theorem 3
Proof
By applying the results of [6], the total energy to send 1 unit of data to the clusterhead by ordinary nodes of a Voronoi cell in an attack-free system (\(C_1^{Afree}\)) is computed from:
Likewise, for a system under attack model 2, one can calculate the expected value of the total energy spent by legitimate ordinary nodes in a cluster to send a unit of data to the clusterhead, \(C_1^{Amodel2}\) by:
By assuming \(p_m\) is much smaller than \(p_{opt}\), we approximate the total energy spent by legitimate ordinary nodes in a cluster under attack model 2 by:
Hence, the ratio of \(\mathbb {E}[C_1^{Amodel2}|N=n]\) to \(\mathbb {E}[C_1^{Afree}|N=n]\) is computed from:
Rights and permissions
Copyright information
© 2020 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Saghaian N. E., S.M., La Porta, T., Silvestri, S., McDaniel, P. (2020). Improving Robustness of a Popular Probabilistic Clustering Algorithm Against Insider Attacks. In: Park, N., Sun, K., Foresti, S., Butler, K., Saxena, N. (eds) Security and Privacy in Communication Networks. SecureComm 2020. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 335. Springer, Cham. https://doi.org/10.1007/978-3-030-63086-7_21
Download citation
DOI: https://doi.org/10.1007/978-3-030-63086-7_21
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-63085-0
Online ISBN: 978-3-030-63086-7
eBook Packages: Computer ScienceComputer Science (R0)