A Honeypot-assisted Industrial Control System to Detect Replication Attacks on Wireless Sensor Networks

Publish Year: 1401
نوع سند: مقاله ژورنالی
زبان: English
View: 192

This Paper With 6 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

JR_TDMA-11-3_004

تاریخ نمایه سازی: 26 دی 1401

Abstract:

Industrial Control Systems (ICSs), which work based on Wireless Sensor Networks (WSNs), are prone to hacking and attacks. In node simulation attacks against ICS networks, the enemy may capture a sensor node and then make multiple copies with the same identifier (ID), code, and encryption of the recorded node. Unfortunately, many Intrusion Detection Systems (IDSs)  are not efficient to detect clone attacks in ICSs. An alternative solution to improve the performance of early detection is a honeypot. This paper proposes a centralized architecture for detecting copy or clone nodes using a local multicast intrusion detection system. We divide the WSN into sections and give each one an inspector node. Each inspector node monitors its region and uses the node ID to identify clone nodes. We offer solutions for situations where the cluster-head is endangered. We also provide solutions for other cases where the natural node is compromised. Our evaluations show that the proposed system maximizes the detection probability and, at the same time, has a low connection overhead.

Keywords:

Intrusion Detection System , Honeypot , Industrial Control Systems (ICS) , WSN Replication Attacks

Authors

Abbasgholi Pashaei

Department of Electrical Engineering, Ahar Branch, Islamic, Azad University, Ahar, Iran

Mohammad Esmaeil Akbari

Department of Electrical Engineering, Ahar Branch, Islamic, Azad University, Ahar, Iran

Mina Zolfy Lighvan

Department of Electrical and Computer Engineering Faculty, Tabriz University, Tabriz, Iran

Asghar Charmin

Department of Electrical Engineering, Ahar Branch, Islamic, Azad University, Ahar, Iran

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • Zhu, W. T. (۲۰۱۱). Node Replication Attacks in Wireless Sensor ...
  • Wazir Zada Khan, M. Y. (۲۰۱۴). Detecting Replicated Nodes in ...
  • Sudipto, R., & Manisha, J. N. (۲۰۱۶). Prevention of Node ...
  • Umrao, S., Verma, D., & Kumar Tripathi, A. (۲۰۱۳). Detection ...
  • P.Abinaya, & C.Geetha. (۲۰۱۴). Dynamic Detection of Node Replication Attacks ...
  • Kaur, H., & Saxena, S. (۲۰۱۷, July ۳-۵). A Review ...
  • Farah, K., & Nabila, L. (۲۰۱۴). The MCD Protocol for ...
  • D.Sheela, Priyadarshini, & G.Mahadevan, D. (۲۰۱۱). EFFICIENT APPROACH TO DETECT ...
  • Yu, C.-M., Lu, C.-S., & Kuo, S.-Y. (۲۰۰۸). Mobile Sensor ...
  • Marjit Singh, M., Singh, A., & Mandal, J. K. (۲۰۱۴). ...
  • Pashaei, A., Akbari, M. E., Lighvan, M. Z., & Teymorzade, ...
  • N.S.Usha, & Anita, D. (۲۰۱۷). A NOVEL ZONE BASED ROUTING ...
  • Muraleedharan, R., & Ann Osadciw, L. (۲۰۰۹). An Intrusion Detection ...
  • نمایش کامل مراجع