A Novel Diagnosis Scheme against Collusive False Data Injection Attack
<p>A CFDIA against a toy WSN, where each black circle (resp. red circle) represents a normal node (resp. compromised node), each edge represents the two associated nodes which are within each other’s communication range, and “0” (resp. “1”) represents that there is (resp. there is no) a spatial–temporal correlation between the two associated nodes.</p> "> Figure 2
<p>(<b>a</b>) The confidence region <math display="inline"><semantics><mrow><msubsup><mover accent="true"><mo>Γ</mo><mo>¯</mo></mover><mrow><mi>i</mi><mi>j</mi></mrow><mrow><mn>1</mn><mo>−</mo><mi>θ</mi></mrow></msubsup><mrow><mo>(</mo><mi>t</mi><mo>)</mo></mrow></mrow></semantics></math> with the confidence degree <math display="inline"><semantics><mrow><mn>1</mn><mo>−</mo><mi>θ</mi></mrow></semantics></math>. (<b>b</b>) A glance of a CFDIA, where the point <span class="html-italic">A</span> represents the values of <math display="inline"><semantics><mrow><msub><mi>r</mi><mi>i</mi></msub><mrow><mo>(</mo><mi>t</mi><mo>)</mo></mrow></mrow></semantics></math> and <math display="inline"><semantics><mrow><msub><mi>r</mi><mi>j</mi></msub><mrow><mo>(</mo><mi>t</mi><mo>)</mo></mrow></mrow></semantics></math>, and the point <span class="html-italic">B</span> represents the false values of <math display="inline"><semantics><mrow><msub><mi>r</mi><mi>i</mi></msub><mrow><mo>(</mo><mi>t</mi><mo>)</mo></mrow></mrow></semantics></math> and <math display="inline"><semantics><mrow><msub><mi>r</mi><mi>j</mi></msub><mrow><mo>(</mo><mi>t</mi><mo>)</mo></mrow></mrow></semantics></math>.</p> "> Figure 3
<p>Distribution of <math display="inline"><semantics><msub><mi>V</mi><mn>1</mn></msub></semantics></math> and 9 watchdogs, where each red dot (resp. black dot) represents the watchdog (resp. sensor node), and each red circle represents the communication range of a watchdog.</p> "> Figure 4
<p>Effectiveness of the three diagnosis algorithms in experiment 1. (<b>a</b>) Diagnosis accuracy in the CFDIA situation. (<b>b</b>) False positive rate in the CFDIA situation. (<b>c</b>) False negative rate in the CFDIA situation. (<b>d</b>) Diagnosis accuracy in the SFDIA situation. (<b>e</b>) False positive rate in the SFDIA situation. (<b>f</b>) False negative rate in the SFDIA situation.</p> "> Figure 5
<p>Effectiveness of the CFDIA-DIAG diagnosis algorithms in experiment 2. (<b>a</b>) Diagnosis accuracy in the CFDIA situation. (<b>b</b>) False positive rate in the CFDIA situation. (<b>c</b>) False negative rate in the CFDIA situation. (<b>d</b>) Diagnosis accuracy in the SFDIA situation. (<b>e</b>) False positive rate in the SFDIA situation. (<b>f</b>) False negative rate in the SFDIA situation.</p> "> Figure 6
<p>Effectiveness of the three diagnosis algorithms in experiment 3. (<b>a</b>) Diagnosis accuracy in the CFDIA situation. (<b>b</b>) False positive rate in the CFDIA situation. (<b>c</b>) False negative rate in the CFDIA situation. (<b>d</b>) Diagnosis accuracy in the SFDIA situation. (<b>e</b>) False positive rate in the SFDIA situation. (<b>f</b>) False negative rate in the SFDIA situation.</p> ">
Abstract
:1. Introduction
1.1. Problem Formulation
1.2. Main Contributions
- We define a new kind of false data injection attack to WSNs, i.e., a conclusive false data injection attack (CFDIA), and we propose a new problem (i.e., the CFDIA diagnosis problem) aiming to identify the compromised sensors in a WSN under a CFDIA.
- We establish an autoregressive moving average (ARMA) model for predicting the current reading of a sensor using its historical readings. Based on the prediction model and by employing the principal component analysis (PCA) technique, we establish a model for judging if an adjacent pair of sensors are consistent in terms of their readings.
- Inspired by the system-level fault diagnosis, we introduce a set of watchdogs in the WSN under CFDIA as comparators between adjacent pairs of sensors within their respective communication range. These watchdogs deliver their respective collections of consistency outcomes to the base station. The base station collects all the received consistency outcomes to form a complete syndrome.
- We design an algorithm for identifying the abnormal sensors based on the complete syndrome. Through extensive simulation experiments, we conclude that the diagnosis algorithm achieves a higher probability of correct diagnosis.
2. Related Work
2.1. System-Level Fault Diagnosis
2.2. FDIAs Detection of WSNs
3. Preliminary Knowledge
3.1. WSNs with Watchdogs
3.2. Collusive False Data Injection Attack
3.3. Autoregressive Moving Average Models
3.4. Principal Component Analysis
4. A Diagnosis Scheme against CFDIA
- Phase I: Syndrome generation. In this phase, each watchdog collects a set of readings of the sensors monitored by the watchdog and conducts a spatio-temporal correlation analysis between each adjacent pair of sensors, forming a partial syndrome. All the watchdogs deliver their own partial syndromes directly to the base station. A (complete) syndrome is generated by merging the partial syndromes.
- Phase II: CFDIA Diagnosis. Taking the syndrome as input, perform an algorithm for diagnosing a CFDIA. As a result, the compromised nodes are identified.
4.1. Syndrome Generation
4.1.1. Consistency Criterion
4.1.2. Syndrome and Partial Syndrome
- If u and v are both normal, then with probability .
- If one of u and v is normal and the other is abnormal, then with probability .
- If u and v are both abnormal, then or 1.
4.2. CFDIA Diagnosis
- 1.
- implies u and v are either both normal with a higher probability (w.h.p.) or both abnormal w.h.p.
- 2.
- implies at least one of u and v is abnormal w.h.p.
- 1.
- For , either (i) the nodes in are all normal w.h.p., or (ii) the nodes in are all abnormal w.h.p.
- 2.
- If there is a 1-edge connecting with , then either (i) the nodes in are all normal and the nodes in are all abnormal w.h.p, or (ii) the nodes in are all abnormal and the nodes in are all normal w.h.p.
Algorithm 1 CFDIA-DIAG. |
Input: A WSN under CFDIA, a syndrome on G. |
Output: A subset that is diagnosed to be the set of abnormal nodes. |
|
5. Effectiveness of the Proposed Diagnosis Algorithm
5.1. Metrics of Effectiveness of a Diagnosis Algorithm
- 1.
- The diagnosis accuracy of with respect to (w.r.t.) is defined as
- 2.
- The false positive rate of w.r.t. is defined as
- 3.
- The false negative rate of w.r.t. is defined as
5.2. Experiment Preparation
5.3. Experiments and Analysis of Experimental Results
- 1.
- For each , running CFDIA-DIAG, Random-Search, and Correlation-Voting on , we obtain their , , and , which are shown in Figure 4a–c. It is seen that (i) the diagnosis accuracy of CFDIA-DIAG is higher than those of the other two algorithms, and (ii) the false positive rate and false negative rate of CFDIA-DIAG is lower than those of the other two algorithms. Hence, we conclude that CFDIA-DIAG is more effective than the other two algorithms in the CFDIA situation.
- 2.
- For each , running CFDIA-DIAG, Random-Search, and Correlation-Voting on , we obtain their , , and , which are shown in Figure 4d–f. It is seen that (i) the diagnosis accuracy of CFDIA-DIAG is higher than those of the other two algorithms, and (ii) the false positive rate and false negative rate of CFDIA-DIAG is lower than those of the other two algorithms. Hence, we conclude that CFDIA-DIAG is more effective than the other two algorithms in the SFDIA situation.
- 1.
- For each and each , running CFDIA-DIAG on , we obtain its , , and , which are shown in Figure 5a–c. It is seen that (i) the diagnosis accuracy of CFDIA-DIAG is higher when run on denser WSNs, and (ii) the false positive rate and false negative rate of CFDIA-DIAG is lower when run on denser WSNs. Hence, we conclude that in the CFDIA situation, CFDIA-DIAG is more effective when run on dense WSNs.
- 2.
- For each and each , running CFDIA-DIAG on , we obtain its , , and , which are shown in Figure 5d–f. It is seen that (i) the diagnosis accuracy of CFDIA-DIAG is higher when run on denser WSNs, and (ii) the false positive rate and false negative rate of CFDIA-DIAG is lower when run on denser WSNs. Hence, we conclude that in the SFDIA situation, CFDIA-DIAG is more effective when run on dense WSNs.
- 1.
- For each , running CFDIA-DIAG, Random-Search, and Correlation-Voting on , we obtain their , , and , which are shown in Figure 6a–c. It is seen that (i) the diagnosis accuracy of CFDIA-DIAG is higher than those of the other two algorithms, and (ii) the false positive rate and false negative rate of CFDIA-DIAG is lower than those of the other two algorithms. Again, we conclude that CFDIA-DIAG is more effective than the other two algorithms in the CFDIA situation.
- 2.
- For each , running CFDIA-DIAG, Random-Search, and Correlation-Voting on , we obtain their , , and , which are shown in Figure 6d–f. It is seen that (i) the diagnosis accuracy of CFDIA-DIAG is higher than those of the other two algorithms, and (ii) the false positive rate and false negative rate of CFDIA-DIAG is lower than those of the other two algorithms. Additionally, we conclude that CFDIA-DIAG is more effective than the other two algorithms in the SFDIA situation.
6. Conclusions and Future Work
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Forster, A. Introduction to Wireless Sensor Networks; Wiley-IEEE Press: Hoboken, NJ, USA, 2016. [Google Scholar]
- El Emary, I.M.M.; Ramakrishnan, S. (Eds.) Wireless Sensor Networks: From Theory to Applications; CRC Press: Boca Raton, FL, USA, 2013. [Google Scholar]
- Zhou, Y.; Fang, Y.; Zhang, Y. Securing wireless sensor networks: A survey. IEEE Commun. Surv. Tutor. 2008, 10, 6–28. [Google Scholar] [CrossRef]
- Rani, A.; Kumar, S. A survey of security in wireless sensor networks. In Proceedings of the 3rd International Conference on CICT, Ghaziabad, India, 9–10 February 2017; pp. 1–5. [Google Scholar]
- Mostefa, B.; Abdelkader, G. A survey of wireless sensor network security in the context of Internet of Things. In Proceedings of the 2017 4th International Conference on ICT-DM, Münster, Germany, 11–13 December 2017; pp. 1–8. [Google Scholar]
- Sagar, V.B.B.; Munjul, M. Security issues in wireless sensor network-A survey. J. Discret. Math. Sci. Cryptogr. 2021, 24, 1415–1427. [Google Scholar]
- Guan, Z.; Sun, N.; Xu, Y.; Yang, T. A comprehensive survey of false data injection in smart grid. Int. J. Wirel. Mob. Comput. 2015, 8, 27. [Google Scholar] [CrossRef]
- Ahmed, M.; Pathan, A.K. False data injection attack (FDIA): An overview and new metrics for fair evaluation of its countermeasure. Complex Adapt. Syst. Model. 2020, 8, 4. [Google Scholar] [CrossRef] [Green Version]
- Chen, P.; Yang, S.; McCann, J.A.; Lin, J.; Yang, X. Detection of false data injection attacks in smart-grid systems. IEEE Commun. Mag. 2015, 53, 206–213. [Google Scholar] [CrossRef] [Green Version]
- Illiano, V.P.; Lupu, E.C. Detecting malicious data injections in wireless sensor networks: A survey. ACM Comput. Surv. 2015, 48, 24. [Google Scholar] [CrossRef] [Green Version]
- Yang, L.; Ding, C.; Wu, M.; Wang, K. Robust detection of false data injection attacks for the data aggregation in Internet of Things-based environmental surveillance. Comput. Netw. 2017, 129, 410–428. [Google Scholar] [CrossRef]
- Sood, K.; Nosouhi, M.R.; Kumar, N.; Gaddam, A.; Feng, B.; Yu, S. Accurate detection of IoT sensor behaviors in legitimate, faulty and compromised scenarios. IEEE Trans. Dependable Secur. Comput. 2021, 20, 288–300. [Google Scholar] [CrossRef]
- Agrawal, S.; Das, M.L.; Lopez, J. Detection of node capture attack in wireless sensor networks. IEEE Syst. J. 2019, 13, 238–247. [Google Scholar] [CrossRef]
- Musleh, A.S.; Chen, G.; Dong, Z.Y. A Survey on the detection algorithms for false data injection attacks in smart grids. IEEE Trans. Smart Grid 2020, 11, 2218–2234. [Google Scholar] [CrossRef]
- Poornima, I.G.A.; Paramasivan, B. Anomaly detection in wireless sensor network using machine learning algorithm. Comput. Commun. 2020, 151, 331–337. [Google Scholar] [CrossRef]
- Liu, J.; Labeau, F. Detection of false data injection attacks in industrial wireless sensor networks exploiting network numerical sparsity. IEEE Trans. Signal Inf. Process. Over Netw. 2021, 7, 676–688. [Google Scholar] [CrossRef]
- Kreutzer, S.E.; Hakimi, S.L. System-level fault diagnosis: A survey. Microprocess. Microprogr. 1987, 20, 323–330. [Google Scholar] [CrossRef]
- Duarte, E.P.; Ziwich, R.P.; Albini, L.C.P. A survey of comparison-based system-level diagnosis. ACM Comput. Surv. 2011, 43, 22. [Google Scholar] [CrossRef]
- Lin, L.; Xu, L.; Chen, R.; Hsieh, S.; Wang, D. Relating extra connectivity and extra conditional diagnosability in regular networks. IEEE Trans. Dependable Secur. Comput. 2019, 16, 1086–1097. [Google Scholar] [CrossRef]
- Wei, C.; Chen, C.; Hsieh, S. Conditional (t,k)-diagnosis in regular and irregular graphs under the comparison diagnosis model. IEEE Trans. Dependable Secur. Comput. 2018, 15, 351–356. [Google Scholar] [CrossRef]
- Khilar, P.M.; Mahapatra, S. Intermittent fault diagnosis in wireless sensor networks. In Proceedings of the 10th International Conference on Information Technology (ICIT 2007), Rourkela, India, 17–20 December 2007; pp. 145–147. [Google Scholar]
- Weber, A.; Kutzke, A.R.; Chessa, S. Diagnosability evaluation for a system-level diagnosis algorithm for wireless sensor networks. In Proceedings of the ISCC, Riccione, Italy, 22–25 June 2010; pp. 241–244. [Google Scholar]
- Saha, T.; Mahapatra, S. Distributed fault diagnosis in wireless sensor networks. In Proceedings of the 2011 International Conference on Process Automation, Control and Computing, Coimbatore, India, 20–22 July 2011; pp. 1–5. [Google Scholar]
- Barros, M.d.; Weber, A. System-level diagnosis for WSN: A heuristic. In Proceedings of the 2016 17th Latin-American Test Symposium (LATS), Foz do Iguacu, Brazil, 6–8 April 2016; pp. 171–176. [Google Scholar]
- Chen, P.-Y.; Yang, S.; McCann, J.A. Distributed real-time anomaly detection in networked industrial sensing systems. IEEE Trans. Ind. Electron. 2014, 62, 3832–3842. [Google Scholar] [CrossRef] [Green Version]
- Illiano, V.P.; Steiner, R.V.; Lupu, E.C. Unity is strength! Combining attestation and measurements inspection to handle malicious data injections in wsns. In Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Boston, MA, USA, 18–20 July 2017; pp. 134–144. [Google Scholar]
- Aboelwafa, M.M.; Seddik, K.G.; Eldefrawy, M.H.; Gadallah, Y.; Gidlund, M. A machine-learning-based technique for false data injection attacks detection in industrial iot. IEEE Internet Things J. 2020, 7, 8462–8471. [Google Scholar] [CrossRef]
- Berjab, N.; Le, H.H.; Yokota, H. A spatiotemporal and multivariate attribute correlation extraction scheme for detecting abnormal nodes in wsns. IEEE Access 2021, 9, 135266–135284. [Google Scholar] [CrossRef]
- Huang, D.-W.; Liu, W.; Bi, J.C. Data tampering attacks diagnosis in dynamic wireless sensor networks. Comput. Commun. 2021, 172, 84–92. [Google Scholar] [CrossRef]
- Lai, Y.; Tong, L.; Liu, J.; Wang, Y.; Tong, T.; Zhao, Z.; Qin, H. Identifying malicious nodes in wireless sensor networks based on correlation detection. Comput. Secur. 2022, 113, 102540. [Google Scholar] [CrossRef]
- Bhuiyan, M.Z.A.; Wu, J. Collusion attack detection in networked systems. In Proceedings of the 2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC/PiCom/DataCom/CyberSciTech), Auckland, New Zealand, 8–12 August 2016; pp. 286–293. [Google Scholar]
- Illiano, V.P.; Muñoz-González, L.; Lupu, E.C. Don’t fool me!: Detection, characterisation and diagnosis of spoofed and masked events in wireless sensor networks. IEEE Trans. Dependable Secur. Comput. 2016, 14, 279–293. [Google Scholar] [CrossRef] [Green Version]
- Hau, Z.; Lupu, E.C. Exploiting correlations to detect false data injections in low-density wireless sensor networks. In Proceedings of the 5th on Cyber-Physical System Security Workshop, Auckland, New Zealand, 8 July 2019; pp. 1–12. [Google Scholar]
- Choi, B.S. ARMA Model Identification; Springer: Berlin/Heidelberg, Germany, 2012. [Google Scholar]
- Jolliffe, I.T.; Cadima, J. Principal component analysis: A review and recent developments. Philos. Trans. R. Soc. A 2015, 374, 20150202. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Yu, Z.; Chin, W. Blind false data injection attack using PCA approximation method in smart grid. IEEE Trans. Smart Grid 2015, 6, 1219–1226. [Google Scholar] [CrossRef]
- Ding, Y.; Liu, J. Real-time false data injection attack detection in energy internet using online robust principal component analysis. In Proceedings of the 2017 IEEE Conference on EI2, Beijing, China, 26–28 November 2017. [Google Scholar]
- Krakow Air Quality Data. Available online: https://www.kaggle.com/datascienceairly/air-quality-data-from-extensive-network-of-sensors (accessed on 4 July 2022).
- Elhadef, M.; Abrougui, K.; Das, S.; Nayak, A. A parallel probabilistic system-level fault diagnosis approach for large multiprocessor systems. Parallel Process. Lett. 2006, 16, 63–79. [Google Scholar] [CrossRef]
- Gritzalis, S.; Karygiannis, T.; Skianis, C. (Eds.) Security and Privacy in Mobile and Wireless Networking; Troubador Publishing Ltd.: Leicester, UK, 2009. [Google Scholar]
- Bendale, S.P.; Prasad, J.R. Security threats and challenges in future mobile wireless networks. In Proceedings of the 2018 IEEE GCWCN, Lonavala, India, 23–24 November 2018; pp. 146–150. [Google Scholar]
- Alpcan, T.; Basar, T. Network Security: A Decision and Game-Theoretic Approach; Cambridge University Press: Cambridge, UK, 2010. [Google Scholar]
- Shi, H.Y.; Wang, W.L.; Kwok, N.M.; Chen, S.Y. Game theory for wireless sensor networks: A survey. Sensors 2012, 12, 9055–9097. [Google Scholar] [CrossRef] [Green Version]
- Yang, L.X.; Li, P.; Zhang, Y.; Yang, X.; Xiang, Y.; Zhou, W. Effective repair strategy against advanced persistent threat: A differential game approach. IEEE Trans. Inf. Forensics Secur. 2019, 14, 1713–1728. [Google Scholar] [CrossRef]
- Yang, L.X.; Li, P.; Yang, X.; Tang, Y.Y. A risk management approach to defending against the advanced persistent threat. IEEE Trans. Dependable Secur. Comput. 2020, 17, 1163–1172. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Hu, J.; Yang, X.; Yang, L. A Novel Diagnosis Scheme against Collusive False Data Injection Attack. Sensors 2023, 23, 5943. https://doi.org/10.3390/s23135943
Hu J, Yang X, Yang L. A Novel Diagnosis Scheme against Collusive False Data Injection Attack. Sensors. 2023; 23(13):5943. https://doi.org/10.3390/s23135943
Chicago/Turabian StyleHu, Jiamin, Xiaofan Yang, and Luxing Yang. 2023. "A Novel Diagnosis Scheme against Collusive False Data Injection Attack" Sensors 23, no. 13: 5943. https://doi.org/10.3390/s23135943
APA StyleHu, J., Yang, X., & Yang, L. (2023). A Novel Diagnosis Scheme against Collusive False Data Injection Attack. Sensors, 23(13), 5943. https://doi.org/10.3390/s23135943