Information technology in system analysis
Methods and models of system analysis
NONLINEAR DYNAMICAL SISTEMS
Risk management and safety
V.I. Vasilyev, A.M. Vulfin, V.M. Kartak, A.D. Kirillova, K.V. Mironov System of attacks detection in wireless sensor networks of Industrial Internet of Things
V.I. Vasilyev, A.M. Vulfin, V.M. Kartak, A.D. Kirillova, K.V. Mironov System of attacks detection in wireless sensor networks of Industrial Internet of Things

Abstract.

The aim of the study is to improve the performance of the network attack detection system through the use of neural network analysis algorithms for network traffic in a wireless sensor network of industrial monitoring and control. The tasks of developing a block diagram of a network attack detection system and intelligent network traffic analysis algorithms are being solved. The evaluation of the effectiveness of the proposed algorithm for analysis of field data was performed.

Keywords:

network attack detection system, wireless sensor networks, data mining

PP. 70-78.

DOI: 10.14357/20790279190409

References

1. Greengard, S. 2015. The internet of things. MIT Press. 232 p.
2. Zaramenskih E. and I. Artemev. 2017. Internet veshhej. Issledovanija i oblast’ primenenija [Internet of Things. Research and scope]. Izdatel’stvo Infra-M. 188 p.
3. Roth, A. 2016. Einführung und Umsetzung von Industrie 4.0. Grundlagen, Vorgehensmodell und Use Cases aus der Praxis. Springer Gabler Verlag, Wiesbaden. 272 p.
4. Almomani, I., B. Al-Kasasbeh and M. Al-Akhras. 2016. WSN-DS: a dataset for intrusion detection systems in wireless sensor networks. Journal of Sensors, Vol. 2016.
5. Finogeev, А. 2016. Marshrutizacija i zashhita dannyh v besprovodnyh sensornyh setjah [Routing and data protection in wireless sensor networks]. Lambert Academic Publishing. 96 p.
6. Akyildiz, I.F. et al. 2002. Wireless sensor networks: a survey. Computer networks, 4(38): 393–422.
7. Voskov, L.S. 2009. Besprovodnye sensornye seti i prikladnye proekty [Wireless sensor networks and application projects]. Avtomatizacija i IT v jenergetike [Automation and IT in the energy sector], 2-3(2-3): 44–49.
8. Terent’ev, M.N. 2008. Besprovodnye sensornye seti: uchebnoe posobie [Wireless sensor networks]. Izdatel’stvo MAI. 95 p.
9. Yick, J., B. Mukherjee and D. Ghosal. 2008. Wireless sensor network survey. Computer networks, 12(52): 2292–2330.
10. Kalachev, A.V. 2016. Apparatnye i programmnye reshenija dlja besprovodnyh sensornyh setej [Hardware and software solutions for wireless sensor networks]. NOU “INTUIT”. 240 p.
11. Pathan, A.S.K., H.W. Lee and C.S. Hong. 2006. Security in wireless sensor networks: issues andchallenges. 8th International Conference Advanced Communication Technology, ICACT 2006, 2: 1043–1048.
12. Smirnova, E.V., E.A. Romashkina, A.V. Proletarskij. 2017. Tehnologija sovremennyh besprovodnyh setej Wi-Fi [Technology of modern wireless networks Wi-Fi]. MGTU im. N.Je.Baumana. 448 p.
13. Shherbakov, V.B., S.A. Ermakov. 2010. Bezopasnost’ besprovodnyh setej. Standart IEEE 802.11. [Wireless security. IEEE 802.11 standard.] Izdatel’stvo RadioSoft. 256 p.
14. Pathan, A.S.K. 2016. Security of self-organizing networks: MANET, WSN, WMN, VANET. CRC press. 638 p.
15. Chelli, K. 2015. Security issues in wireless sensor networks: Attacks and countermeasures. Proceedings of the World Congress on Engineering, London, U.K., 2015, 1: 1–3.
16. Loo, J., J.L. Mauri and J.H. Ortiz. 2016. Mobile ad hoc networks: current status and future trends. CRC Press. 538 p.
17. Sinha, P. et al. 2017. Security vulnerabilities, attacks and countermeasures in wireless sensor networks at various layers of OSI reference model: A survey. IEEE International Conference on Signal Processing and Communication (ICSPC), Coimbatore,  Tamil Nadu, India, 2017. 288–293.
18. IEEE 802.15.4-2003 IEEE Standard for Information technology – Telecommunications and information exchange between systems – Local and metropolitan area networks – Specific requirements. Available at: https://ieeexplore.ieee.org/document/1237559 (accessed March 26, 2019).
19. Can, O., O.K. Sahingoz. 2015. A survey of intrusion detection systems in wireless sensor networks. In the 6th International Conference on Modeling, Simulation, and Applied Optimization (ICMSAO), Istanbul, Turkey, 2015. 1–6.
20. Al-Dabbagh, A.W., Y. Li, T. Chen. 2018. An intrusion detection system for cyber attacks in wireless networked control systems. IEEE Transactions on Circuits and Systems II: Express Briefs, 8(65): 1049–1053.
21. Almomani and B. Al-Kasasbeh. 2015. Performance analysis of LEACH protocol under Denial of Service attacks. Proceedings of the 6th IEEE International Conference on Information and Communication Systems (ICICS ’15), Amman, Jordan, April 2015. 292–297.
22. Nikolenko, S., A. Kadurin, E. Arhangel’skaja. 2018. Glubokoe obuchenie. Pogruzhenie v mir nejronnyh setej [Deep learning. Immersion in the world of neural networks]. Izdatel’stvo: Piter. 480 p.
23. Flach, P. 2012. Machine learning: the art and science of algorithms that make sense of data. Cambridge University Press. 410 p.
 

2024-74-1
2023-73-4
2023-73-3
2023-73-2

© ФИЦ ИУ РАН 2008-2018. Создание сайта "РосИнтернет технологии".