Browse > Article

Intrusion Detection Scheme Using Traffic Prediction for Wireless Industrial Networks  

Wei, Min (Department of Computer Science and Engineering, Konkuk University, Key Laboratory of Industrial Internet of Things & Networked Control, Ministry of Education Chongqing University of Posts and Telecommunications)
Kim, Kee-Cheon (Department of Computer Science and Engineering, Konkuk University)
Publication Information
Abstract
Detecting intrusion attacks accurately and rapidly in wireless networks is one of the most challenging security problems. Intrusion attacks of various types can be detected by the change in traffic flow that they induce. Wireless industrial networks based on the wireless networks for industrial automation-process automation (WIA-PA) standard use a superframe to schedule network communications. We propose an intrusion detection system for WIA-PA networks. After modeling and analyzing traffic flow data by time-sequence techniques, we propose a data traffic prediction model based on autoregressive moving average (ARMA) using the time series data. The model can quickly and precisely predict network traffic. We initialized the model with data traffic measurements taken by a 16-channel analyzer. Test results show that our scheme can effectively detect intrusion attacks, improve the overall network performance, and prolong the network lifetime.
Keywords
Industrial wireless; intrusion detection; security; wireless networks for industrial automation-process automation (WIA-PA);
Citations & Related Records

Times Cited By Web Of Science : 0  (Related Records In Web of Science)
연도 인용수 순위
  • Reference
1 I. Demirkol, F. Alagoz, H. Delic, and C. Ersoy, "Wireless sensor networks for intrusion detection: Packet traffic modeling," IEEE Commun. Lett., vol. 10, pp. 22-24, Jan. 2006.   DOI   ScienceOn
2 IEC/PAS 62734, "Industrial Communication Networks-Fieldbus specifications-Wireless Systems for Industrial Automation: Process Control and Related Applications (based on ISA 100.11a)," Sept. 2011.
3 IEC 62591 Ed.1, "Industrial Communication Networks-Wireless Communication Network and Communication Profiles-$WirelessHART^{TM}$," Apr. 2010.
4 IEEE 802.15.4, "Information Technology-Telecommunications and Information Exchange between Systems-Local and Metropolitan Networks- Specific Requirements-Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low Rate Wireless Personal Area Networks (LR-WPANs)," 2006.
5 P. Wang and H. Wang, Heng Wang, and Min Xiang. The Technology of Wireless Communication for Measuring and Controlling, Beijing: Publishing House of Electronics Industry, Mar. 2008.
6 M. Wei, X. Zhang, W. Ping, K. Kim, and Y. Kim, "Research and implementation of the security method based on WIA-PA standard," in Proc. ICECE, China, Nov. 2010. pp. 1580-1585.
7 Y. Zhang and W. Lee, "Intrusion detection in wireless ad hoc networks," in Proc. the 6th MobiCom, USA, Aug. 2000, pp. 275-283.
8 J. Tian, Z. Zhang, and W. Zhao, "The design and research of intrusion detection system based on misuse and anomaly," J. Electron. Inf. Technol., vol. 28, pp. 2163-2166, Nov. 2006.
9 L. Lijun and L. Zhuowei, "A anomaly-based intrusion detection system in mobile wireless networks," Comput. Eng. Appl., vol. 42, pp. 165-167, July 2006.
10 T. Piya and J. Andrew, "Energy efficiency of intrusion detection systems in wireless sensor network," in Proc. IEEE/WIC/ACM Int. Conf. Web Intelligence and Intelligent Agent Technol., Dec. 2006, pp. 227-230.
11 S. Bo, Intrusion Detection in Moblie Ad Hoc Networks, Doctoral thesis, Texas A&M University, May 2004.
12 M. Guizani, A. Rayes, and B. Khan, Network Modeling and Simulation: A Practical Perspective, John Wiley & Sons, Ltd, Chichester, UK. Feb. 2010, pp. 260-261.
13 A. Willig, K. Matheus, and A. Wolisz, "Wireless technology in industrial networks," Proc. IEEE, vol. 93, pp. 1130-1151, June 2005.   DOI
14 M. Wei, P. Wang, and Q. Wang, "Research and implementation of the security strategy for the wireless industry control network," Chinese J. Sci. Instrument, vol. 30, pp. 679-681, Apr. 2009.
15 A. Willig, "Recent and emerging topics in wireless industrial communications: A selection," IEEE Trans Ind. Informat., vol. 4, pp. 102-124, May 2008.   DOI
16 IEC 6 601 Ed1, "Industrial communication networks-fieldbus specification-WIA-PA communication network and communication profile," Oct. 2011.
17 A. Lisa, The wireless network environment sensor: A technology independent sensor of faults in mobile wireless network links, Doctoral thesis, Rensselaer Polytechnic Institute Troy, New York, USA. Dec. 2002, pp. 21-29.
18 X. Wang, Q. Liu, and G. B. Giannakis, "Analyzing and optimizing adaptive modulation-coding jointly with ARQ for QoS-guaranteed traffic," IEEE Trans. Veh. Technol., vol. 56, pp. 710-720, Mar. 2007.   DOI
19 T. Q. Yang, "A time series data mining based on ARMA and hopfield model for intrusion detection," in Proc. Neural Netw. and Brain, China, Oct. 2005, pp. 1045-1049.
20 Q. Liu, S. Zhou, and G. B. Giannakis, "Queuing with adaptive modulation and coding over wireless links: Cross-layer analysis and design," IEEE Trans. Wireless Commun., vol. 4, pp. 1142-1153, May 2005.   DOI
21 A. Deshpande, C. Guestrin, and S. Madden, "Model-driven data acquisition in sensor networks," in Proc. the 30th VLDB Conf., Canada, Sept. 2004.
22 Q. Cao, T. Abdelzaher, T. He, and J. Stankovic, "Towards optimal sleep scheduling in sensor networks for rare event detection," in Proc. ISPN, USA, Apr. 2005, pp. 20-27.
23 S. J. Zhang and L. X. Qi, Time Series Analysis Simple Tutorial, Beijing: Tsinghua University Press, 2003, pp. 132-135.
24 D. Y. Uu, K. Yang, and J. Z. Chen, "Agents: Present status and trends," J. Software, vol. 11, pp. 315-321, Mar. 2000.
25 Y. E. Sagduyu and A. Ephremides, "The problem of medium access control in wireless sensor networks," IEEE Wireless Commun., vol. 11, pp. 44-53, June 2004.
26 H. Chan, A. Perrig, and D. Song, "Random key predistribution schemes for sensor networks," in Proc. IEEE Symp. Research in Security and Privacy, USA, May 2003, pp. 197-213.
27 L. Zhou, J. Ni, and C. V. Ravishankar, "Supporting secure communication and data collection in mobile sensor networksm," in Proc. IEEE INFOCOM, Spain, Apr. 2006, pp. 1-12.