Next Article in Journal
A Force-Visualized Silicone Retractor Attachable to Surgical Suction Pipes
Next Article in Special Issue
Belief Interval of Dempster-Shafer Theory for Line-of-Sight Identification in Indoor Positioning Applications
Previous Article in Journal
Assessment of the Indoor Odour Impact in a Naturally Ventilated Room
Article Menu
Issue 4 (April) cover image

Export Article

Open AccessArticle
Sensors 2017, 17(4), 771; doi:10.3390/s17040771

Attack Classification Schema for Smart City WSNs

Internet Interdisciplinary Institute (IN3), IT, Multimedia and Telecommunications Department, Universitat Oberta de Catalunya, Rambla del Poblenou 156, 08018 Barcelona, Spain
*
Author to whom correspondence should be addressed.
Academic Editor: Yuh-Shyan Chen
Received: 16 January 2017 / Revised: 3 March 2017 / Accepted: 1 April 2017 / Published: 5 April 2017
View Full-Text   |   Download PDF [1163 KB, uploaded 6 April 2017]   |  

Abstract

Urban areas around the world are populating their streets with wireless sensor networks (WSNs) in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN. View Full-Text
Keywords: anomaly detection; information security; intrusion detection; security information and event management; smart cities; wireless sensor networks anomaly detection; information security; intrusion detection; security information and event management; smart cities; wireless sensor networks
Figures

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. (CC BY 4.0).

Scifeed alert for new publications

Never miss any articles matching your research from any publisher
  • Get alerts for new papers matching your research
  • Find out the new papers from selected authors
  • Updated daily for 49'000+ journals and 6000+ publishers
  • Define your Scifeed now

SciFeed Share & Cite This Article

MDPI and ACS Style

Garcia-Font, V.; Garrigues, C.; Rifà-Pous, H. Attack Classification Schema for Smart City WSNs. Sensors 2017, 17, 771.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Sensors EISSN 1424-8220 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top