You are currently viewing a new version of our website. To view the old version click .
Sensors
  • Article
  • Open Access

2 March 2024

A Framework for Detecting False Data Injection Attacks in Large-Scale Wireless Sensor Networks

,
and
1
School of Big Data & Software Engineering, Chongqing University, Chongqing 400044, China
2
College of Information Technology, Deakin University, Melbourne, VIC 3125, Australia
*
Author to whom correspondence should be addressed.
This article belongs to the Special Issue Wireless Sensor Networks in Industrial/Agricultural Environments

Abstract

False data injection attacks (FDIAs) on sensor networks involve injecting deceptive or malicious data into the sensor readings that cause decision-makers to make incorrect decisions, leading to serious consequences. With the ever-increasing volume of data in large-scale sensor networks, detecting FDIAs in large-scale sensor networks becomes more challenging. In this paper, we propose a framework for the distributed detection of FDIAs in large-scale sensor networks. By extracting the spatiotemporal correlation information from sensor data, the large-scale sensors are categorized into multiple correlation groups. Within each correlation group, an autoregressive integrated moving average (ARIMA) is built to learn the temporal correlation of cross-correlation, and a consistency criterion is established to identify abnormal sensor nodes. The effectiveness of the proposed detection framework is validated based on a real dataset from the U.S. smart grid and simulated under both the simple FDIA and the stealthy FDIA strategies.

1. Introduction

Wireless sensor networks (WSNs) consist of spatially dispersed sensors connected via wireless communication protocols [1]. These sensors are equipped with sensing capabilities to collect data on environmental parameters and physical quantities, which are transmitted to a central server or data center for further analysis and decision-making. WSNs are widely employed in various fields, including military affairs, agriculture, healthcare, industrial automation, and intelligent transportation [2].
Typically, the sensors in WSNs are resource-constrained devices in unprotected environments that are vulnerable to physical tampering [3,4,5]. The behavior of an attacker who physically tampers with sensor data is known as a false data injection attack (FDIA). As a result of the FDIA, the tampered sensors provide misleading data to the central server, leading the system to make incorrect judgments. The FDIA undermines the authenticity of sensor data, which can seriously impact systems that rely on sensor data for decision-making or monitoring, culminating in economic loss or even a life crisis. As a result, it is critical to develop detection mechanisms to ensure that WSNs are resistant to FDIAs [6,7].

1.1. Motivation

The focus of this paper is on detecting FDIAs in large-scale WSNs. Our goal is to provide a detection framework for FDIAs with the following properties:
  • Stealthy FDIA detection. The attacker’s purpose is to use resourceful and sophisticated strategies to minimize the risk of being identified. Stealthy FDIAs may be employed, i.e., making the injected false data look as close to the genuine data as possible, such as by mimicking genuine data distributions and time series patterns. Since stealthy FDIAs are typically not easily observed, the detection framework should take this into account to reduce the likelihood of potential harm.
  • Distribute detection. The detection process might be centralized or distributed. In centralized detection, all sensor data are sent to a central node for thorough processing. In distributed detection, sensor data are evaluated separately by local sensors or edge devices, making it more responsive to data changes than centralized detection. More significantly, given the widely dispersed sensors and enormous data volumes in large-scale WSNs, distributed detection might be more straightforward to scale.
  • General detection. Large-scale WSNs are employed in various fields, and the physical behavior of such systems is diverse. Electric power systems, for example, can be defined using circuit equations, whereas thermodynamic systems can be represented using thermodynamic laws. Therefore, a detection framework based only on a measurement that does not require domain-specific a priori knowledge is necessary, which makes the detection method more general and allows for similar detection methods to be applied to sensors in different domains without much adaptation.

1.2. Main Contributions

We propose a correlation-based framework for detecting FDIAs, and our main contributions are sketched below.
  • We first develop a grouping approach based on the temporal correlation of the cross-correlation between the time-series signals of pairwise sensors. All sensors are categorized into multiple correlated groups, and subsequent detection methods are performed separately within the groups.
  • We build an autoregressive integrated moving average (ARIMA) model for predicting future data from each sensor using historical time-series signals, which is used to learn the normal temporal correlation of the cross-correlation between data reported by pairwise sensors.
  • Based on the comparison of the normal and actual temporal correlation of the cross-correlation within each group, the basis for determining the consistency of the pairwise sensor data is established. Then, majority voting is executed within each group to identify the abnormal sensors.
  • To verify the performance of the detection framework, we construct simple FDIAs and stealthy FDIAs in a genuine sensor dataset. The effectiveness of our proposed detection framework is verified through extensive simulation experiments.
The subsequent materials are organized in this fashion: Section 2 reviews the related works. In Section 3, sensor data and correlation definitions are introduced. The detection framework is described in detail in Section 4, and the performance of the detection framework is corroborated through simulation experiments in Section 5. Finally, this work is summarized in Section 6.

3. Preliminaries

We extract information from the sensor data itself to detect FDIAs. In this section, we discuss the definition of sensor data and the correlation between sensor data.

3.1. Sensor Data

Consider a set of sensors V = { v 1 , , v N } distributed over a geographic area, where each sensor v i V collects one type of environmental data in synchronization with the other sensors. Let r i ( t ) denote the sensor measurement reported by v i at time t, as follows:
r i ( t ) = r i ˜ ( t ) + ϵ ( t ) ,
where r i ˜ ( t ) is the true value and ϵ ( t ) is an error at time t. The error ϵ ( t ) can be caused by either a random error or a systematic error. A random error is an uncertainty in the measurement result caused by various random factors (e.g., noise), and a systematic error is an uncertainty in the measurement result due to inherent defects or biases (e.g., faults, FDIAs). Since our work focuses on detecting FDIAs on sensors, we only consider systematic errors caused by FDIAs. The collection of r i ( t ) from v i over a period of time is a time-series signal [25]. A time-series signal consisting of t successive sensor measurements r i ( 1 ) , r i ( 2 ) , , r i ( t ) can be expressed as follows:
R i ( t ) = { r i ( 1 ) , r i ( 2 ) , , r i ( t ) } .

3.2. Spatiotemporal Correlation between Sensor Data

Spatiotemporal correlation is a combination of spatial and temporal correlation, referring to the simultaneous existence of correlations in space and time. The correlation of sensor data exists because sensors are distributed in space and measure time-dependent physical phenomena. The anomalous data generated when an FDIA occurs can go so far as to cause this correlation to be disrupted, so we can identify false data injection attacks by analyzing the correlation of sensor data [26].

3.2.1. Spatial Correlation

Spatial correlation between sensor data over a fixed time interval reveals the degree of association between events or phenomena at adjacent or discrete locations in space. For example, in a smart grid, neighboring industrial facilities may belong to similar industries and, thus, have a similar electricity demand, resulting in a strong spatial correlation between meter data in industrial areas, but there may be a weak spatial correlation between meter data in industrial areas and meter data in residential areas.

3.2.2. Temporal Correlation

The temporal correlation of sensor data reveals the degree of association between events or phenomena over time. For example, in a smart grid, due to differences between day and night, seasonal factors, etc., by observing hourly, daily, weekly, or seasonal data from meters, it is possible to find repeating patterns or regularities in the use of electrical energy on different time scales.

4. FDIA Detection Framework

In this section, this paper proposes a framework for FDIA detection. This framework consists of three phases: correlation grouping, correlation prediction, and correlation testing, stated as follows:
  • Phase I: Correlation grouping. The purpose of this phase is to group V in a large-scale WSN based on historical sensor data so that sensors in the same group are highly correlated with other sensors.
  • Phase II: Correlation prediction. The purpose of this phase is to predict the normal temporal correlation of the cross-correlation between pairwise sensor measurements in the same group over a short period of time in the future.
  • Phase III: Correlation testing. The purpose of this phase is to test the actual sensor data based on the predicted normal temporal and spatial correlations.
The flow diagram for FDIA detection in large-scale WSNs is shown in Figure 1. Next, let us discuss the three phases in detail.
Figure 1. The flow diagram for FDIA detection in large-scale WSNs.

4.1. Correlation Grouping

Collect sensor data, ensuring that the data are collected at the same or similar frequencies, and pre-process the data if necessary, including de-noise, filling in missing values, interpolating, and other operations to facilitate analysis. Standardize the sensor data (e.g., min-max normalization, z-score normalization) to ensure that the measurements from different sensors are similarly scaled so that the magnitude of the change in one sensor does not affect the cross-correlation results.
Let R i ( T ) = { r i ( 1 ) , r i ( 2 ) , , r i ( T ) } denote the Historical Time-series Signal (HTS) of v i obtained after data processing, where T denotes the length of the HTS. The cross-correlation of any two full HTSs is usually calculated to determine the spatial correlation between R i ( T ) and R j ( T ) , expressed as follows:
C i j = c o v ( R i ( T ) , R j ( T ) ) δ ( R i ( T ) ) δ ( R j ( T ) ) ,
where
c o v ( R i ( T ) , R j ( T ) ) = 1 T t = 1 T ( r i ( t ) r i ¯ ) ( r j ( t + τ ) r j ¯ )
denotes the covariance between R i ( T ) and R j ( T ) , δ ( R i ( T ) ) = 1 T t = 1 T ( r i ( t ) r i ¯ ) 2 , and δ ( R j ( T ) ) = 1 T t = 1 T ( r j ( t + τ ) r j ¯ ) 2 denote the standard deviations of R i ( T ) and R j ( T ) , respectively. C i j denotes the correlation coefficients of v i and v j at lag τ ; r i ¯ and r j ¯ represent the average values of two full HTSs from v i and v j . The lag τ represents the delay of one HTS with respect to the other, and by analyzing the peak of cross-correlation, it is determined at which lag value the correlation between the two HTSs is greatest. C i j has a value between 1 and 1 , where 1 means perfect positive correlation, 1 means perfect negative correlation, and 0 means the signals are uncorrelated [27].
However, this paper’s goal is to extract the temporal correlation of the cross-correlation between any two HTSs, so the sliding window cross-correlations need to be computed.
First, let the size of the sliding window be k. The wth sub-signal, consisting of k successive sensor measurements r i ( w ) , , r i ( w + k 1 ) within [ 1 , t ] , can be defined as
R i ( t , w ) = { r i ( w ) , , r i ( w + k 1 ) } .
Therefore, the HTS of v i is segmented into multiple historical sub-signals, denoted as R i = { R i ( T , 1 ) , R i ( T , 2 ) , , R i ( T , W ) } , where W denotes the number of historical sub-signals.
Second, for R i and R j , the cross-correlation is computed within each sliding window, denoted as
C i j ( w ) = c o v ( R i ( T , w ) , R j ( T , w ) ) δ ( R i ( T , w ) ) δ ( R j ( T , w ) ) , w = 1 , 2 , , W .
Here, c o v ( R i ( T , w ) , R j ( T , w ) ) represents the covariance between R i ( T , w ) and R j ( T , w ) ; δ ( R i ( T , w ) ) and δ ( R j ( T , w ) ) represent the standard deviations of R i ( T , w ) and R j ( T , w ) , respectively. Then, the time series of the cross-correlation of v i and v j can be represented by
C i j = { C i j ( 1 ) , C i j ( 2 ) , , C i j ( W ) } , w = 1 , 2 , , W .
Finally, we pick C i j with a positive correlation for K-means clustering, which is one of the most widely used parameter selection methods. After K-means clustering, the sensors can be categorized into multiple correlation groups.
For a dataset with M time series of cross-correlation, we represent C i j with a positive correlation as a feature vector. We extract relevant features that capture the characteristics of the time series; commonly used features include mean, standard deviation, slope, etc. Each C i j with a positive correlation is represented as a feature vector v p = [ f 1 , f 2 , , f k ] ( p = 1 , , M ), where k is the number of features and v p includes all necessary extracted features (mean, standard deviation, slope, etc.). The random cluster centers u 1 , u 2 , , u K are first selected, and then the K-means objection function is defined as follows:
J = p = 1 M q = 1 K x p q · v p u q 2 ,
where x p q is an indicator function indicating if the time series p belongs to cluster q ( q = 1 , 2 , , K ), and · 2 denotes the squared Euclidean distance.
We update the centroids of the clusters by calculating the mean feature vector for each cluster:
u q = 1 | C q | p C q v p ,
where | C q | is the number of time series in cluster q. We repeat the centroid’s update and minimization of J until convergence. Then,
Definition 1.
Let V i q = { v j | C i j c l u s t r q , j i } be the set of sensors consistent with sensor v i in cluster q obtained according to HTSs, and let V q = { v i | | V i q | N 1 > 50 % } be the set of sensors that are grouped in q according to HTSs.
Remark 1.
Figure 2 illustrates the correlation grouping of four sensor nodes. After correlation grouping, each group’s sensor data can be sent to a separate edge device for distributed processing to reduce network pressure and improve processing efficiency [28]. The following stages are performed within each group: correlation prediction and correlation testing.
Figure 2. The correlation grouping of four sensor nodes.

4.2. Correlation Prediction

Next, we predict the normal temporal correlation of cross-correlation between pairwise sensor measurements in each group over a short period of time in the future.
Consider pairwise sensors v i and v j in a group. As we discussed in the previous subsection, the measurements of v i and v j should be temporally correlated with their previous measurements. Therefore, this subsection uses the Autoregressive Integrated Moving Average (ARIMA) model to predict the future time-series signal of each sensor based on the HTS, which is referred to as the Estimated Time-series Signal (ETS). ARIMA is used as a time series predictive analysis method, which requires only historical data to make predictions and has the ability to be widely applied to a wide range of time series data.
ARIMA combines the concepts of autoregression (AR), moving average (MA), and the operation of differencing the time series signals. Specifically, the autoregressive part represents the relationship between the current value of a variable and its value at p previous moments, where p denotes the autoregressive order. The moving average part represents the relationship between the current value and the error (white noise) at q previous moments, where q denotes the moving average order. The d-order differencing operation is performed to remove trends and seasonality from HTSs. Therefore, an ARIMA model is used to fit the trend and periodicity of the HTS by choosing appropriate parameters ( p , d , q ) to make forecasts of the ETS [29].
First, a suitable d is chosen using the following difference method:
Δ d r i ( t ) = Δ ( Δ d 1 r i ( t ) ) ,
where Δ r i ( t ) = r i ( t ) r i ( t 1 ) denotes the first-order difference at time point t. The suitable value is d when the sequence after d-order differencing of the HTS passes the Augmented Dickey–Fuller (ADF) test [30].
Second, for all possible combinations of p and q , an ARIMA model is fitted using the information criterion (AIC) to select the best combination of p and q as the one with the smallest AIC value. The formula for calculating AIC is as follows:
A I C = 2 l n   ( L ) + 2 l ,
where L is the maximum likelihood estimate of the model, and l is the number of parameters of the model.
Third, the HTS is fitted using an ARIMA model with order ( p , d , q ) , which is formulated as follows:
Δ d r i ( t ) = μ + l = 1 p ϕ l Δ d r i ( t l ) + l = 1 q ψ l ϵ ( t l ) + ϵ ( t ) ,
where μ , ϕ l , and ψ l are model parameters, and ϵ ( t ) stands for the value of the independent error at time t, which follows a Gaussian distribution with a zero mean. The fitted model is tested to see if it matches the characteristics of the data, including the autocorrelation and partial autocorrelation of the residuals and normality of the residuals.
Finally, assuming that the fitted model is used to predict future data, the ETSs can be made by the difference restoration of predicted data. An estimated time-series signal consisting of t successive sensor measurements r i ( 1 ) , r i ( 2 ) , , r i ( t ) can be expressed as follows:
R i ( t ) = { r i ( 1 ) , r i ( 2 ) , , r i ( t ) } .
Then, let R i ( S ) = { r i ( 1 ) , r i ( 2 ) , , r i ( S ) } denote the ETS of v i , where S denotes the length of the ETS.
The ETS and HTS are concatenated into a new time-series signal X i ( t ) , which consists of t successive sensor measurements and can be expressed as follows:
X i ( t ) = R i ( t ) , t T , { R i ( T ) , R i ( t T ) } , t > T .
Similar to Equation (6), the wth estimated sub-signal consisting of k successive sensor measurements within [ 1 , t ] can be defined as X i ( t , w ) . C i j = { C i j ( 1 ) , C i j ( 2 ) , C i j ( S ) } is calculated in the same manner as in Equation (7) based on X i ( t , w ) and X j ( t , w ) , where w = 1 , 2 , , S .
Therefore, C i j represents the normal temporal correlation of cross-correlation between pairwise sensor measurements in a group. The diagram of correlation prediction within a group is shown in Figure 3.
Figure 3. The diagram of correlation prediction within a group.

4.3. Correlation Testing

After correlation prediction, we compare C i j with the actual ones to detect FDIAs in this subsection.
An actual time-series signal consisting of t successive sensor measurements r i * ( 1 ) , r i * ( 2 ) , , r i * ( t ) can be expressed as follows:
R i * ( t ) = { r i * ( 1 ) , r i * ( 2 ) , , r i * ( t ) } .
Then, let R i * ( S ) = { r i * ( 1 ) , r i * ( 2 ) , , r i * ( S ) } denote the Actual Time-series Signal (ATS) of v i , where S denotes the length of the ATS.
The ATS and HTS are concatenated into a new time-series signal Y i ( t ) , which consists of t successive sensor measurements and can be expressed as follows:
Y i ( t ) = R i ( t ) , t T , { R i ( T ) , R i * ( t T ) } , t > T .
Similar to Equation (6), the wth actual sub-signal, which consists of k successive sensor measurements within [ 1 , t ] , can be defined as Y i ( t , w ) . Consider each pair of v i and v j in a group; C i j * = { C i j ( 1 ) , C i j ( 2 ) , , C i j ( S ) } is calculated in the same manner as in Equation (7) based on Y i ( t , w ) and Y j ( t , w ) , where w = 1 , 2 , , S .
Therefore, C i j * represents the actual temporal correlation of cross-correlation between pairwise sensor measurements in a group.
Consider each pair of v i and v j in the group q V . Based on C i j and C i j * , we have
ρ i j = c o v ( C i j , C i j * ) δ ( C i j ) δ ( C i j * ) ,
where c o v ( C i j , C i j * ) is the covariance of C i j and C i j * ; δ ( C i j ) and δ ( C i j * ) are the standard deviations of C i j and C i j * , respectively. Then, we have
e i j = 1 , i f ρ i j > θ , 0 , o t h e r w i s e ,
where e i j is for the consistency criterion, and e i j = 1 ( r e s p . 0 ) denotes that v i and v j are consistent (resp. inconsistent).
Remark 2.
The choice of threshold θ depends on the experience of C i j in Phase I, and the performance of the model on the test set can be observed by trying different thresholds and selecting the one with the best performance.
Definition 2.
Let N i a = { v j | e i j = 1 or e i j = 0 , i j } be the set of all neighbors of v i , and N i c = { v j | e i j = 1 , i j } be the set of consistent neighbors of v i obtained according to the comparison of ETSs and ATSs.
Definition 3.
Let N t = { v i q | | N i c | | N i a | 50 % } be the set of all trusted neighbors.
So, let N F = { v i q | | N t N i a | | N i a | 50 % and | N t N i a N i c | | N t N i a | < 50 % } be the set of abnormal nodes in group q. The diagram of correlation testing within a group is shown in Figure 4.
Figure 4. The diagram of correlation testing within a group.

5. Effectiveness of the Proposed Framework

This section is devoted to investigating the effectiveness of the framework through simulation experiments.

5.1. Experiment Preparation

We applied the detection framework to an hourly electricity demand dataset by subregion, which was based on the 2020 US Energy Information Administration State Electricity Profiles (available at http://www.eia.gov/, accessed on 2 June 2023). This dataset was chosen because it was derived from widely distributed smart meters to evaluate the effectiveness of our proposed framework in detecting FDIAs.
By visualizing the dataset, we found that the time series data show a pronounced periodicity with a period length of 24. Therefore, the model parameters used for this dataset were obtained through observation and manual grid search, as shown in Table 2.
Table 2. Model parameters used on the dataset.

5.2. Experiments and Analysis of Experimental Results

Figure 5 illustrates the results for one of the groups, consisting of a set of sensors { v 1 , v 2 , , v 7 } , after correlation grouping and data fitting for HTSs. In Figure 5, we visualize only the data points with a step size of 24 to display the fitting results clearly. As can be seen from the figure, there is a strong correlation between the HTSs within a group, and our approach effectively fits the HTSs.
Figure 5. The results for one of the groups after correlation grouping and data fitting for HTSs.
Figure 6 illustrates the comparison results of ETSs and ATSs for the group after correlation prediction. It is seen that our approach can effectively predict future data.
Figure 6. The comparison results of ETSs and ATSs for the group after correlation prediction.
To further validate the effectiveness of our framework for detecting FDIAs, we performed correlation testing for various FDIA strategies on target signals. Moreover, we compared our approach with the SCCR solution given in previous work [18], where the SCCR is a consistent ellipse area formed by spatiotemporal correlations. In our experiments, the confidence degree of the consistency ellipse was set to 95%.
In addition, we used three different metrics: successful detection rate, false-negative detection rate, and false-positive detection rate. The successful detection rate is the proportion of actual abnormal nodes that are correctly identified; the false-negative detection rate is the proportion of actual abnormal nodes that are incorrectly identified as normal; and the false-positive detection rate is the proportion of actual normal nodes that are incorrectly identified as abnormal nodes.

5.2.1. The Simple FDIA

A simple FDIA means randomly generating an attack signal. Assuming that r 3 ( t ) is chosen as the target of the attack of the group, the power demand of v 3 is randomly increased by 50%, as shown in Figure 7.
Figure 7. The simple FDIA on v 3 .
In our solution, Figure 8 and the second line of Table 3 show the results of comparing the normal temporal correlation of cross-correlation with the actual temporal correlation of cross-correlation of v 3 within the group in a simple FDIA. As shown in Figure 8, from the start of the FDIA, the change in the trend of C i j * relative to the trend of C i j is clearly inconsistent. In the SCCR solution, we can also observe the inconsistency of v 3 with other nodes. The proposed framework and SCCR solution are able to accurately detect the simple FDIA on v 3 .
Figure 8. The results of comparing the normal temporal correlation of cross-correlation with the actual temporal correlation of cross-correlation of v 3 within the group in a simple FDIA.
Table 3. The comparison results of the temporal correlation of cross-correlation.
We conducted a total of 100 similar experiments in all groups, in which the framework proposed in this paper and the SCCR solution were able to detect at least 99% of FDIAs (Figure 9a), and the false-negative detection rate (Figure 9b) and false-positive detection rate (Figure 9c) were almost zero. Therefore, we conclude that, in general, the framework proposed in this paper performs well in detecting simple FDIAs.
Figure 9. The comparison results of three metrics: (a) successful detection rate; (b) false-negative detection rate; (c) false-positive detection rate.

5.2.2. The Stealthy FDIA

The stealthy FDIA means the attacker injects in a well-designed way that is generally not easily observable. Assuming that r 3 ( t ) is chosen as the target of the attack and that the attacker is able to learn the time series of v 3 of the group, in this case, the power demand of v 3 slowly increases within the detected threshold (boiling frog attack [31]) and also exhibits periodicity from t = 4247 h, as shown in Figure 10.
Figure 10. The stealth FDIA on v 3 .
In our solution, Figure 11 and the third line of Table 3 show the results of comparing the normal temporal correlation of cross-correlation with the actual temporal correlation of cross-correlation of v 3 within the group in stealthy FDIA. As shown in Figure 11, from the start of the FDIA, the change in the trend of C i j * relative to the trend of C i j is gradually inconsistent. However, in the SCCR solution, we do not identify any outliers during the first 66 h of the FDIA, after which the abnomal nodes v 3 , v 6 , and v 7 are identified. This result is caused by the fact that at the beginning of the FDIA, the outliers are within the detection threshold of the SCCR solution, leading to unrecognized anomalies, which are then considered normal to build the consistency ellipse, resulting in a high rate of false positives.
Figure 11. The results of comparing the normal temporal correlation of cross-correlation with the actual temporal correlation of cross-correlation of v 3 within the group in a stealthy FDIA.
We conducted a total of 100 similar experiments in all groups, in which both the framework proposed in this paper and the SCCR solution were able to detect at least 99% of FDIAs (Figure 9a), and the false-negative detection rate was almost zero (Figure 9b); the false-positive detection rate for the framework proposed in this paper was almost zero, while the false-positive detection rate for the SCCR solution was up to 14% (Figure 9c). In addition, we observed that long-term attack signals resulted in stronger inconsistencies than short-term attack signals. Therefore, we conclude that, in general, the framework proposed in this paper performs well for detecting stealthy FDIAs on a single sensor, and our approach is superior compared to the SCCR solution in detecting long-term and stealthy attack signals. However, the inconsistency was not obvious from the beginning of the FDIA. Therefore, it is necessary to choose a suitable ETS size or sliding window size when detecting stealthy FDIAs.
In addition, assuming there is a collision, the attacker chooses the next node whose data are consistent with node v 3 as the next attack target to work in concert. With v 2 chosen as the next attack target, the same FDIA strategy is used to construct an attack signal for v 2 after the attacker learns the cross-correlation between v 2 and v 3 . Figure 12 shows the signals of v 2 and v 3 with FDIA and without FDIA, where the FDIA starts at t = 4247 h.
Figure 12. The stealthy and collusive FDIA on v 2 and v 3 .
In our solution, Figure 13 and the fourth line of Table 3 show the results of comparing the normal temporal correlation of cross-correlation with the actual temporal correlation of cross-correlation of v 2 and v 3 within the group in stealthy and collusive FDIAs. As shown in Figure 13, from the FDIA’s start, the change in the trend of C 32 * relative to the trend of C 32 is relatively consistent, and ρ 32 = 0.98 also indicates that the readings of the collusive nodes are consistent. Due to the proposed voting algorithm, the framework can still detect the stealthy and collusive FDIAs on v 2 and v 3 . However, in the SCCR solution, we similarly do not identify any outliers during the first 66 h of the FDIA, after which the abnormal nodes v 2 , v 3 , v 6 , and v 7 are identified.
Figure 13. The results of comparing the normal temporal correlation of cross-correlation with the actual temporal correlation of cross-correlation of v 2 and v 3 in stealthy and collusive FDIAs.
We conducted a total of 100 similar experiments in all groups, in which both the framework proposed in this paper and the SCCR solution were able to detect at least 95% of FDIAs (Figure 9a) with no more than a 5% false-negative detection rate (Figure 9b); the false-positive detection rate for the framework proposed in this paper was, again, no more than 3%, while the false-positive detection rate for the SCCR solution was as high as 19% (Figure 9c). Furthermore, we observed that long-term attack signals result in stronger inconsistencies than short-term attack signals. Therefore, we conclude that, in general, the framework proposed in this paper performs well for detecting stealthy FDIAs in two collusive sensors, and our approach is superior compared to the SCCR solution in detecting long-term, stealthy, and collusive attack signals. However, as the number of collusive sensors increased, we observed a performance degradation. The proposed detection algorithm fails when the number of collusive sensors exceeds 50%. This is due to the fact that the detection algorithm uses majority voting, and more than 50% of the sensors must be normal to ensure the performance of the detection.
Overall, the framework proposed in this paper performs best in detecting simple and stealthy FDIAs in single-sensor scenarios and is relatively effective in detecting stealthy FDIAs in multi-sensor scenarios.

6. Conclusions and Future Works

This paper presents a novel detection framework for FDIAs on large-scale WSNs. The framework consists of three phases. The first stage groups the sensors, which is based on the temporal correlation of the cross-correlation between the pairwise sensors. The second phase proposes a model for learning the temporal correlation of the cross-correlation. The third stage establishes consistency criteria within each group and votes out the abnormal nodes. We validated the performance of the framework by simulating simple FDIAs and stealthy FDIAs on a real dataset.
However, the detection framework also has some limitations. First, this paper only considers the scenario where FDIAs exist, and the framework is not designed to distinguish between FDIAs and natural anomalies, disruptive events, etc. Second, ARIMA is usually more suitable for forecasting problems with one-dimensional time series data, while for more complex problems, especially when multidimensional data are involved, the method needs to be further optimized. In addition, the voting algorithm fails to detect FDIAs on more than 50% of the sensors, and there is merit in exploring detection methods in the collusion-tolerant anomaly. Thus, there is value in further research on an anomaly score aggregation that tolerates collusion, and future work on the detection framework can be optimized by exploring other techniques to distinguish between FDIAs and natural anomalies. In addition, using a distributed detection framework that takes into account the trade-off between cost and criticality, the work can be conducted in the context of an optimization problem, such as the allocation of defense resources [32,33]. Finally, the framework proposed in this paper can be generalized to other correlation-based problems, such as advanced persistent threat detection [34,35], DDoS detection [36,37], and event-triggered state estimation [38,39].

Author Contributions

Conceptualization, J.H. and X.Y.; methodology, J.H., X.Y. and L.-X.Y.; software, J.H.; validation, J.H., X.Y. and L.-X.Y.; formal analysis, J.H., X.Y. and L.-X.Y.; investigation, J.H. and L.-X.Y.; resources, X.Y.; data curation, J.H. and X.Y.; writing—original draft preparation, J.H.; writing—review and editing, X.Y.; visualization, J.H.; supervision, X.Y.; project administration, X.Y.; funding acquisition, X.Y. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by National Natural Science Foundation of China (Grant No. 61572006).

Institutional Review Board Statement

Not applicable.

Data Availability Statement

Data are available upon request.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Forster, A. Introduction to Wireless Sensor Networks; Wiley-IEEE Press: Hoboken, NJ, USA, 2016. [Google Scholar]
  2. El Emary, I.M.M.; Ramakrishnan, S. (Eds.) Wireless Sensor Networks: From Theory to Applications; CRC Press: Boca Raton, FL, USA, 2013. [Google Scholar]
  3. Faquih, A.; Kadam, P.; Saquib, Z. Cryptographic techniques for wireless sensor networks: A survey. In Proceedings of the 2015 IEEE Bombay Section Symposium (IBSS), Mumbai, India, 10–11 September 2015; pp. 1–6. [Google Scholar] [CrossRef]
  4. Oreku, G.S.; Pazynyuk, T. Security in Wireless Sensor Networks; Springer International Publishing: Cham, Switzerland, 2016. [Google Scholar]
  5. Rani, A.; Kumar, S. A survey of security in wireless sensor networks. In Proceedings of the 3rd International Conference on CICT, Ghaziabad, India, 9–10 February 2017; pp. 1–5. [Google Scholar]
  6. Ahmed, M.; Pathan, A.-S.K. False data injection attack (FDIA): An overview and new metrics for fair evaluation of its countermeasure. Complex Adapt. Syst. Model. 2020, 8, 4. [Google Scholar] [CrossRef]
  7. Illiano, V.P.; Lupu, E.C. Detecting malicious data injections in wireless sensor networks: A survey. ACM Comput. Surv. (CSUR) 2015, 48, 1–33. [Google Scholar] [CrossRef]
  8. Urbina, D.I.; Urbina, D.I.; Giraldo, J.; Cardenas, A.A.; Valente, J.; Faisal, M.; Tippenhauer, N.O.; Ruths, J.; Candell, R.; Sandberg, H. Survey and New Directions for Physics-Based Attack Detection in Control Systems; National Institute of Standards and Technology, US Department of Commerce: Gaithersburg, MD, USA, 2016.
  9. Liu, Y.; Cheng, L. Relentless false data injection attacks against Kalman-filter-based detection in smart grid. IEEE Trans. Control Netw. Syst. 2022, 9, 1238–1250. [Google Scholar] [CrossRef]
  10. Hegazy, H.I.; Tag Eldien, A.S.; Tantawy, M.M.; Fouda, M.M.; TagElDien, H.A. Real-time locational detection of stealthy false data injection attack in smart grid: Using multivariate-based multi-label classification approach. Energies 2022, 15, 5312. [Google Scholar] [CrossRef]
  11. Gu, Y.; Yu, X.; Guo, K.; Qiao, J.; Guo, L. Detection, estimation, and compensation of false data injection attack for UAVs. Inf. Sci. 2021, 546, 723–741. [Google Scholar] [CrossRef]
  12. Moazeni, F.; Khazaei, J. Formulating false data injection cyberattacks on pumps’ flow rate resulting in cascading failures in smart water systems. Sustain. Cities Soc. 2021, 75, 103370. [Google Scholar] [CrossRef]
  13. Ren, X.X.; Yang, G.H. Adaptive control for nonlinear cyber-physical systems under false data injection attacks through sensor networks. Int. J. Robust Nonlinear Control 2020, 30, 65–79. [Google Scholar] [CrossRef]
  14. Padhan, S.; Turuk, A.K. Design of false data injection attacks in cyber-physical systems. Inf. Sci. 2022, 608, 825–843. [Google Scholar] [CrossRef]
  15. Miao, B.; Wang, H.; Liu, Y.-J.; Liu, L. Adaptive security control against false data injection attacks in cyber-physical systems. IEEE J. Emerg. Sel. Top. Circuits Syst. 2023. [Google Scholar] [CrossRef]
  16. Illiano, V.P.; Steiner, R.V.; Lupu, E.C. Unity is strength! Combining attestation and measurements inspection to handle malicious data injections in WSNs. In Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Boston, MA, USA, 18–20 July 2017; pp. 134–144. [Google Scholar]
  17. Aboelwafa, M.M.; Seddik, K.G.; Eldefrawy, M.H.; Gadallah, Y.; Gidlund, M. A machine-learning-based technique for false data injection attacks detection in industrial IoT. IEEE Internet Things J. 2020, 7, 8462–8471. [Google Scholar] [CrossRef]
  18. Martovytskyi, V.; Ruban, I.; Lahutin, H.; Ilina, I.; Rykun, V.; Diachenko, V. Method of detecting FDI attacks on smart grid. In Proceedings of the 2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T), Kharkiv, Ukraine, 6–9 October 2020; pp. 132–136. [Google Scholar]
  19. Berjab, N.; Le, H.H.; Yokota, H. A spatiotemporal and multivariate attribute correlation extraction scheme for detecting abnormal nodes in WSNs. IEEE Access 2021, 9, 135266–135284. [Google Scholar] [CrossRef]
  20. Huang, D.-W.; Liu, W.; Bi, J. Data tampering attacks diagnosis in dynamic wireless sensor networks. Comput. Commun. 2021, 172, 84–92. [Google Scholar] [CrossRef]
  21. Hu, J.; Yang, X.; Yang, L. A novel diagnosis scheme against collusive false data injection attack. Sensors 2023, 23, 5943. [Google Scholar] [CrossRef]
  22. Chen, P.-Y.; Yang, S.; McCann, J.A. Distributed real-time anomaly detection in networked industrial sensing systems. IEEE Trans. Ind. Electron. 2015, 62, 3832–3842. [Google Scholar] [CrossRef]
  23. Islam, J.; Talusan, J.P.; Bhattacharjee, S.; Tiausas, F.; Vazirizade, S.M.; Dubey, A.; Yasumoto, K.; Das, S.K. Anomaly based incident detection in large scale smart transportation systems. In Proceedings of the 2022 ACM/IEEE 13th International Conference on Cyber-Physical Systems (ICCPS), Milano, Italy, 4–6 May 2022; pp. 215–224. [Google Scholar]
  24. Lai, Y.; Tong, L.; Liu, J.; Wang, Y.; Tang, T.; Zhao, Z.; Qin, H. Identifying malicious nodes in wireless sensor networks based on correlation detection. Comput. Secur. 2022, 113, 102540. [Google Scholar] [CrossRef]
  25. Hamilton, J.D. Time Series Analysis; Princeton University Press: Princeton, NJ, USA, 2020. [Google Scholar]
  26. Rassam, M.A.; Zainal, A.; Maarof, M.A. Advancements of data anomaly detection research in wireless sensor networks: A survey and open issues. Sensors 2013, 13, 10087–10122. [Google Scholar] [CrossRef]
  27. Shiavi, R. Introduction to Applied Statistical Signal Analysis: Guide to Biomedical and Electrical Engineering Applications; Elsevier: Amsterdam, The Netherlands, 2010. [Google Scholar]
  28. Shi, W.; Cao, J.; Zhang, Q.; Li, Y.; Xu, L. Edge computing: Vision and challenges. IEEE Internet Things J. 2016, 3, 637–646. [Google Scholar] [CrossRef]
  29. Choi, B. ARMA Model Identification; Springer Science & Business Media: New York, NY, USA, 2012. [Google Scholar]
  30. Mushtaq, R. Augmented Dickey Fuller Test; SSRN-Elsevier: Rochester, NY, USA, 2011. [Google Scholar]
  31. Chan-Tin, E.; Feldman, D.; Hopper, N.; Kim, Y. The frog-boiling attack: Limitations of anomaly detection for secure network coordinate systems. In Proceedings of the Security and Privacy in Communication Networks: 5th International ICST Conference (SecureComm 2009), Athens, Greece, 14–18 September 2009; Revised Selected Papers 5, 2009. pp. 448–458. [Google Scholar]
  32. Hao, W.; Yao, P.; Yang, T.; Yang, Q. Industrial cyber–physical system defense resource allocation using distributed anomaly detection. IEEE Internet Things J. 2021, 9, 22304–22314. [Google Scholar] [CrossRef]
  33. Sun, H.; Yang, X.; Yang, L.-X.; Huang, K.; Li, G. Impulsive artificial defense against advanced persistent threat. IEEE Trans. Inf. Forensics Secur. 2023, 18, 3506–3516. [Google Scholar] [CrossRef]
  34. Wang, X.; Liu, Q.; Pan, Z.; Pang, G. APT attack detection algorithm based on spatio-temporal association analysis in industrial network. J. Ambient. Intell. Humaniz. Comput. 2020, 1–10. [Google Scholar] [CrossRef]
  35. Yang, L.-X.; Huang, K.; Yang, X.; Zhang, Y.; Xiang, Y.; Tang, Y.Y. Defense against advanced persistent threat through data backup and recovery. IEEE Trans. Netw. Sci. Eng. 2020, 8, 2001–2013. [Google Scholar] [CrossRef]
  36. Cao, Y.; Jiang, H.; Deng, Y.; Wu, J.; Zhou, P.; Luo, W. Detecting and mitigating ddos attacks in SDN using spatial-temporal graph convolutional network. IEEE Trans. Dependable Secur. Comput. 2021, 19, 3855–3872. [Google Scholar] [CrossRef]
  37. Khan, M.A.; Nasralla, M.M.; Umar, M.M.; Khan, S.; Choudhury, N. An efficient multilevel probabilistic model for abnormal traffic detection in wireless sensor networks. Sensors 2022, 22, 410. [Google Scholar] [CrossRef]
  38. Akrami, A.; Mohsenian-Rad, H. Event-Triggered Distribution System State Estimation: Sparse Kalman Filtering with Reinforced Coupling. IEEE Trans. Smart Grid 2023, 15, 627–640. [Google Scholar] [CrossRef]
  39. Ponnarasi, L.; Pankajavalli, P.; Lim, Y.; Sakthivel, R. Optimization Based Event-Triggered State Estimation Algorithm for IoT-Based Wind Turbine Systems. IEEE Internet Things J. 2023. early access. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.