WEKO3
アイテム
{"_buckets": {"deposit": "ea4294d7-c213-4cf2-9a93-f9c11a812e02"}, "_deposit": {"created_by": 18, "id": "8900", "owners": [18], "pid": {"revision_id": 0, "type": "depid", "value": "8900"}, "status": "published"}, "_oai": {"id": "oai:muroran-it.repo.nii.ac.jp:00008900", "sets": ["46", "316", "352"]}, "author_link": ["41908", "41909", "39157", "21131"], "item_79_biblio_info_10": {"attribute_name": "書誌情報", "attribute_value_mlt": [{"bibliographicIssueDates": {"bibliographicIssueDate": "2016", "bibliographicIssueDateType": "Issued"}, "bibliographicPageEnd": "424", "bibliographicPageStart": "416", "bibliographicVolumeNumber": "4", "bibliographic_titles": [{"bibliographic_title": "IEEE Access", "bibliographic_titleLang": "en"}]}]}, "item_79_description_23": {"attribute_name": "フォーマット", "attribute_value_mlt": [{"subitem_description": "application/pdf", "subitem_description_type": "Other"}]}, "item_79_description_7": {"attribute_name": "抄録", "attribute_value_mlt": [{"subitem_description": "In smart cities, wireless sensor networks (WSNs) act as a type of core infrastructure that collects data from the city to implement smart services. The security of WSNs is one of the key issues of smart cities. In resource-restrained WSNs, dynamic ongoing or unknown attacks usually steer clear of isolated defense components. Therefore, to resolve this problem, we propose a hierarchical framework based on chance discovery and usage control (UCON) technologies to improve the security of WSNs while still taking the low-complexity and high security requirements of WSNs into account. The features of continuous decision and dynamic attributes in UCON can address ongoing attacks using advanced persistent threat detection. In addition, we use a dynamic adaptive chance discovery mechanism to detect unknown attacks. To design and implement a system using the mechanism described above, a unified framework is proposed in which low-level attack detection with simple rules is performed in sensors, and high-level attack detection with complex rules is performed in sinks and at the base station. Moreover, software-defined networking and network function virtualization technologies are used to perform attack mitigation when either low-level or high-level attacks are detected. An experiment was performed to acquire an attack data set for evaluation. Then, a simulation was created to evaluate the resource consumption and attack detection rate. The results demonstrate the feasibility and efficiency of the proposed scheme.", "subitem_description_language": "en", "subitem_description_type": "Abstract"}]}, "item_79_link_17": {"attribute_name": "出版者版へのリンク", "attribute_value_mlt": [{"subitem_link_text": "10.1109/ACCESS.2016.2517321", "subitem_link_url": "https://doi.org/10.1109/ACCESS.2016.2517321"}]}, "item_79_link_5": {"attribute_name": "室蘭工業大学研究者データベースへのリンク", "attribute_value_mlt": [{"subitem_link_text": "太田 香(OTA Kaoru)", "subitem_link_url": "http://rdsoran.muroran-it.ac.jp/html/100000140_ja.html"}, {"subitem_link_text": "董 冕雄(DONG Mianxiong)", "subitem_link_url": "http://rdsoran.muroran-it.ac.jp/html/100000145_ja.html"}]}, "item_79_publisher_11": {"attribute_name": "出版者", "attribute_value_mlt": [{"subitem_publisher": "IEEE", "subitem_publisher_language": "en"}]}, "item_79_relation_18": {"attribute_name": "DOI", "attribute_value_mlt": [{"subitem_relation_type": "isIdenticalTo", "subitem_relation_type_id": {"subitem_relation_type_id_text": "10.1109/ACCESS.2016.2517321", "subitem_relation_type_select": "DOI"}}]}, "item_79_rights_19": {"attribute_name": "権利", "attribute_value_mlt": [{"subitem_rights": "© 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.", "subitem_rights_language": "en"}]}, "item_79_source_id_12": {"attribute_name": "ISSN", "attribute_value_mlt": [{"subitem_source_identifier": "2169-3536", "subitem_source_identifier_type": "PISSN"}]}, "item_79_subject_9": {"attribute_name": "日本十進分類法", "attribute_value_mlt": [{"subitem_subject": "547", "subitem_subject_scheme": "NDC"}]}, "item_79_text_4": {"attribute_name": "著者ID(非表示)", "attribute_value_mlt": [{"subitem_text_value": "1000050713971@@@1000020728274"}]}, "item_79_version_type_21": {"attribute_name": "著者版フラグ", "attribute_value_mlt": [{"subitem_version_resource": "http://purl.org/coar/version/c_970fb48d4fbd8a85", "subitem_version_type": "VoR"}]}, "item_access_right": {"attribute_name": "アクセス権", "attribute_value_mlt": [{"subitem_access_right": "open access", "subitem_access_right_uri": "http://purl.org/coar/access_right/c_abf2"}]}, "item_creator": {"attribute_name": "著者", "attribute_type": "creator", "attribute_value_mlt": [{"creatorNames": [{"creatorName": "WU, Jun", "creatorNameLang": "en"}], "nameIdentifiers": [{"nameIdentifier": "41908", "nameIdentifierScheme": "WEKO"}]}, {"creatorAffiliations": [{"affiliationNameIdentifiers": [{"affiliationNameIdentifier": "10103", "affiliationNameIdentifierScheme": "kakenhi"}], "affiliationNames": [{"affiliationName": "室蘭工業大学", "affiliationNameLang": "ja"}, {"affiliationName": "Muroran Institute of Technology", "affiliationNameLang": "en"}]}], "creatorNames": [{"creatorName": "OTA, Kaoru", "creatorNameLang": "en"}, {"creatorName": "太田, 香", "creatorNameLang": "ja"}, {"creatorName": "オオタ, カオル", "creatorNameLang": "ja-Kana"}], "familyNames": [{"familyName": "OTA", "familyNameLang": "en"}, {"familyName": "太田", "familyNameLang": "ja"}, {"familyName": "オオタ", "familyNameLang": "ja-Kana"}], "givenNames": [{"givenName": " Kaoru", "givenNameLang": "en"}, {"givenName": "香", "givenNameLang": "ja"}, {"givenName": "カオル", "givenNameLang": "ja-Kana"}], "nameIdentifiers": [{"nameIdentifier": "21131", "nameIdentifierScheme": "WEKO"}, {"nameIdentifier": "1000050713971", "nameIdentifierScheme": "NRID", "nameIdentifierURI": "https://nrid.nii.ac.jp/ja/nrid/1000050713971"}]}, {"creatorAffiliations": [{"affiliationNameIdentifiers": [{"affiliationNameIdentifier": "10103", "affiliationNameIdentifierScheme": "kakenhi"}], "affiliationNames": [{"affiliationName": "室蘭工業大学", "affiliationNameLang": "ja"}, {"affiliationName": "Muroran Institute of Technology", "affiliationNameLang": "en"}]}], "creatorNames": [{"creatorName": "DONG, Mianxiong", "creatorNameLang": "en"}, {"creatorName": "トウ, メンユウ", "creatorNameLang": "ja-Kana"}, {"creatorName": "董, 冕雄", "creatorNameLang": "ja"}], "familyNames": [{"familyName": "DONG", "familyNameLang": "en"}, {"familyName": "トウ", "familyNameLang": "ja-Kana"}, {"familyName": "董", "familyNameLang": "ja"}], "givenNames": [{"givenName": " Mianxiong", "givenNameLang": "en"}, {"givenName": "メンユウ", "givenNameLang": "ja-Kana"}, {"givenName": "冕雄", "givenNameLang": "ja"}], "nameIdentifiers": [{"nameIdentifier": "39157", "nameIdentifierScheme": "WEKO"}, {"nameIdentifier": "1000020728274", "nameIdentifierScheme": "NRID", "nameIdentifierURI": "https://nrid.nii.ac.jp/ja/nrid/1000020728274"}]}, {"creatorAffiliations": [{"affiliationNameIdentifiers": [], "affiliationNames": [{"affiliationName": "", "affiliationNameLang": "ja"}]}], "creatorNames": [{"creatorName": "LI, Chunxiao", "creatorNameLang": "en"}], "familyNames": [{"familyName": "LI", "familyNameLang": "en"}], "givenNames": [{"givenName": "Chunxiao", "givenNameLang": "en"}], "nameIdentifiers": [{"nameIdentifier": "41909", "nameIdentifierScheme": "WEKO"}]}]}, "item_files": {"attribute_name": "ファイル情報", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_date", "date": [{"dateType": "Available", "dateValue": "2016-05-16"}], "displaytype": "detail", "download_preview_message": "", "file_order": 0, "filename": "IEEE A_4_416-424.pdf", "filesize": [{"value": "5.4 MB"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_note", "mimetype": "application/pdf", "size": 5400000.0, "url": {"label": "IEEE A_4_416-424", "objectType": "fulltext", "url": "https://muroran-it.repo.nii.ac.jp/record/8900/files/IEEE A_4_416-424.pdf"}, "version_id": "8178a3ab-c135-4a39-8dfb-bb92dbdc4edc"}]}, "item_keyword": {"attribute_name": "キーワード", "attribute_value_mlt": [{"subitem_subject": "Smart city", "subitem_subject_language": "en", "subitem_subject_scheme": "Other"}, {"subitem_subject": "attack detection", "subitem_subject_language": "en", "subitem_subject_scheme": "Other"}, {"subitem_subject": "chance discovery", "subitem_subject_language": "en", "subitem_subject_scheme": "Other"}, {"subitem_subject": "software-defined networking", "subitem_subject_language": "en", "subitem_subject_scheme": "Other"}, {"subitem_subject": "wireless sensor networks (WSNs)", "subitem_subject_language": "en", "subitem_subject_scheme": "Other"}]}, "item_language": {"attribute_name": "言語", "attribute_value_mlt": [{"subitem_language": "eng"}]}, "item_resource_type": {"attribute_name": "資源タイプ", "attribute_value_mlt": [{"resourcetype": "journal article", "resourceuri": "http://purl.org/coar/resource_type/c_6501"}]}, "item_title": "A Hierarchical Security Framework for Defending Against Sophisticated Attacks on Wireless Sensor Networks in Smart Cities", "item_titles": {"attribute_name": "タイトル", "attribute_value_mlt": [{"subitem_title": "A Hierarchical Security Framework for Defending Against Sophisticated Attacks on Wireless Sensor Networks in Smart Cities", "subitem_title_language": "en"}]}, "item_type_id": "79", "owner": "18", "path": ["46", "316", "352"], "permalink_uri": "http://hdl.handle.net/10258/00008890", "pubdate": {"attribute_name": "PubDate", "attribute_value": "2016-05-16"}, "publish_date": "2016-05-16", "publish_status": "0", "recid": "8900", "relation": {}, "relation_version_is_last": true, "title": ["A Hierarchical Security Framework for Defending Against Sophisticated Attacks on Wireless Sensor Networks in Smart Cities"], "weko_shared_id": -1}
A Hierarchical Security Framework for Defending Against Sophisticated Attacks on Wireless Sensor Networks in Smart Cities
http://hdl.handle.net/10258/00008890
http://hdl.handle.net/10258/000088907937ac23-dc3a-4f40-b6cf-4eeaacadca5f
名前 / ファイル | ライセンス | アクション |
---|---|---|
IEEE A_4_416-424 (5.4 MB)
|
|
Item type | 学術雑誌論文 / Journal Article.(1) | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
公開日 | 2016-05-16 | |||||||||||||||||
タイトル | ||||||||||||||||||
言語 | en | |||||||||||||||||
タイトル | A Hierarchical Security Framework for Defending Against Sophisticated Attacks on Wireless Sensor Networks in Smart Cities | |||||||||||||||||
言語 | ||||||||||||||||||
言語 | eng | |||||||||||||||||
キーワード | ||||||||||||||||||
言語 | en | |||||||||||||||||
主題Scheme | Other | |||||||||||||||||
主題 | Smart city | |||||||||||||||||
キーワード | ||||||||||||||||||
言語 | en | |||||||||||||||||
主題Scheme | Other | |||||||||||||||||
主題 | attack detection | |||||||||||||||||
キーワード | ||||||||||||||||||
言語 | en | |||||||||||||||||
主題Scheme | Other | |||||||||||||||||
主題 | chance discovery | |||||||||||||||||
キーワード | ||||||||||||||||||
言語 | en | |||||||||||||||||
主題Scheme | Other | |||||||||||||||||
主題 | software-defined networking | |||||||||||||||||
キーワード | ||||||||||||||||||
言語 | en | |||||||||||||||||
主題Scheme | Other | |||||||||||||||||
主題 | wireless sensor networks (WSNs) | |||||||||||||||||
資源タイプ | ||||||||||||||||||
資源タイプ識別子 | http://purl.org/coar/resource_type/c_6501 | |||||||||||||||||
資源タイプ | journal article | |||||||||||||||||
アクセス権 | ||||||||||||||||||
アクセス権 | open access | |||||||||||||||||
アクセス権URI | http://purl.org/coar/access_right/c_abf2 | |||||||||||||||||
著者 |
WU, Jun
× WU, Jun× 太田, 香
WEKO
21131
× 董, 冕雄
WEKO
39157
× LI, Chunxiao |
|||||||||||||||||
室蘭工業大学研究者データベースへのリンク | ||||||||||||||||||
太田 香(OTA Kaoru) | ||||||||||||||||||
http://rdsoran.muroran-it.ac.jp/html/100000140_ja.html | ||||||||||||||||||
室蘭工業大学研究者データベースへのリンク | ||||||||||||||||||
董 冕雄(DONG Mianxiong) | ||||||||||||||||||
http://rdsoran.muroran-it.ac.jp/html/100000145_ja.html | ||||||||||||||||||
抄録 | ||||||||||||||||||
内容記述タイプ | Abstract | |||||||||||||||||
内容記述 | In smart cities, wireless sensor networks (WSNs) act as a type of core infrastructure that collects data from the city to implement smart services. The security of WSNs is one of the key issues of smart cities. In resource-restrained WSNs, dynamic ongoing or unknown attacks usually steer clear of isolated defense components. Therefore, to resolve this problem, we propose a hierarchical framework based on chance discovery and usage control (UCON) technologies to improve the security of WSNs while still taking the low-complexity and high security requirements of WSNs into account. The features of continuous decision and dynamic attributes in UCON can address ongoing attacks using advanced persistent threat detection. In addition, we use a dynamic adaptive chance discovery mechanism to detect unknown attacks. To design and implement a system using the mechanism described above, a unified framework is proposed in which low-level attack detection with simple rules is performed in sensors, and high-level attack detection with complex rules is performed in sinks and at the base station. Moreover, software-defined networking and network function virtualization technologies are used to perform attack mitigation when either low-level or high-level attacks are detected. An experiment was performed to acquire an attack data set for evaluation. Then, a simulation was created to evaluate the resource consumption and attack detection rate. The results demonstrate the feasibility and efficiency of the proposed scheme. | |||||||||||||||||
言語 | en | |||||||||||||||||
書誌情報 |
en : IEEE Access 巻 4, p. 416-424, 発行日 2016 |
|||||||||||||||||
出版者 | ||||||||||||||||||
言語 | en | |||||||||||||||||
出版者 | IEEE | |||||||||||||||||
出版者版へのリンク | ||||||||||||||||||
10.1109/ACCESS.2016.2517321 | ||||||||||||||||||
https://doi.org/10.1109/ACCESS.2016.2517321 | ||||||||||||||||||
DOI | ||||||||||||||||||
関連タイプ | isIdenticalTo | |||||||||||||||||
識別子タイプ | DOI | |||||||||||||||||
関連識別子 | 10.1109/ACCESS.2016.2517321 | |||||||||||||||||
日本十進分類法 | ||||||||||||||||||
主題Scheme | NDC | |||||||||||||||||
主題 | 547 | |||||||||||||||||
ISSN | ||||||||||||||||||
収録物識別子タイプ | PISSN | |||||||||||||||||
収録物識別子 | 2169-3536 | |||||||||||||||||
権利 | ||||||||||||||||||
言語 | en | |||||||||||||||||
権利情報 | © 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. | |||||||||||||||||
著者版フラグ | ||||||||||||||||||
出版タイプ | VoR | |||||||||||||||||
出版タイプResource | http://purl.org/coar/version/c_970fb48d4fbd8a85 | |||||||||||||||||
フォーマット | ||||||||||||||||||
内容記述タイプ | Other | |||||||||||||||||
内容記述 | application/pdf |