Computer Engineering, Volume. 51, Issue 8, 203(2025)
Research on Attack Construction and Intrusion Detection Methods for TDMA Wireless Sensor Networks
[1] [1] YU J Y, LEE E, OH S R, et al. A survey on security requirements for WSNs: focusing on the characteristics related to security[J]. IEEE Access, 2020, 8: 45304-45324.
[2] [2] WANG J W, ZHANG P, TANG L, et al. Intelligent passive eavesdropping in massive MIMO-OFDM systems via reinforcement learning[J]. IEEE Wireless Communications Letters, 2022, 11(6): 1248-1252.
[3] [3] BALAKRISHNAN S, WANG P, BHUYAN A, et al. Modeling and analysis of eavesdropping attack in 802. 11ad mmWave wireless networks[J]. IEEE Access, 2019, 7: 70355-70370.
[4] [4] MPITZIOPOULOS A, GAVALAS D, KONSTANTOPOULOS C, et al. A survey on jamming attacks and countermeasures in WSNs[J]. IEEE Communications Surveys & Tutorials, 2009, 11(4): 42-56.
[5] [5] STOJANOVSKI S, KULAKOV A. Efficient attacks in industrial wireless sensor networks[EB/OL]. [2023-10-05]. https://link.springer.com/chapter/10.1007/978-3-319-09879-1_29.
[7] [7] CHENG X, SHI J Y, SHA M, et al. Launching smart selective jamming attacks in WirelessHART networks[C]//Proceedings of the IEEE INFOCOM Conference on Computer Communications. Washington D.C., USA: IEEE Press, 2021: 1-10.
[8] [8] YANG W, WAN Y D, WANG Q. Enhanced secure time synchronisation protocol for IEEE802.15.4e-based industrial Internet of Things[J]. IET Information Security, 2017, 11(6): 369-376.
[10] [10] ZENG Y, ZHANG R. Active eavesdropping via spoofing relay attack[C]//Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). Washington D.C., USA: IEEE Press, 2016: 2159-2163.
[11] [11] NA X, GUO X Z, HE Y, et al. Wi-attack: cross-technology impersonation attack against iBeacon services[C]//Proceedings of the 18th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON). Washington D.C., USA: IEEE Press, 2021: 1-9.
[12] [12] ANTONIOLI D, TIPPENHAUER N O, RASMUSSEN K. BIAS: bluetooth impersonation attacks[C]//Proceedings of the IEEE Symposium on Security and Privacy (SP). Washington D.C., USA: IEEE Press, 2020: 549-562.
[14] [14] FENG H L, LIANG L, LEI H. Distributed outlier detection algorithm based on credibility feedback in wireless sensor networks[J]. IET Communications, 2017, 11(8): 1291-1296.
[15] [15] SINGH A, NAGAR J, SHARMA S, et al. A Gaussian process regression approach to predict the k-barrier coverage probability for intrusion detection in wireless sensor networks[J]. Expert Systems with Applications, 2021, 172: 114603.
[16] [16] MA C, YANG X H. A hierarchical intrusion detection model in wireless sensor networks[C]//Proceedings of the 4th IEEE International Conference on Electronics and Communication Engineering (ICECE). Washington D.C., USA: IEEE Press, 2021: 215-219.
[18] [18] AL-QATF M, YU L S, AL-HABIB M, et al. Deep learning approach combining sparse autoencoder with SVM for network intrusion detection[J]. IEEE Access, 2018, 6: 52843-52856.
[20] [20] COOK A A, MISIRLI G, FAN Z. Anomaly detection for IoT time-series data: a survey[J]. IEEE Internet of Things Journal, 2020, 7(7): 6481-6494.
[21] [21] GAO C, CHEN Y P, WANG Z M, et al. Anomaly detection frameworks for outlier and pattern anomaly of time series in wireless sensor networks[C]//Proceedings of the International Conference on Networking and Network Applications (NaNA). Washington D.C., USA: IEEE Press, 2020: 229-232.
[22] [22] LIU Y X, WANG J, LI J Q, et al. Machine learning for the detection and identification of Internet of Things devices: a survey[J]. IEEE Internet of Things Journal, 2022, 9(1): 298-320.
[23] [23] LIANG W, ZHENG M, ZHANG J L, et al. WIA-FA and its applications to digital factory: a wireless network solution for factory automation[J]. Proceedings of the IEEE, 2019, 107(6): 1053-1073.
[24] [24] LIU F T, TING K M, ZHOU Z H. Isolation Forest[C]//Proceedings of the 8th IEEE International Conference on Data Mining. Washington D.C., USA: IEEE Press, 2008: 413-422.
[25] [25] DAVIS J, GOADRICH M. The relationship between precision-recall and ROC curves[C]//Proceedings of the 23rd International Conference on Machine Learning. New York, USA: ACM Press, 2006: 233-240.
[26] [26] FAWCETT T. An introduction to ROC analysis[J]. Pattern Recognition Letters, 2006, 27(8): 861-874.
Get Citation
Copy Citation Text
WEN Minchu, LIANG Wei, ZHANG Jialin. Research on Attack Construction and Intrusion Detection Methods for TDMA Wireless Sensor Networks[J]. Computer Engineering, 2025, 51(8): 203
Category:
Received: Feb. 27, 2024
Accepted: Aug. 26, 2025
Published Online: Aug. 26, 2025
The Author Email: LIANG Wei (weiliang@sia.cn)