SlideShare ist ein Scribd-Unternehmen logo
1 von 17
ENERGY-EFFICIENT INTRUSION DETECTION                                            IN
                    WIRELESS SENSOR NETWORK




     Solmaz Salehian , Farzaneh Masoumiyan , Dr. Nur Izura Udzir

     Department of Communication Technology and Network
     Faculty of Computer Science and Information Technology,
     Universiti Putra Malaysia
     UPM Serdang, Malaysia




The International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec2012)
OUTLINE


      1   Introduction

      2   IDS in WSN

      3   Simulation

      4   Analysis and Conclusion



                                    2
INTRODUCTION
                             Encryption, Authentication
               prevention    Firewalls,…




   Security
   solutions                Anomaly
                            Detection



               Intrusion
               detection


                              Misuse
                             Detection


                                                          3
INTRODUCTION


o  WSNs consist of a collection of sensor nodes which are
distributed in open environment in various locations.

o   Deploying sensors in open and unprotected environment and
    dynamic topology in WSNs raises security issues.

o   IDS can be used to detect and determine whether the
    packets are malicious or neighbor node is anomalous.



                                                                4
ROUTING   PROTOCOL     CLASSIFICATION           BASED ON NETWORK
STRUCTURE IN   WSNS:




      location-based RP                                          Flat-based RP




                                                                                 5
                             Hierarchical RP
                         Fig1.Routing protocols classification
Energy-Efficient IDS in WSN

 HIERARCHICAL ROUTING

• An IDS for CHs because in this
routing most attackers which are the
targets for attackers

•The anomaly and misuse detection
techniques are used as a hybrid
technique, and the rules-based analysis
method is used to        build anomaly
detection modules and experts defined
the corresponding rules.
                                          Fig2.Hybrid tech




                                                             6
Energy-Efficient IDS in WSN

 HIERARCHICAL ROUTING CONT…


   Anomaly detection provides a high detection rate, but high false
    positive rate. The misuse detection has high accuracy but low
    detection rate, so HIDS combines of the high detection rate of
    anomaly detection and the high accuracy of misuse detection
    and thus increase detection of unknown attacks.




                                                                       7
Energy-Efficient IDS in WSN
 FLAT-BASED ROUTING

      An anomaly intrusion detection algorithm is used.


      According to network structure, all nodes have the following
       characteristics:
   1) the neighbors of a specific node do not change during the course
      of the analysis. This means three things:
      Nodes are stationary, Transmission power levels do not change,
       and no new node is added after a network is deployed.
      Each node can uniquely identify its neighbors (for example, using
       an assigned id).
      Data and control packet flows are directional.



                                                                           8
   Each node provides neighboring nodes’ activities, and builds
    a simple dynamic of the statistical model neighboring
    nodes.


   using statistic detection model detects whether the neighbor
    node is anomalous. In this model the anomaly detection
    algorithm executes at each node separately.


   The nodes can identify a legitimate neighbor by comparing a
    small number of received packet features.




                                                                   9
Energy-Efficient IDS in WSN

 LOCATION-BASED ROUTING

    Algorithm 1 is developed to detect intrusion on the network.
     Algorithms 2 will carry-out analysis on every packet sent by the
     sensor nodes. The implementation of the two Algorithm will
     achieve intrusion detection and types of intrusion on the
     network.

    Energy consumed will be reduced during single hop data
     transmission from SN to BS. A careful consideration should be
     given to distance between a sensor and BS before the sensors
     were deployed, and keeping a close range of sensors to BS is
     important.

    All traffic from sensors must pass through installed IDS in
     the BSs. If any attack is detected, data received from the attack
     node will be stopped. Mobile Agents (MAs) are used to facilitate
     communication among the BSs and also enhance intrusion
     detection and prevention. Using MAs can help address over-          10
     loading issues in the BSs.
Satellite



         BS server




Sensor



                                                  Mobile agent
                                                                 11

                     Fig3.Architecture view of D-IDS
SIMULATION OF IDS IN WSNS


   using the KDDCup'99 dataset; as a training sample and testing
    dataset in experiment.KDDCup'99 dataset.


   Another measure is using the JSIM platform in order to
    investigate whether the proposed secure routing protocol can
    detect the malicious nodes.


   Evaluating on real data gathered for WSNs which used TMote sky
    wireless sensor for testing and simulation based on specified
    parameters.



                                                                     12
ANALYSIS & CONCLUSION
   In hierarchical routing protocols : Protecting the CHs in hierarchical
    routing not only can detect attack ,but also can help to prolong network life
    time and decrease energy consumption. However, in this routing protocol,
    finding a suitable path to the BS and avoiding route misbehavior must be
    considered.

   In flat-based routing protocols: This routing protocol can partially preserve
    energy, but selecting legitimate nodes within the network is a challenge, and
    the presented algorithms try to overcome this problem by detecting
    anomalous and malicious nodes over network with regard to maintaining the
    path which comprises memory resources. But this routing protocol becomes
    necessary when reliability is strong.

   In location-based routing protocol : In this routing protocol power loss is
    increased specially when the nodes are located far from the BS; hence,
    proposed models try to overcome this issue, for example by limiting SNs to
    those which have data to transmit, or by making routing decision based on
    location and trust information and ignoring nodes with poor trustworthiness
    during routing .

                                                                                    13
REFERENCES
[1]    C. F. García-Hernández, P. H. Ibargüengoytia-González, J. García-Hernández, and J. A. Pérez-Díaz (2007).
      Wireless Sensor Networks and Applications: A Survey, in International Journal of Computer Science Issues
      (IJCSI), 7(30):264-273.
[2]   P. García-Teodoro, J. Díaz-Verdejo, G. Maciá-Fernández, and E. Vázquez (2009), Anomaly-based
      Network Intrusion Detection: Techniques, Systems and Challenges. Computers & Security, 28(1–
2):18–28.
[3]   A. Patcha and J-M. Park (2007), An Overview of Anomaly Detection Techniques: Existing Solutions
      and Latest Technological Trends. Computer Networks, 51(12):3448–3470.
[4]   Q. Wang, S. Wang and Z. Meng (2009), Applying an Intrusion Detection Algorithm to Wireless Sensor
      Networks. In Procs. Second International Workshop on Knowledge Discovery and Data Mining (WKDD
      2009), pp. 284–287.
[5]   K.Q. Yan, S. C. Wang., S.S. Wang and C.W. Liu (2010), Hybrid Intrusion Detection System for
      Enhancing the Security of a Cluster-based Wireless Sensor Network. In Proceedings of the Computer
      Science and Information Technology (ICCSIT), July 2010, vol.1, pp.114-118.
[6]   J. N. Al-Karaki and A. E. Kamal (2004), Routing Techniques in Wireless Sensor Networks: A Survey. IEEE
      Wireless Communications, 11(6):6–28.
[7]   L. J. G. Villalba, A. L. S. Orozco, A. T. Cabrera, and C. J. B. Abbas (2009), Routing Protocols in Wireless
      Sensor Networks, Sensors, 9(11):8399–8421.
[8]   D. Liu and Q. Dong (2007), Detecting misused keys in wireless sensor networks. In Procs. IPCCC 2007, April
      2007, pp. 272 - 280.
[9]   M-W. Park, J-M. Kim, Y-J. Han, and T-M. Chung (2008), A Misused Key Detection Mechanism for Hierarchical
      Routings in Wireless Sensor Network. In Fourth International Conference on Networked Computing and
                                                                                                                    14
      Advanced Information Management 2008 (NCM’08), pp. 47–52.
REFERENCES CONT…
[10] M. K. Watfa, and S. Commuri (2006), Energy-efficient Approaches to Coverage Holes Detection inWireless Sensor
     Networks. In IEEE International Symposium on Intelligent Control, 4-6 Oct. 2006, Munich, Germany, pp. 131–136.
[11] C-F. Hsieh, Y-F. Huang, and R-C. Chen (2011), A Light-Weight Ranger Intrusion Detection System on Wireless Sensor
     Networks. In 2011 Fifth International Conference on Genetic and Evolutionary Computing (ICGEC), pp. 49–52.
[12] L. Guorui, J. He, and Y. Fu (2008), Group-based Intrusion Detection System in Wireless Sensor Networks,
     Computer Communications, 31(18):4324–4332.
[13] I. Onat and A. Miri (2005), An intrusion detection system for Wireless sensor networks, in Procs. IEEE International
     Conference on Wireless And Mobile Computing, Networking and Communications (WiMob'2005), 22-24 Aug.
     2005, pp. 253–259.
[14] S. Janakiraman, S. Rajasoundaran, and P. Narayanasamy (2012). The Model #x2014: Dynamic and Flexible Intrusion
     Detection Protocol for
High Error Rate Wireless Sensor Networks Based on Data Flow. In 2012 International Conference on Computing,
    Communication and
Applications (ICCCA), pp. 1 –6.
[15] M.A. Rassam, M.A. Maarof, and A. Zainal (2011). A Novel Intrusion Detection Framework for Wireless Sensor Networks.
     In 2011 7th
International Conference on Information Assurance and Security (IAS), pp. 350 –353.
[16] T. Zahariadis, P. Trakadas, S. Maniatis, P. Karkazis, H. C. Leligou, and S. Voliotis (2009), Efficient Detection of Routing
     Attacks in Wireless
Sensor Networks. In 16th International Conference on Systems, Signals and Image Processing (IWSSIP 2009), pp. 1–4.
[17] S. I. Eludiora, O. O. Abiona, A. O. Oluwatope, S. A. Bello, M.L. Sanni, D. O. Ayanda, C.E. Onime, E. R. Adagunodo, and L.O.
     Kehind (2011), A Distributed Intrusion Detection Scheme for Wireless Sensor Networks,               in Procs.    IEEE
     International    Conference      on Electro/Information Technology (EIT) 2011, pp.1-5.
                                                                                                                                   15
[18] SmartDetect WSN Team (2010), SmartDetect: An Efficient WSN Implementation for Intrusion Detection               in 2010
     Second International Conference on Communication Systems and Networks (COMSNETS), pp. 1 –2.
REFERENCES CONT…

 [19] M. Khan, G. Pandurangan, and V. S. Anil Kumar (2009). Distributed algorithms for constructing
     approximate minimum spanning trees in wireless sensor networks, IEEE Transactions on Parallel
     and Distributed Systems, 20:124–139, Jan. 2009.
 [20] R. Subramanian, P.V. Kumar, S. Krishnan, B. Amrutur, J. Sebastian, M. Hegde, S.V.R. Anand (2009).
      A low-complexity algorithm for intrusion detection in a pir-based wireless sensor network, in
      International Conference Series on Intelligent Sensors, Sensor Networks and Information Processing.
 [21] F. Ye, G. Zhong, S. Lu, and L. Zhang (2005). Gradient broadcast: a robust data delivery protocol
      for large scale sensor networks, Wirel. Netw., 11(3):285–298.
 [22] http://www.wsn-roup.org/comment/13#comment-13


 [23] J. Yick, B. Mukherjee, and D. Ghosal (2008), Wireless Sensor Network Survey. Computer Networks , 52(12):
      2292–2330.
 [24] W. Seah and Y. K. Ta, (2010). Chapter 12: Routing Security Issues in Wireless Sensor Networks: Attacks
      and Defenses, in Sustainable Wireless Sensor networks, pp. 279-308.


 [25] Bc. L. Honus (2009). Design, Implementation and simulation of
 intrusion detection system for wireless sensor networks, M.S. Thesis,
 Masarykova Univerzita, Czech.




                                                                                                                 16
17

June.26.2012

Weitere ähnliche Inhalte

Was ist angesagt?

security in wireless sensor network
security in wireless sensor networksecurity in wireless sensor network
security in wireless sensor networkRABIA ASHRAFI
 
Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issuesMaha Saad
 
Wireless sensor network security
Wireless sensor network securityWireless sensor network security
Wireless sensor network securityargh61
 
Random key material distribution in wireless sensor networks
Random key material distribution in wireless sensor networksRandom key material distribution in wireless sensor networks
Random key material distribution in wireless sensor networksVarsha Anandani
 
11011 a0449 secure routing wsn
11011 a0449 secure routing wsn11011 a0449 secure routing wsn
11011 a0449 secure routing wsnMuqeed Abdul
 
Wireless sensor Network using Zero Knowledge Protocol ppt
Wireless sensor Network using Zero Knowledge Protocol pptWireless sensor Network using Zero Knowledge Protocol ppt
Wireless sensor Network using Zero Knowledge Protocol pptsofiakhatoon
 
Security in wireless sensor network
Security in wireless sensor networkSecurity in wireless sensor network
Security in wireless sensor networkAdit Pathak
 
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESA SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESEditor IJCTER
 
Overview on security and privacy issues in wireless sensor networks-2014
Overview on security and privacy issues in  wireless sensor networks-2014Overview on security and privacy issues in  wireless sensor networks-2014
Overview on security and privacy issues in wireless sensor networks-2014Tarek Gaber
 
Intrusion Detection Techniques for Mobile Wireless Networks
Intrusion Detection Techniques for Mobile Wireless NetworksIntrusion Detection Techniques for Mobile Wireless Networks
Intrusion Detection Techniques for Mobile Wireless Networksguest1b5f71
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor networkShubhamTakkar
 
Security issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networksSecurity issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networksMd Waresul Islam
 
Basics of Wireless sensor networks
Basics of Wireless sensor networksBasics of Wireless sensor networks
Basics of Wireless sensor networksRushin Shah
 
Wireless_Sensor_security
Wireless_Sensor_securityWireless_Sensor_security
Wireless_Sensor_securityTosha Shah
 
Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networksPiyush Mittal
 

Was ist angesagt? (20)

security in wireless sensor network
security in wireless sensor networksecurity in wireless sensor network
security in wireless sensor network
 
Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issues
 
Wireless sensor network security
Wireless sensor network securityWireless sensor network security
Wireless sensor network security
 
Random key material distribution in wireless sensor networks
Random key material distribution in wireless sensor networksRandom key material distribution in wireless sensor networks
Random key material distribution in wireless sensor networks
 
Security issues
Security issuesSecurity issues
Security issues
 
Security in WSN
Security in WSNSecurity in WSN
Security in WSN
 
11011 a0449 secure routing wsn
11011 a0449 secure routing wsn11011 a0449 secure routing wsn
11011 a0449 secure routing wsn
 
Wireless sensor Network using Zero Knowledge Protocol ppt
Wireless sensor Network using Zero Knowledge Protocol pptWireless sensor Network using Zero Knowledge Protocol ppt
Wireless sensor Network using Zero Knowledge Protocol ppt
 
Security in wireless sensor network
Security in wireless sensor networkSecurity in wireless sensor network
Security in wireless sensor network
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
 
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESA SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
 
Overview on security and privacy issues in wireless sensor networks-2014
Overview on security and privacy issues in  wireless sensor networks-2014Overview on security and privacy issues in  wireless sensor networks-2014
Overview on security and privacy issues in wireless sensor networks-2014
 
Intrusion Detection Techniques for Mobile Wireless Networks
Intrusion Detection Techniques for Mobile Wireless NetworksIntrusion Detection Techniques for Mobile Wireless Networks
Intrusion Detection Techniques for Mobile Wireless Networks
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
Security issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networksSecurity issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networks
 
Basics of Wireless sensor networks
Basics of Wireless sensor networksBasics of Wireless sensor networks
Basics of Wireless sensor networks
 
WSN IN IOT
WSN IN IOTWSN IN IOT
WSN IN IOT
 
Wireless_Sensor_security
Wireless_Sensor_securityWireless_Sensor_security
Wireless_Sensor_security
 
Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networks
 
WIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKWIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORK
 

Andere mochten auch

REALISATION OF SIMPLE COGNITIVE RADIO NETWORK BASED ON A POWER SPECTRAL DENSI...
REALISATION OF SIMPLE COGNITIVE RADIO NETWORK BASED ON A POWER SPECTRAL DENSI...REALISATION OF SIMPLE COGNITIVE RADIO NETWORK BASED ON A POWER SPECTRAL DENSI...
REALISATION OF SIMPLE COGNITIVE RADIO NETWORK BASED ON A POWER SPECTRAL DENSI...ARIK KUMAR DUTTA
 
report 1 joe final w 25eran for etisalat
report 1 joe final w 25eran for etisalatreport 1 joe final w 25eran for etisalat
report 1 joe final w 25eran for etisalateslam aboeliel
 
Spectrum Sensing Techiniques for Cognitive Radios
Spectrum Sensing Techiniques for Cognitive RadiosSpectrum Sensing Techiniques for Cognitive Radios
Spectrum Sensing Techiniques for Cognitive RadiosKonstantinos Bountouris
 
∂u∂u Multi-Tenanted Framework: Distributed Near Duplicate Detection for Big Data
∂u∂u Multi-Tenanted Framework: Distributed Near Duplicate Detection for Big Data∂u∂u Multi-Tenanted Framework: Distributed Near Duplicate Detection for Big Data
∂u∂u Multi-Tenanted Framework: Distributed Near Duplicate Detection for Big DataPradeeban Kathiravelu, Ph.D.
 
powerpoint feb
powerpoint febpowerpoint feb
powerpoint febimu409
 
A review paper based on spectrum sensing techniques in cognitive radio networks
A review paper based on spectrum sensing techniques in cognitive radio networksA review paper based on spectrum sensing techniques in cognitive radio networks
A review paper based on spectrum sensing techniques in cognitive radio networksAlexander Decker
 
Adaptive Intrusion Detection Using Learning Classifiers
Adaptive Intrusion Detection Using Learning ClassifiersAdaptive Intrusion Detection Using Learning Classifiers
Adaptive Intrusion Detection Using Learning ClassifiersPatrick Nicolas
 
ViTeNA: An SDN-Based Virtual Network Embedding Algorithm for Multi-Tenant Dat...
ViTeNA: An SDN-Based Virtual Network Embedding Algorithm for Multi-Tenant Dat...ViTeNA: An SDN-Based Virtual Network Embedding Algorithm for Multi-Tenant Dat...
ViTeNA: An SDN-Based Virtual Network Embedding Algorithm for Multi-Tenant Dat...Pradeeban Kathiravelu, Ph.D.
 
machine learning in the age of big data: new approaches and business applicat...
machine learning in the age of big data: new approaches and business applicat...machine learning in the age of big data: new approaches and business applicat...
machine learning in the age of big data: new approaches and business applicat...Armando Vieira
 
ECG graduation project
ECG graduation projectECG graduation project
ECG graduation projecteslam aboeliel
 
Intrusion detection using data mining
Intrusion detection using data miningIntrusion detection using data mining
Intrusion detection using data miningbalbeerrawat
 
Stat of the art in cognitive radio
Stat of the art in cognitive radioStat of the art in cognitive radio
Stat of the art in cognitive radioMohsen Tantawy
 
Analysis and Design for Intrusion Detection System Based on Data Mining
Analysis and Design for Intrusion Detection System Based on Data MiningAnalysis and Design for Intrusion Detection System Based on Data Mining
Analysis and Design for Intrusion Detection System Based on Data MiningPritesh Ranjan
 
2015 01-17 Lambda Architecture with Apache Spark, NextML Conference
2015 01-17 Lambda Architecture with Apache Spark, NextML Conference2015 01-17 Lambda Architecture with Apache Spark, NextML Conference
2015 01-17 Lambda Architecture with Apache Spark, NextML ConferenceDB Tsai
 
Cognitive Radio Spectrum Sensing 1586 ppt
Cognitive Radio Spectrum Sensing 1586 pptCognitive Radio Spectrum Sensing 1586 ppt
Cognitive Radio Spectrum Sensing 1586 pptAnupam Yadav
 
Using Machine Learning in Networks Intrusion Detection Systems
Using Machine Learning in Networks Intrusion Detection SystemsUsing Machine Learning in Networks Intrusion Detection Systems
Using Machine Learning in Networks Intrusion Detection SystemsOmar Shaya
 

Andere mochten auch (20)

REALISATION OF SIMPLE COGNITIVE RADIO NETWORK BASED ON A POWER SPECTRAL DENSI...
REALISATION OF SIMPLE COGNITIVE RADIO NETWORK BASED ON A POWER SPECTRAL DENSI...REALISATION OF SIMPLE COGNITIVE RADIO NETWORK BASED ON A POWER SPECTRAL DENSI...
REALISATION OF SIMPLE COGNITIVE RADIO NETWORK BASED ON A POWER SPECTRAL DENSI...
 
report 1 joe final w 25eran for etisalat
report 1 joe final w 25eran for etisalatreport 1 joe final w 25eran for etisalat
report 1 joe final w 25eran for etisalat
 
Spectrum Sensing Techiniques for Cognitive Radios
Spectrum Sensing Techiniques for Cognitive RadiosSpectrum Sensing Techiniques for Cognitive Radios
Spectrum Sensing Techiniques for Cognitive Radios
 
report
reportreport
report
 
Presentation2
Presentation2Presentation2
Presentation2
 
∂u∂u Multi-Tenanted Framework: Distributed Near Duplicate Detection for Big Data
∂u∂u Multi-Tenanted Framework: Distributed Near Duplicate Detection for Big Data∂u∂u Multi-Tenanted Framework: Distributed Near Duplicate Detection for Big Data
∂u∂u Multi-Tenanted Framework: Distributed Near Duplicate Detection for Big Data
 
powerpoint feb
powerpoint febpowerpoint feb
powerpoint feb
 
CR over LTE
CR over LTECR over LTE
CR over LTE
 
Cognitiveradio
CognitiveradioCognitiveradio
Cognitiveradio
 
A review paper based on spectrum sensing techniques in cognitive radio networks
A review paper based on spectrum sensing techniques in cognitive radio networksA review paper based on spectrum sensing techniques in cognitive radio networks
A review paper based on spectrum sensing techniques in cognitive radio networks
 
Adaptive Intrusion Detection Using Learning Classifiers
Adaptive Intrusion Detection Using Learning ClassifiersAdaptive Intrusion Detection Using Learning Classifiers
Adaptive Intrusion Detection Using Learning Classifiers
 
ViTeNA: An SDN-Based Virtual Network Embedding Algorithm for Multi-Tenant Dat...
ViTeNA: An SDN-Based Virtual Network Embedding Algorithm for Multi-Tenant Dat...ViTeNA: An SDN-Based Virtual Network Embedding Algorithm for Multi-Tenant Dat...
ViTeNA: An SDN-Based Virtual Network Embedding Algorithm for Multi-Tenant Dat...
 
machine learning in the age of big data: new approaches and business applicat...
machine learning in the age of big data: new approaches and business applicat...machine learning in the age of big data: new approaches and business applicat...
machine learning in the age of big data: new approaches and business applicat...
 
ECG graduation project
ECG graduation projectECG graduation project
ECG graduation project
 
Intrusion detection using data mining
Intrusion detection using data miningIntrusion detection using data mining
Intrusion detection using data mining
 
Stat of the art in cognitive radio
Stat of the art in cognitive radioStat of the art in cognitive radio
Stat of the art in cognitive radio
 
Analysis and Design for Intrusion Detection System Based on Data Mining
Analysis and Design for Intrusion Detection System Based on Data MiningAnalysis and Design for Intrusion Detection System Based on Data Mining
Analysis and Design for Intrusion Detection System Based on Data Mining
 
2015 01-17 Lambda Architecture with Apache Spark, NextML Conference
2015 01-17 Lambda Architecture with Apache Spark, NextML Conference2015 01-17 Lambda Architecture with Apache Spark, NextML Conference
2015 01-17 Lambda Architecture with Apache Spark, NextML Conference
 
Cognitive Radio Spectrum Sensing 1586 ppt
Cognitive Radio Spectrum Sensing 1586 pptCognitive Radio Spectrum Sensing 1586 ppt
Cognitive Radio Spectrum Sensing 1586 ppt
 
Using Machine Learning in Networks Intrusion Detection Systems
Using Machine Learning in Networks Intrusion Detection SystemsUsing Machine Learning in Networks Intrusion Detection Systems
Using Machine Learning in Networks Intrusion Detection Systems
 

Ähnlich wie Energy-Efficient IDS in WSN

SEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
SEAD: Source Encrypted Authentic Data for Wireless Sensor NetworksSEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
SEAD: Source Encrypted Authentic Data for Wireless Sensor NetworksIJERD Editor
 
Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...
Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...
Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...IJCSIS Research Publications
 
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...IJMER
 
Secure and Reliable Data Routing in Wireless Sensor Network
Secure and Reliable Data Routing in Wireless Sensor NetworkSecure and Reliable Data Routing in Wireless Sensor Network
Secure and Reliable Data Routing in Wireless Sensor Networkdbpublications
 
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING  INTERNAL ATTACK FROM WSNSA NOVEL TWO-STAGE ALGORITHM PROTECTING  INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNSIJCNC
 
A Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor NetworkA Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor NetworkCassie Romero
 
SECURED AODV TO PROTECT WSN AGAINST MALICIOUS INTRUSION
SECURED AODV TO PROTECT WSN AGAINST MALICIOUS INTRUSIONSECURED AODV TO PROTECT WSN AGAINST MALICIOUS INTRUSION
SECURED AODV TO PROTECT WSN AGAINST MALICIOUS INTRUSIONIJNSA Journal
 
A Study on Security in Wireless Sensor Networks
A Study on Security in Wireless Sensor NetworksA Study on Security in Wireless Sensor Networks
A Study on Security in Wireless Sensor Networksijtsrd
 
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...ijwmn
 
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...IJNSA Journal
 
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and SecurityIRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and SecurityIRJET Journal
 
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...IJERA Editor
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)theijes
 

Ähnlich wie Energy-Efficient IDS in WSN (20)

SEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
SEAD: Source Encrypted Authentic Data for Wireless Sensor NetworksSEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
SEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
 
Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...
Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...
Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...
 
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
 
G0933443
G0933443G0933443
G0933443
 
O010528791
O010528791O010528791
O010528791
 
Ijnsa050209
Ijnsa050209Ijnsa050209
Ijnsa050209
 
Secure and Reliable Data Routing in Wireless Sensor Network
Secure and Reliable Data Routing in Wireless Sensor NetworkSecure and Reliable Data Routing in Wireless Sensor Network
Secure and Reliable Data Routing in Wireless Sensor Network
 
50120140505014
5012014050501450120140505014
50120140505014
 
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING  INTERNAL ATTACK FROM WSNSA NOVEL TWO-STAGE ALGORITHM PROTECTING  INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
 
A Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor NetworkA Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor Network
 
SECURED AODV TO PROTECT WSN AGAINST MALICIOUS INTRUSION
SECURED AODV TO PROTECT WSN AGAINST MALICIOUS INTRUSIONSECURED AODV TO PROTECT WSN AGAINST MALICIOUS INTRUSION
SECURED AODV TO PROTECT WSN AGAINST MALICIOUS INTRUSION
 
A Study on Security in Wireless Sensor Networks
A Study on Security in Wireless Sensor NetworksA Study on Security in Wireless Sensor Networks
A Study on Security in Wireless Sensor Networks
 
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
 
574 501-507
574 501-507574 501-507
574 501-507
 
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...
 
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and SecurityIRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
 
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)
 
F33022028
F33022028F33022028
F33022028
 
F33022028
F33022028F33022028
F33022028
 

Kürzlich hochgeladen

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 

Kürzlich hochgeladen (20)

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 

Energy-Efficient IDS in WSN

  • 1. ENERGY-EFFICIENT INTRUSION DETECTION IN WIRELESS SENSOR NETWORK Solmaz Salehian , Farzaneh Masoumiyan , Dr. Nur Izura Udzir Department of Communication Technology and Network Faculty of Computer Science and Information Technology, Universiti Putra Malaysia UPM Serdang, Malaysia The International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec2012)
  • 2. OUTLINE 1 Introduction 2 IDS in WSN 3 Simulation 4 Analysis and Conclusion 2
  • 3. INTRODUCTION Encryption, Authentication prevention Firewalls,… Security solutions Anomaly Detection Intrusion detection Misuse Detection 3
  • 4. INTRODUCTION o WSNs consist of a collection of sensor nodes which are distributed in open environment in various locations. o Deploying sensors in open and unprotected environment and dynamic topology in WSNs raises security issues. o IDS can be used to detect and determine whether the packets are malicious or neighbor node is anomalous. 4
  • 5. ROUTING PROTOCOL CLASSIFICATION BASED ON NETWORK STRUCTURE IN WSNS: location-based RP Flat-based RP 5 Hierarchical RP Fig1.Routing protocols classification
  • 6. Energy-Efficient IDS in WSN  HIERARCHICAL ROUTING • An IDS for CHs because in this routing most attackers which are the targets for attackers •The anomaly and misuse detection techniques are used as a hybrid technique, and the rules-based analysis method is used to build anomaly detection modules and experts defined the corresponding rules. Fig2.Hybrid tech 6
  • 7. Energy-Efficient IDS in WSN  HIERARCHICAL ROUTING CONT…  Anomaly detection provides a high detection rate, but high false positive rate. The misuse detection has high accuracy but low detection rate, so HIDS combines of the high detection rate of anomaly detection and the high accuracy of misuse detection and thus increase detection of unknown attacks. 7
  • 8. Energy-Efficient IDS in WSN  FLAT-BASED ROUTING  An anomaly intrusion detection algorithm is used.  According to network structure, all nodes have the following characteristics: 1) the neighbors of a specific node do not change during the course of the analysis. This means three things:  Nodes are stationary, Transmission power levels do not change, and no new node is added after a network is deployed.  Each node can uniquely identify its neighbors (for example, using an assigned id).  Data and control packet flows are directional. 8
  • 9. Each node provides neighboring nodes’ activities, and builds a simple dynamic of the statistical model neighboring nodes.  using statistic detection model detects whether the neighbor node is anomalous. In this model the anomaly detection algorithm executes at each node separately.  The nodes can identify a legitimate neighbor by comparing a small number of received packet features. 9
  • 10. Energy-Efficient IDS in WSN  LOCATION-BASED ROUTING  Algorithm 1 is developed to detect intrusion on the network. Algorithms 2 will carry-out analysis on every packet sent by the sensor nodes. The implementation of the two Algorithm will achieve intrusion detection and types of intrusion on the network.  Energy consumed will be reduced during single hop data transmission from SN to BS. A careful consideration should be given to distance between a sensor and BS before the sensors were deployed, and keeping a close range of sensors to BS is important.  All traffic from sensors must pass through installed IDS in the BSs. If any attack is detected, data received from the attack node will be stopped. Mobile Agents (MAs) are used to facilitate communication among the BSs and also enhance intrusion detection and prevention. Using MAs can help address over- 10 loading issues in the BSs.
  • 11. Satellite BS server Sensor Mobile agent 11 Fig3.Architecture view of D-IDS
  • 12. SIMULATION OF IDS IN WSNS  using the KDDCup'99 dataset; as a training sample and testing dataset in experiment.KDDCup'99 dataset.  Another measure is using the JSIM platform in order to investigate whether the proposed secure routing protocol can detect the malicious nodes.  Evaluating on real data gathered for WSNs which used TMote sky wireless sensor for testing and simulation based on specified parameters. 12
  • 13. ANALYSIS & CONCLUSION  In hierarchical routing protocols : Protecting the CHs in hierarchical routing not only can detect attack ,but also can help to prolong network life time and decrease energy consumption. However, in this routing protocol, finding a suitable path to the BS and avoiding route misbehavior must be considered.  In flat-based routing protocols: This routing protocol can partially preserve energy, but selecting legitimate nodes within the network is a challenge, and the presented algorithms try to overcome this problem by detecting anomalous and malicious nodes over network with regard to maintaining the path which comprises memory resources. But this routing protocol becomes necessary when reliability is strong.  In location-based routing protocol : In this routing protocol power loss is increased specially when the nodes are located far from the BS; hence, proposed models try to overcome this issue, for example by limiting SNs to those which have data to transmit, or by making routing decision based on location and trust information and ignoring nodes with poor trustworthiness during routing . 13
  • 14. REFERENCES [1] C. F. García-Hernández, P. H. Ibargüengoytia-González, J. García-Hernández, and J. A. Pérez-Díaz (2007). Wireless Sensor Networks and Applications: A Survey, in International Journal of Computer Science Issues (IJCSI), 7(30):264-273. [2] P. García-Teodoro, J. Díaz-Verdejo, G. Maciá-Fernández, and E. Vázquez (2009), Anomaly-based Network Intrusion Detection: Techniques, Systems and Challenges. Computers & Security, 28(1– 2):18–28. [3] A. Patcha and J-M. Park (2007), An Overview of Anomaly Detection Techniques: Existing Solutions and Latest Technological Trends. Computer Networks, 51(12):3448–3470. [4] Q. Wang, S. Wang and Z. Meng (2009), Applying an Intrusion Detection Algorithm to Wireless Sensor Networks. In Procs. Second International Workshop on Knowledge Discovery and Data Mining (WKDD 2009), pp. 284–287. [5] K.Q. Yan, S. C. Wang., S.S. Wang and C.W. Liu (2010), Hybrid Intrusion Detection System for Enhancing the Security of a Cluster-based Wireless Sensor Network. In Proceedings of the Computer Science and Information Technology (ICCSIT), July 2010, vol.1, pp.114-118. [6] J. N. Al-Karaki and A. E. Kamal (2004), Routing Techniques in Wireless Sensor Networks: A Survey. IEEE Wireless Communications, 11(6):6–28. [7] L. J. G. Villalba, A. L. S. Orozco, A. T. Cabrera, and C. J. B. Abbas (2009), Routing Protocols in Wireless Sensor Networks, Sensors, 9(11):8399–8421. [8] D. Liu and Q. Dong (2007), Detecting misused keys in wireless sensor networks. In Procs. IPCCC 2007, April 2007, pp. 272 - 280. [9] M-W. Park, J-M. Kim, Y-J. Han, and T-M. Chung (2008), A Misused Key Detection Mechanism for Hierarchical Routings in Wireless Sensor Network. In Fourth International Conference on Networked Computing and 14 Advanced Information Management 2008 (NCM’08), pp. 47–52.
  • 15. REFERENCES CONT… [10] M. K. Watfa, and S. Commuri (2006), Energy-efficient Approaches to Coverage Holes Detection inWireless Sensor Networks. In IEEE International Symposium on Intelligent Control, 4-6 Oct. 2006, Munich, Germany, pp. 131–136. [11] C-F. Hsieh, Y-F. Huang, and R-C. Chen (2011), A Light-Weight Ranger Intrusion Detection System on Wireless Sensor Networks. In 2011 Fifth International Conference on Genetic and Evolutionary Computing (ICGEC), pp. 49–52. [12] L. Guorui, J. He, and Y. Fu (2008), Group-based Intrusion Detection System in Wireless Sensor Networks, Computer Communications, 31(18):4324–4332. [13] I. Onat and A. Miri (2005), An intrusion detection system for Wireless sensor networks, in Procs. IEEE International Conference on Wireless And Mobile Computing, Networking and Communications (WiMob'2005), 22-24 Aug. 2005, pp. 253–259. [14] S. Janakiraman, S. Rajasoundaran, and P. Narayanasamy (2012). The Model #x2014: Dynamic and Flexible Intrusion Detection Protocol for High Error Rate Wireless Sensor Networks Based on Data Flow. In 2012 International Conference on Computing, Communication and Applications (ICCCA), pp. 1 –6. [15] M.A. Rassam, M.A. Maarof, and A. Zainal (2011). A Novel Intrusion Detection Framework for Wireless Sensor Networks. In 2011 7th International Conference on Information Assurance and Security (IAS), pp. 350 –353. [16] T. Zahariadis, P. Trakadas, S. Maniatis, P. Karkazis, H. C. Leligou, and S. Voliotis (2009), Efficient Detection of Routing Attacks in Wireless Sensor Networks. In 16th International Conference on Systems, Signals and Image Processing (IWSSIP 2009), pp. 1–4. [17] S. I. Eludiora, O. O. Abiona, A. O. Oluwatope, S. A. Bello, M.L. Sanni, D. O. Ayanda, C.E. Onime, E. R. Adagunodo, and L.O. Kehind (2011), A Distributed Intrusion Detection Scheme for Wireless Sensor Networks, in Procs. IEEE International Conference on Electro/Information Technology (EIT) 2011, pp.1-5. 15 [18] SmartDetect WSN Team (2010), SmartDetect: An Efficient WSN Implementation for Intrusion Detection in 2010 Second International Conference on Communication Systems and Networks (COMSNETS), pp. 1 –2.
  • 16. REFERENCES CONT… [19] M. Khan, G. Pandurangan, and V. S. Anil Kumar (2009). Distributed algorithms for constructing approximate minimum spanning trees in wireless sensor networks, IEEE Transactions on Parallel and Distributed Systems, 20:124–139, Jan. 2009. [20] R. Subramanian, P.V. Kumar, S. Krishnan, B. Amrutur, J. Sebastian, M. Hegde, S.V.R. Anand (2009). A low-complexity algorithm for intrusion detection in a pir-based wireless sensor network, in International Conference Series on Intelligent Sensors, Sensor Networks and Information Processing. [21] F. Ye, G. Zhong, S. Lu, and L. Zhang (2005). Gradient broadcast: a robust data delivery protocol for large scale sensor networks, Wirel. Netw., 11(3):285–298. [22] http://www.wsn-roup.org/comment/13#comment-13 [23] J. Yick, B. Mukherjee, and D. Ghosal (2008), Wireless Sensor Network Survey. Computer Networks , 52(12): 2292–2330. [24] W. Seah and Y. K. Ta, (2010). Chapter 12: Routing Security Issues in Wireless Sensor Networks: Attacks and Defenses, in Sustainable Wireless Sensor networks, pp. 279-308. [25] Bc. L. Honus (2009). Design, Implementation and simulation of intrusion detection system for wireless sensor networks, M.S. Thesis, Masarykova Univerzita, Czech. 16

Hinweis der Redaktion

  1. Security solutions in the network : prevention and detection Prevention techniques: The first line of defense like encryption, authentication, firewalls,… Intrusion detection: The second line of defense is that when preventive .Two important modules of intrusion detection : Anomaly detection and misuse detection
  2. WSN can be used for different applications such as medical monitoring, military applications, environment monitoring, and healthy applications [1]. The use of WSNs has developed rapidly in the last decade and the traditional way of protecting networks is no longer sufficient for these types of networks. Attack can occur from any direction and any node in WSNs, so one significant security problem is the networks’ intrusion detection.
  3. In flat-based routing protocols, each node plays the same roles in routing procedure [7]. In large networks, Base Station (BS) specifies certain regions and sends queries to them, and then waits for data from nodes in that region. This routing is data-centric and saves energy through data negotiation and elimination of data redundancy [6]. In hierarchical routing protocols nodes play different roles and this routing are based on clustering, and Cluster Heads (CHs) are responsible to collect data from neighbors in each cluster and sends collected data to the BS. This routing protocol is scalable and energy-efficient [6], because nodes with higher energy can be CHs. In location-based routing protocol, the transmission route for a node is based on the localization of the final destination and the other node positions [7]. In this routing, some location-based scheme in order to save energy demand nodes go to sleep mode when there is no activity [6]. In this paper several works for building IDS are presented with regard to energy consumption as a crucial resource for sensors as well as being the key challenge in WSNs. These papers are grouped based on three types of WSNs routing protocols.
  4. As shown in Fig.1, the anomaly detection module checks a large number of packets, and then the misuse detection module judges the abnormal packets. The final decision is made in the decision making module. The outputs of the anomaly detection and misuse detection modules are integrated and the types of attacks are reported to the network administrator. The decision making model uses the following rules in order to make the final decision: 1. If the anomaly detection module detects an attack but the misuse detection module does not detect an attack, then it is not an attack and it is an erroneous classification. 2. If both anomaly detection module and misuse detection module detect an attack, then it is an attack and the class of attack is determined. A three-layer Back Propagation Network (BPN) is adopted for misuse detection module, which is used to classify the attacks and evaluate the performance of the misuse detection.
  5. 2>low-complexity cooperation algorithm may improve the detection and containment process [13].
  6. TMote sky wireless sensors which are programmable, to allow intelligent communication between the SNs and the BSs
  7. The entire network may be vulnerable to various attacks. Algorithm 1 is developed to detect intrusion on the network. The BS has the power to detect the frequency at which sensor node is sending captured data. For Example, if a sensor node sending data 5s is being programmed to send every 30s interval. This becomes abnormal behavior to the BS and the BS can broadcast to other BSs within the networks to alert them. In this case the details of such a sensor node will be made available to other BSs. The data from this sensor node will not be considered pending the time it will be recovered. Algorithms 2 will carry-out analysis on every packet being sent by the sensor nodes to determine character by character the content of the packet. This will assist in detecting the false and true alerts (detection) on the network. Conclusions can then be drawn using results being generated. The implementation of the two Algorithm will achieve intrusion detection and types of intrusion on the network. Each sensor can be uniquely identified. The sensor would have being programmed before any deployment.
  8. 1>which was arranged from intrusions simulated in a military network environment, consists of 34 types of numerical features and 7 types of symbolic features, regard to different attack properties. This dataset considers many attack behaviors catagorized into four groups and one kind of normal communication,then recorded data are classified based on these four groups and normal group.2>JSim is a Java-based simulation which is for building quantitative numeric models and analyze these models regarding to experimental reference data.computational engine is quite general and it can be used in a wide range of scientific domains.3>TMoteplatform.TMote platform used the CC2420 radio communication chip which designd for low-power and low-voltage wireless applications.
  9. According to the security level standard, protocols must be as light as possible with regard to limited sensor energy in WSNs. Therefore, IDS in WSNs need to detect intrusion in a way that does not threat sensor energy dissipation.  The goal of a secure routing protocol for a WSN is to ensure the integrity, authentication, and availability of messages [18]. Most of the routing protocols for WSNs are vulnerable to various types of attacks like advertising routes by an adversary node to non-existent nodes. To handle these problems different mechanisms, for example appropriate authentication or creating trust table in each node can be used to ensure that only legitimate group nodes receive broadcast and multicast communication,