Abstract
In recent years, wireless sensor networks have many potential applications for both civil and military tasks. However, sensor networks are susceptible to many types of attacks because they are deployed in open and unprotected environment. So it is necessary to use effective mechanisms to protect sensor networks against many types of attacks on routing protocols. Intrusion detection is one of the major and efficient defense methods against attacks in a computer network and system. Because of different characteristics of sensor networks, security solutions have to be designed with limited usage of computation and resources. In this paper, we proposed a hybrid, lightweight intrusion detection system integrated for sensor networks. Our intrusion detection scheme take advantage of cluster-based protocol to build a hierarchical network and provide an intrusion framework based both on anomaly and misuse techniques. Our scheme can prevent most of routing attacks on sensor networks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Ilyas, M., Mahgoub, I.: Handbook of sensor networks: Compact wireless and wired sensing systems. CRC Press, Boca Raton, USA (2005)
Wood, A.D., Stankovic, J.A.: Denial of Service in Sensor Networks. Computer 35(10), 54–62 (2002)
Karlof, C., Wagner, D.: Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures. Elsevier’s Ad. Hoc. Networks Journal, Special issue on sensor network applications and protocols (2003)
Djenouri, D., Khelladi, L., Badache, A.N.: A survey of security issues in mobile ad hoc and sensor networks. Communications Surveys & Tutorials 7(4), 2–28
Heady, R., et al.: The Architecture of a Network Level Intrusion Detection System. Computer Science Department, University of New Mexico, Tech. Rep. (August 1990)
Roesch, M.: The SNORT Network Intrusion Detection System (2002), http://www.snort.org
Paxson, V.: BRO: A System for Detecting Network Intruders in Real-Time. In: Proceedings of the 7th USENIX Security Symposium.
Balasubramaniyan, J.S., Garcia-Fernandez, J.O., Isacoff, D., Spafford, E.H., Zamboni, D.: An architecture for intrusion detection using autonomous agents. In: 14th Annual Computer Security Applications Conference (ACSAC’ 98) (1998)
Cuppens, F., Miege, A.: Alert correlation in a cooperative intrusion detection framework. In: Proceedings of IEEE Symposium on Security and Privacy, IEEE Computer Society Press, Los Alamitos (2002s)
Janakiraman, R., Waldvogel, M., Zhang, I.Q.: A peer-to-peer approche to network intrusion detection and prevention, unpublished manuscript (2003)
Aboelaze, M., Aloul, F.: Current and Future Trends in Sensor Networks: A Survey. In: Second IFIP International Conference on Wireless and Optical Communications Networks (2005)
Crossbow Technology: http://www.xbow.com
Heinzelman, W., Chandrakasan, A., Balakrishnan, H.: Energy-efficient communication protocol for wireless microsensor networks. In: Proc. 33rd Hawaii Int. Conf. Syst. Sci (HICSS ’00) (January 2000)
Khalil, I., Bagchi, S., Shroff, N.B.: LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks. In: International Conference on Dependable Systems and Networks (2005)
Debar, H., Curry, D., Feinstein, B.: The Intrusion Detection Message Exchange Format (January 2005)
da Silva, A.P.R., Loureiro, A.A.F., Martins, M.H.T., Ruiz, L.B., Rocha, B.P.S., Wong, H.C.: Decentralized Intrusion Detection in Wireless Sensor Networks. In: International Workshop on Modeling Analysis and Simulation of Wireless and Mobile Systems (October 2005)
Camtepe, S.A., Yener, B.: Key Distribution Mechanisms for Wireless Sensor Networks: A Survey (2005)
Lindsey, S., Raghavendra, C.: PEGASIS: power-efficient gathering in sensor information systems. In: Int. Conf. Communication Protocols, pp. 149–155 (2001)
Manjeshwar, A., Agarwal, D.P.: TEEN: a routing protocol for enhanced efficiency in wireless sensor networks. In: 1st Int. Workshop Parallel Distributed Computing Issues Wireless Networks Mobile Computing (April 2001)
Manjeshwar, A., Agarwal, D.P.: APTEEN: a hybrid protocol for efficient routing and comprehensive information retrieval in wireless sensor networks. In: Parallel Distributed Process. Symp. Proc. Int. IPDPS 2002, pp. 195–202 (2002)
Newsome, J., Shi, E., Song, D., Perrig, A.: The Sybil attack in sensor network: analysis & defenses. In: Third International Symposium on Information Processing in Sensor Networks (2004)
Onat, I., Miri, A.: An Intrusion Detection System for Wireless Sensor Networks. In: IEEE International Conference on Wireless And Mobile Computing, Networking And Communications. IEEE Computer Society Press, Los Alamitos (2005)
Banerjee, S., Grosan, C., Abraham, A.: IDEAS: intrusion detection based on emotional ants for sensors. In: 5th International Conference on Intelligent Systems Design and Applications (2005)
Techateerawat, P., Jennings, A.: Energy Efficiency of Intrusion Detection Systems in Wireless Sensor Networks. In: IEEE/WIC/ACM International Conference on Web Intelligence and International Agent Technology Workshops (2006)
Loo, C.E., Ng, M.Y., Leckie, C., Palaniswami, M.: Intrusion Detection for Routing Attacks in Sensor Networks. International Journal of Distributed Sensor Networks 2(4) (October–December 2006)
Doumit, S., Agrawal, D.P.: Self-organized criticality & stochastic learning based intrusion detection system for wireless sensor network. In: MILCOM 2003 - IEEE Military Communications Conference, vol. 22(1), pp. 609–614. IEEE Computer Society Press, Los Alamitos (2003)
Ourstou, Matzner, S., Stump, W., Hopkins, B., Richards, K.: Identifying Coordinated Internet Attacks. In: Processing of the Second SSGRR Conference, Rome, Italy (2001)
Park, H.J., Cho, S.B.: Privilege Flows Modeling for Effective Intrusion Detection based on HMM, Department of Computer Science, Yonsei University, Seoul, Korea
Roman, R., Zhou, J., Lopez, J.: Applying intrusion detection systems to wireless sensor networks. In: 3rd IEEE Consumer Communications and Networking Conference, IEEE Computer Society Press, Los Alamitos (2006)
Smart Dust Project, Robotics and Intelligent Machines Laboratory, University of California at Berkeley (2001), http://robotics.eecs.berkeley.edu/~pister/SmartDust
Gui, C., Mohapatra, P.: Virtual patrol: a new power conservation design for surveillance using sensor networks. In: Fourth International Symposium on Information Processing in Sensor Networks (2005)
Bianchi, G.: Performance analysis of the IEEE 802.11 Distributed Coordination Function. IEEE Journal on Selected Areas in Communications 18(3), 535–547 (2000)
Szewczyk, R., Polastre, J., Mainwaring, A.M., Culler, D.E.: Lessons from a Sensor Network Expedition. In: First European Workshop on Wireless Sensor Networks (2004)
Mishra, A., Nadkarni, A., Patcha, K.: Intrusion Detection in Wireless Ad hoc Networks. IEEE Wireless Communications 11(1) (2004)
Internet Computing & Security Lab, Kyung Hee University, http://www.icns.khu.ac.kr
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hai, T.H., Khan, F., Huh, EN. (2007). Hybrid Intrusion Detection System for Wireless Sensor Networks. In: Gervasi, O., Gavrilova, M.L. (eds) Computational Science and Its Applications – ICCSA 2007. ICCSA 2007. Lecture Notes in Computer Science, vol 4706. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74477-1_36
Download citation
DOI: https://doi.org/10.1007/978-3-540-74477-1_36
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-74475-7
Online ISBN: 978-3-540-74477-1
eBook Packages: Computer ScienceComputer Science (R0)