Skip to main content

Hybrid Intrusion Detection System for Wireless Sensor Networks

  • Conference paper
Computational Science and Its Applications – ICCSA 2007 (ICCSA 2007)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 4706))

Included in the following conference series:

Abstract

In recent years, wireless sensor networks have many potential applications for both civil and military tasks. However, sensor networks are susceptible to many types of attacks because they are deployed in open and unprotected environment. So it is necessary to use effective mechanisms to protect sensor networks against many types of attacks on routing protocols. Intrusion detection is one of the major and efficient defense methods against attacks in a computer network and system. Because of different characteristics of sensor networks, security solutions have to be designed with limited usage of computation and resources. In this paper, we proposed a hybrid, lightweight intrusion detection system integrated for sensor networks. Our intrusion detection scheme take advantage of cluster-based protocol to build a hierarchical network and provide an intrusion framework based both on anomaly and misuse techniques. Our scheme can prevent most of routing attacks on sensor networks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ilyas, M., Mahgoub, I.: Handbook of sensor networks: Compact wireless and wired sensing systems. CRC Press, Boca Raton, USA (2005)

    Google Scholar 

  2. Wood, A.D., Stankovic, J.A.: Denial of Service in Sensor Networks. Computer 35(10), 54–62 (2002)

    Article  Google Scholar 

  3. Karlof, C., Wagner, D.: Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures. Elsevier’s Ad. Hoc. Networks Journal, Special issue on sensor network applications and protocols (2003)

    Google Scholar 

  4. Djenouri, D., Khelladi, L., Badache, A.N.: A survey of security issues in mobile ad hoc and sensor networks. Communications Surveys & Tutorials 7(4), 2–28

    Google Scholar 

  5. Heady, R., et al.: The Architecture of a Network Level Intrusion Detection System. Computer Science Department, University of New Mexico, Tech. Rep. (August 1990)

    Google Scholar 

  6. Roesch, M.: The SNORT Network Intrusion Detection System (2002), http://www.snort.org

  7. Paxson, V.: BRO: A System for Detecting Network Intruders in Real-Time. In: Proceedings of the 7th USENIX Security Symposium.

    Google Scholar 

  8. Balasubramaniyan, J.S., Garcia-Fernandez, J.O., Isacoff, D., Spafford, E.H., Zamboni, D.: An architecture for intrusion detection using autonomous agents. In: 14th Annual Computer Security Applications Conference (ACSAC’ 98) (1998)

    Google Scholar 

  9. Cuppens, F., Miege, A.: Alert correlation in a cooperative intrusion detection framework. In: Proceedings of IEEE Symposium on Security and Privacy, IEEE Computer Society Press, Los Alamitos (2002s)

    Google Scholar 

  10. Janakiraman, R., Waldvogel, M., Zhang, I.Q.: A peer-to-peer approche to network intrusion detection and prevention, unpublished manuscript (2003)

    Google Scholar 

  11. Aboelaze, M., Aloul, F.: Current and Future Trends in Sensor Networks: A Survey. In: Second IFIP International Conference on Wireless and Optical Communications Networks (2005)

    Google Scholar 

  12. Crossbow Technology: http://www.xbow.com

  13. Heinzelman, W., Chandrakasan, A., Balakrishnan, H.: Energy-efficient communication protocol for wireless microsensor networks. In: Proc. 33rd Hawaii Int. Conf. Syst. Sci (HICSS ’00) (January 2000)

    Google Scholar 

  14. Khalil, I., Bagchi, S., Shroff, N.B.: LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks. In: International Conference on Dependable Systems and Networks (2005)

    Google Scholar 

  15. Debar, H., Curry, D., Feinstein, B.: The Intrusion Detection Message Exchange Format (January 2005)

    Google Scholar 

  16. da Silva, A.P.R., Loureiro, A.A.F., Martins, M.H.T., Ruiz, L.B., Rocha, B.P.S., Wong, H.C.: Decentralized Intrusion Detection in Wireless Sensor Networks. In: International Workshop on Modeling Analysis and Simulation of Wireless and Mobile Systems (October 2005)

    Google Scholar 

  17. Camtepe, S.A., Yener, B.: Key Distribution Mechanisms for Wireless Sensor Networks: A Survey (2005)

    Google Scholar 

  18. Lindsey, S., Raghavendra, C.: PEGASIS: power-efficient gathering in sensor information systems. In: Int. Conf. Communication Protocols, pp. 149–155 (2001)

    Google Scholar 

  19. Manjeshwar, A., Agarwal, D.P.: TEEN: a routing protocol for enhanced efficiency in wireless sensor networks. In: 1st Int. Workshop Parallel Distributed Computing Issues Wireless Networks Mobile Computing (April 2001)

    Google Scholar 

  20. Manjeshwar, A., Agarwal, D.P.: APTEEN: a hybrid protocol for efficient routing and comprehensive information retrieval in wireless sensor networks. In: Parallel Distributed Process. Symp. Proc. Int. IPDPS 2002, pp. 195–202 (2002)

    Google Scholar 

  21. Newsome, J., Shi, E., Song, D., Perrig, A.: The Sybil attack in sensor network: analysis & defenses. In: Third International Symposium on Information Processing in Sensor Networks (2004)

    Google Scholar 

  22. Onat, I., Miri, A.: An Intrusion Detection System for Wireless Sensor Networks. In: IEEE International Conference on Wireless And Mobile Computing, Networking And Communications. IEEE Computer Society Press, Los Alamitos (2005)

    Google Scholar 

  23. Banerjee, S., Grosan, C., Abraham, A.: IDEAS: intrusion detection based on emotional ants for sensors. In: 5th International Conference on Intelligent Systems Design and Applications (2005)

    Google Scholar 

  24. Techateerawat, P., Jennings, A.: Energy Efficiency of Intrusion Detection Systems in Wireless Sensor Networks. In: IEEE/WIC/ACM International Conference on Web Intelligence and International Agent Technology Workshops (2006)

    Google Scholar 

  25. Loo, C.E., Ng, M.Y., Leckie, C., Palaniswami, M.: Intrusion Detection for Routing Attacks in Sensor Networks. International Journal of Distributed Sensor Networks 2(4) (October–December 2006)

    Google Scholar 

  26. Doumit, S., Agrawal, D.P.: Self-organized criticality & stochastic learning based intrusion detection system for wireless sensor network. In: MILCOM 2003 - IEEE Military Communications Conference, vol. 22(1), pp. 609–614. IEEE Computer Society Press, Los Alamitos (2003)

    Chapter  Google Scholar 

  27. Ourstou, Matzner, S., Stump, W., Hopkins, B., Richards, K.: Identifying Coordinated Internet Attacks. In: Processing of the Second SSGRR Conference, Rome, Italy (2001)

    Google Scholar 

  28. Park, H.J., Cho, S.B.: Privilege Flows Modeling for Effective Intrusion Detection based on HMM, Department of Computer Science, Yonsei University, Seoul, Korea

    Google Scholar 

  29. Roman, R., Zhou, J., Lopez, J.: Applying intrusion detection systems to wireless sensor networks. In: 3rd IEEE Consumer Communications and Networking Conference, IEEE Computer Society Press, Los Alamitos (2006)

    Google Scholar 

  30. Smart Dust Project, Robotics and Intelligent Machines Laboratory, University of California at Berkeley (2001), http://robotics.eecs.berkeley.edu/~pister/SmartDust

  31. Gui, C., Mohapatra, P.: Virtual patrol: a new power conservation design for surveillance using sensor networks. In: Fourth International Symposium on Information Processing in Sensor Networks (2005)

    Google Scholar 

  32. Bianchi, G.: Performance analysis of the IEEE 802.11 Distributed Coordination Function. IEEE Journal on Selected Areas in Communications 18(3), 535–547 (2000)

    Article  Google Scholar 

  33. Szewczyk, R., Polastre, J., Mainwaring, A.M., Culler, D.E.: Lessons from a Sensor Network Expedition. In: First European Workshop on Wireless Sensor Networks (2004)

    Google Scholar 

  34. Mishra, A., Nadkarni, A., Patcha, K.: Intrusion Detection in Wireless Ad hoc Networks. IEEE Wireless Communications 11(1) (2004)

    Google Scholar 

  35. Internet Computing & Security Lab, Kyung Hee University, http://www.icns.khu.ac.kr

Download references

Author information

Authors and Affiliations

Authors

Editor information

Osvaldo Gervasi Marina L. Gavrilova

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hai, T.H., Khan, F., Huh, EN. (2007). Hybrid Intrusion Detection System for Wireless Sensor Networks. In: Gervasi, O., Gavrilova, M.L. (eds) Computational Science and Its Applications – ICCSA 2007. ICCSA 2007. Lecture Notes in Computer Science, vol 4706. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74477-1_36

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-74477-1_36

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-74475-7

  • Online ISBN: 978-3-540-74477-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics