skip to main content
10.1145/1516241.1516282acmconferencesArticle/Chapter ViewAbstractPublication PagesicuimcConference Proceedingsconference-collections
research-article

A new method for intrusion detection on hierarchical wireless sensor networks

Published: 15 February 2009 Publication History

Abstract

Wireless Sensor Network (WSN) is a novel technology in wireless field. The main function of this technology is to use sensor nodes to sense important information, just like battlefield data and personal health information, under the limited resources. It is important to avoid malicious damage while information transmits in wireless network. So Wireless Intrusion Detection System (WIDS) becomes one of important topics in wireless sensor networks. The attack behavior of wireless sensor nodes is different to wired attackers. In this paper, we will propose an isolation table to detect intrusion in hierarchical wireless sensor networks and to estimate the effect of intrusion detection effectively. The primary experiment proves the isolation table intrusion detection can prevent attacks effectively.

References

[1]
Ahmed, N., Kanhere, S. S., and Jha, S. 2005. The Holes Problem in Wireless Sensor Networks: A Survey. Mobile Computing and Communications Review, Vol. 9, Issue2, pp. 4--18.
[2]
Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., and Cayirci, E. 2002. Wireless sensor networks: a survey. Computer Networks, Vol.38, Issue4, pp.393--422.
[3]
Bhuse, V., and Gupta, A. 2006. Anomaly intrusion detection in wireless sensor networks. Journal of High Speed Networks, Vol. 15, pp 33--51.
[4]
Brownfield, M., Yatharth, G., and Davis, N. 2005. Wireless Sensor Network Denial of Sleep Attack. Proceeding of the 6th Annual IEEE SMC, pp. 356--364.
[5]
Chadha, A., Liu, Y., and Das, S. K. 2005. Group Key Distribution via Local Collaboration in Wireless Sensor Networks. Second IEEE Sensor and Ad Hoc Communications and Networks, pp. 46--54.
[6]
Cordeiro, C. D. M., and Agrawal, D. P. 2006. Ad Hoc & Sensor Networks - Theory and Applications. World Scientific.
[7]
Deng, J., Han, R., and Mishra, S. 2005. Defending against Path-based DoS Attacks in Wireless Sensor Networks. Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks, pp. 89--96.
[8]
Du, W., Deng, J., Han, Y. S., Varshney, P., Katz, J., and Khalili, A. 2005. A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks. ACM Transactions on Information and System Security (TISSEC), Vol. 8, Issue 2, pp.228--258.
[9]
Heinzelman, W. B., Chandrakasan, A. P., and Balakrishnan, H. 2002. An Application-Specific Protocol Architecture for Wireless Microsensor Networks. IEEE Transactions on Wireless Networking, Vol. 1, Issue. 4, pp. 660--670.
[10]
Karl, H. and Willig, A. 2005. Protocols and Architectures for Wireless Sensor Networks. C. John Wiley & Sons.
[11]
Karlof, C. and Wagner, D. 2003. Secure routing in wireless sensor networks: Attacks and Countermeasures. Ad Hoc Networks, Vol.1, Issue 2--3, pp. 293--315.
[12]
Law, Y. W., Doumen, J., and Hartel, P. 2004. Survey and Benchmark of Block Ciphers for Wireless Sensor Networks. Technical Report TR-CTIT-04-07, University of Twente, Computer Science Department.
[13]
Min, R., and Chandrakasan, A. 2002. A Framework for Energy-Scalable Communication in High-Density Wireless Networks. Proceedings of International Symposium on Low Power Electronics and Designs, pp. 36--41.
[14]
Newsome, J., Shi, E., Song, D., and Perrig, A. 2004. The Sybil Attack in Sensor Networks: Analysis and Defenses. Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks, pp. 259--268.
[15]
Onat, I., and Miri, A. 2005. An Intrusion Detection System for Wireless Sensor Networks. IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, Vol.11, pp. 253--259.
[16]
Perkins, C., and Bhagwat, P. 1994. Highly Dynamic Destination - Sequenced Distance-Vector Routing (DSDV) for Mobile Computers. Proceedings of the Conference on Communications Architectures, Protocols and Applications, pp.234--244.
[17]
Pires, W. R., Paula, F., Wong, W. C., and Loureiro, A. A. F. 2004. Malicious Node Detection in Wireless Sensor Network. Proceeding of 18th International Parallel and Distributed Processing Symposium, pp. 24--30.
[18]
Qing, E., and Perrig, A. 2004. Designing Secure Sensor Networks. IEEE Wireless Communication, Vol. 11, Issue 6, pp. 38--43.
[19]
Qing, L., Zhu, Q., and Wang, M. 2006. Design of a Distributed Energy-efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks. Computer Communications, Vol. 29, Issue 12, pp 2230--2237.
[20]
Raymond, D., Marchany, R., Brownfield, M., and Midkiff, S. 2006. Effects of Denial of Sleep Attacks on Wireless Sensor Network MAC Protocols. IEEE Information Assurance Workshop, pp. 297--304.
[21]
Schafer, G. 2003. Security in Fixed and Wireless Networks - An introduction to Securing Data Communications. John Wiley & Sons.
[22]
Schneier, B. 1996. Applied Cryptography: Protocols, Algorithms and Source Code. C. John Wiley & Sons, Second edition.
[23]
Shih, E., Cho, S., Ickes, N., Min, R., Sinha, A., Wang, A., and Chandrakasan, A., 2001. Physical Layer Driven Protocol and Algorithm Design for Energy-Efficient Wireless Sensor Networks. Proceedings of the 7th Annual International Conference on Mobile Computing and Networking, pp. 272--287.
[24]
Sobh, T. S., 2006. Wired and wireless intrusion detection system: Classifications, good characteristics and state-of-the-art. Computer Standards & interfaces, Vol. 28, Issue. 6, pp. 670--694.
[25]
Strasser, M., and Vogt, H. 2006 "Autonomous and distributed node recovery in wireless sensor networks,", Proceedings of the 4th ACM workshop on Security of Ad Hoc and Sensor Networks, pp. 113--122.
[26]
Su, W. T., Chang, K. M., and Kuo, Y. H. 2007. eHIP: An Energy-Efficient Hybrid Intrusion Prohibition System for Cluster-based Wireless Sensor Networks. Computer Networks, Vol. 51, Issue 4, pp. 1151--1168.
[27]
Tilak, S., Abu-Ghazaleh, B., and Heinzelman, W. 2002. A Taxonomy of Wireless Micro-sensor Network Models. Mobile Computing and Communications Review, Vol. 6, Issue 2, pp. 28--36.
[28]
Wood, A. D., and Stankovic, J. A. 2002. Denial of Service in Sensor Networks. IEEE Computer, Vol.35, Issue 10, pp. 54--62.

Cited By

View all
  • (2020)Role of Machine Learning Algorithms Intrusion Detection in WSNs: A SurveyJournal of Information Technology and Digital World10.36548/jitdw.2020.3.00402:03(161-173)Online publication date: 29-Aug-2020
  • (2020)Recurrent Neural Network Based Intrusion Detection System2020 International Conference on Communication and Signal Processing (ICCSP)10.1109/ICCSP48568.2020.9182099(0136-0140)Online publication date: Jul-2020
  • (2018)A Study on the Adaptability of Immune models for Wireless Sensor Network SecurityProcedia Computer Science10.1016/j.procs.2018.11.003145(13-19)Online publication date: 2018
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ICUIMC '09: Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
February 2009
704 pages
ISBN:9781605584058
DOI:10.1145/1516241
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 15 February 2009

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. anomaly detection
  2. attack behaviors
  3. countermeasures
  4. intrusion detection
  5. wireless sensor networks

Qualifiers

  • Research-article

Conference

ICUIMC '09
Sponsor:

Acceptance Rates

Overall Acceptance Rate 251 of 941 submissions, 27%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2020)Role of Machine Learning Algorithms Intrusion Detection in WSNs: A SurveyJournal of Information Technology and Digital World10.36548/jitdw.2020.3.00402:03(161-173)Online publication date: 29-Aug-2020
  • (2020)Recurrent Neural Network Based Intrusion Detection System2020 International Conference on Communication and Signal Processing (ICCSP)10.1109/ICCSP48568.2020.9182099(0136-0140)Online publication date: Jul-2020
  • (2018)A Study on the Adaptability of Immune models for Wireless Sensor Network SecurityProcedia Computer Science10.1016/j.procs.2018.11.003145(13-19)Online publication date: 2018
  • (2018)A Game Theory Based Multi Layered Intrusion Detection Framework for Wireless Sensor NetworksInternational Journal of Wireless Information Networks10.1007/s10776-018-0403-625:4(399-421)Online publication date: 28-Apr-2018
  • (2017)Kalis — A System for Knowledge-Driven Adaptable Intrusion Detection for the Internet of Things2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)10.1109/ICDCS.2017.104(656-666)Online publication date: Jun-2017
  • (2016)A Comprehensive Survey on Intrusion Detection Systems in Wireless Sensor NetworkSmart Trends in Information Technology and Computer Communications10.1007/978-981-10-3433-6_65(541-549)Online publication date: 27-Dec-2016
  • (2015)An Intrusion Detection System Based on Multi-Level Clustering for Hierarchical Wireless Sensor NetworksSensors10.3390/s15112896015:11(28960-28978)Online publication date: 17-Nov-2015
  • (2015)Security in WSNBuilding Wireless Sensor Networks10.1201/b19386-6(125-160)Online publication date: 22-Oct-2015
  • (2015)Anomaly detection and privacy preservation in cloud-centric Internet of Things2015 IEEE International Conference on Communication Workshop (ICCW)10.1109/ICCW.2015.7247572(2610-2615)Online publication date: Jun-2015
  • (2015)Helping secure robots in WSN environments by monitoring WSN software updates for intrusions2015 6th International Conference on Automation, Robotics and Applications (ICARA)10.1109/ICARA.2015.7081151(223-229)Online publication date: Feb-2015
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media