Skip to main content

Anomaly Detection in Beacon-Enabled IEEE 802.15.4 Wireless Sensor Networks

  • Conference paper

Abstract

During the past decade, wireless sensor networks (WSNs) have evolved as an important wireless networking technology attracting the attention of the scientific community. With WSNs being envisioned to support applications requiring little to no human attendance, however, these networks also lured the attention of various sophisticated attackers. Today, the number of attacks to which WSNs are susceptible is constantly increasing. Although many anomaly detection algorithms have been developed since then to defend against them, not all of them are tailored to the IEEE 802.15.4 standard, a dominant communication standard for low power and low data rate WSNs. This paper proposes a novel anomaly detection algorithm aimed at securing the beacon-enabled mode of the IEEE 802.15.4 MAC protocol. The performance of the proposed algorithm in identifying intrusions using a rule-based detection technique is studied via simulations.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Computer Networks 38(4), 393–422 (2002)

    Article  Google Scholar 

  2. Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: Attacks and countermeasures. In: First IEEE International Workshop on Sensor Network Protocols and Applications, pp. 113–127 (2002)

    Google Scholar 

  3. Camtepe, S.A., Yener, B.: Key distribution mechanisms for wireless sensor networks: a survey. Rensselaer Polytechnic Institute, Tech. Rep. (2005)

    Google Scholar 

  4. Shi, E., Perrig, A.: Designing secure sensor networks. IEEE Wireless Communications 11(6), 38–43 (2004)

    Article  Google Scholar 

  5. Lazos, L., Poovendran, R.: Serloc: Robust localization for wireless sensor networks. ACM Transactions on Sensor Networks (TOSN), 73–100 (2005)

    Google Scholar 

  6. Dimitriou, T., Krontiris, I.: Secure In-network Processing in Sensor Networks. In: Security in Sensor Networks, pp. 275–290. CRC Press (August 2006)

    Google Scholar 

  7. Farooqi, A.H., Khan, F.A.: Intrusion detection systems for wireless sensor networks: A survey. In: Ślęzak, D., Kim, T.-H., Chang, A.C.-C., Vasilakos, T., Li, M., Sakurai, K. (eds.) FGCN/ACN 2009. CCIS, vol. 56, pp. 234–241. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  8. Scarfone, K.A., Mell, P.M.: Sp 800-94. Guide to intrusion detection and prevention systems (idps). National Institute of Standards & Technology, Gaithersburg, MD, United States, Tech. Rep. (2007)

    Google Scholar 

  9. Rajasegarar, S., Leckie, C., Palaniswami, M.: Anomaly detection in wireless sensor networks. IEEE Wireless Communications 15(4), 34–40 (2008)

    Article  Google Scholar 

  10. Hu, J.: Host-based anomaly intrusion detection. In: Handbook of Information and Communication Security, pp. 235–255 (2010)

    Google Scholar 

  11. Xie, M., Han, S., Tian, B., Parvin, S.: Anomaly detection in wireless sensor networks: A survey. J. Netw. Comput. Appl. 34(4), 1302–1325 (2011)

    Article  Google Scholar 

  12. IEEE 802.15.4TM -2011: IEEE Stadard for Local and metropolitan area networks–Part 15.4: Low-Rate Wireless Personal Area Networks (LR-WPANs) (2011)

    Google Scholar 

  13. Koubaa, A., Alves, M., Nefzi, B., Song, Y.-Q.: Improving the IEEE 802.15.4 Slotted CSMA/CA MAC for Time-Critical Events in Wireless Sensor Networks. In: Proceedings of the Workshop of Real-Time Networks (RTN 2006), Dresden, Germany (July 2006)

    Google Scholar 

  14. Sokullu, R., Korkmaz, I., Dagdeviren, O., Mitseva, A., Prasad, N.: An Investigation on IEEE 802.15.4 MAC Layer Attacks. In: Proceedings of the 10th International Symposium on Wireless Personal Multimedia Communications (WPMC 2007), pp. 1019–1023 (2007)

    Google Scholar 

  15. Jung, S.S., Valero, M., Bourgeois, A., Beyah, R.: Attacking beacon-enabled 802.15.4 networks. In: Jajodia, S., Zhou, J. (eds.) SecureComm 2010. LNICST, vol. 50, pp. 253–271. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  16. Radosavac, S., Baras, J.S., Koutsopoulos, I.: A framework for MAC protocol misbehavior detection in wireless networks. In: Workshop on Wireless Security, pp. 33–42 (2005)

    Google Scholar 

  17. Sastry, N., Wagner, D.: Security considerations for IEEE 802.15.4 networks. In: Proceedings of the 3rd ACM Workshop on Wireless Security, WiSe 2004, pp. 32–42. ACM, New York (2004)

    Chapter  Google Scholar 

  18. Alim, M.A., Sarikaya, B.: EAP-Sens: a security architecture for wireless sensor networks. In: Proceedings of the 4th Annual International Conference on Wireless Internet, WICON, pp. 1–9 (2008)

    Google Scholar 

  19. Sokullu, R., Dagdeviren, O., Korkmaz, I.: On the IEEE 802.15.4 MAC Layer Attacks: GTS Attack. In: Second International Conference on Sensor Technologies and Applications, SENSORCOMM 2008, pp. 673–678 (2008)

    Google Scholar 

  20. Amini, F., Misic, J., Pourreza, H.: Detection of sybil attack in beacon enabled IEEE 802.15.4 networks. In: International Wireless Communications and Mobile Computing Conference, IWCMC 2008, pp. 1058–1063 (2008)

    Google Scholar 

  21. da Silva, A.P.R., et al.: Decentralized intrusion detection in wireless sensor networks. In: Proceedings of 1st ACM International Workshop on Quality of Service and Security in Wireless and Mobile Networks (Q2SWINET 2005), pp. 16–23. ACM Press (2005)

    Google Scholar 

  22. Onat, I., Miri, A.: An intrusion detection system for wireless sensor networks. In: IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2005), vol. 3, pp. 253–259 (August 2005)

    Google Scholar 

  23. Yu, B., Xiao, B.: Detecting selective forwarding attacks in wireless sensor networks. In: Proceedings of the 20th International Conference on Parallel and Distributed Processing, IPDPS 2006, p. 351. IEEE Computer Society (2006)

    Google Scholar 

  24. Douceur, J.R.: The Sybil Attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251–260. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  25. Varga, A., Hornig, R.: An overview of the omnet++ simulation environment. In: Simutools 2008: Proceedings of the 1st International Conference on Simulation Tools and Techniques for Communications, Networks and Systems & Workshops, pp. 1–10, ICST (2008)

    Google Scholar 

  26. Chen, F., Dressler, F.: A Simulation Model of IEEE 802.15.4 in OMNeT++. In: 6. GI/ITG KuVS Fachgesprach Drahtlose Sensornetze, Poster Session, pp. 35–38 (2007)

    Google Scholar 

  27. Hurtado-López, J., Casilari, E., Ariza, A.: Enabling IEEE 802.15.4 Cluster-Tree Topologies in OMNeT++. ICST, Brussels (2009)

    Google Scholar 

  28. Chipcon AS SmartRF© CC2420, preliminary datasheet, rev. 1.2 (2004), http://www.chipcon.com/files/cc2420_data_sheet_1_3.pdf

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Karapistoli, E., Economides, A.A. (2013). Anomaly Detection in Beacon-Enabled IEEE 802.15.4 Wireless Sensor Networks. In: Zia, T., Zomaya, A., Varadharajan, V., Mao, M. (eds) Security and Privacy in Communication Networks. SecureComm 2013. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 127. Springer, Cham. https://doi.org/10.1007/978-3-319-04283-1_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-04283-1_1

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-04282-4

  • Online ISBN: 978-3-319-04283-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics