Abstract
As various sensing nodes find increasing adoption in Wireless sensor network (WSN) where different attacks have the potential to be catastrophic, security strategy against hardware intrusion become first-class transceiver design constraint. When an operation is running to send or get information in the transceiver, node’s behavior can be extracted and evaluated by security criterions to help judging the existence of attacks. Thus, this paper presents a novel feature-based intrusion detection method on mostly hardware level of a WSN transceiver, which targets 3 types of typical attacks difficult to be detected in conventional software method. Simulation of FPGA implementation proves how effective the detector acts by using AMBA Bus Function model.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Butun, I., Morgera, S., Sankar, R.: A Survey of Intrusion Detection Systems in Wireless Sensor Networks (2013)
Bao, F., Chen, R., Chang, M.J., et al.: Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Transactions on Network and Service Management 9(2), 169–183 (2012)
He, D., Bu, J., Zhu, S., et al.: Distributed access control with privacy support in wireless sensor networks. IEEE Transactions on Wireless Communications 10(10), 3472–3481 (2011)
Farooqi, A.H., Khan, F.A., Wang, J., et al.: A novel intrusion detection framework for wireless sensor networks. Personal and Ubiquitous Computing 17(5), 907–919 (2013)
Sooyeon, S., Taekyoung, K., Gil-Yong, J., et al.: An Experimental Study of Hierarchical Intrusion Detection for Wireless Industrial Sensor Networks. IEEE Transactions on Industrial Informatics 6(4), 744–757 (2010)
Loo, C.E., et al.: Intrusion Detection for Routing Attacks in Sensor Networks. International Journal of Distributed Sensor Networks 2, 313–332 (2006)
Mitchell, R., Chen, R.: Behavior rule based intrusion detection for supporting secure medical cyber physical systems. In: 2012 21st International Conference on Computer Communications and Networks (ICCCN), pp. 1–7. IEEE (2012)
Mukherjee, A., Fakoorian, S.A.A., Huang, J., Swindlehurst, A.L.: Principles of physical layer security in multiuser wireless networks: A survey. Computing Research Repository (CoRR) abs/1011.3754 (2010), http://arxiv.org/abs/1011.3754
Meguerdichian, S., Potkonjak, M.: Security primitives and protocols for ultra low power sensor systems. In: 2011 IEEE Sensors, pp. 1225–1227. IEEE (2011)
Kimura, T., Aoki, Y., Yoshida, N., et al.: A Wireless Dual-Link System for Sensor Network Applications. In: IEEE International Solid-State Circuits Conference, ISSCC 2008. Digest of Technical Papers, pp. 534–633. IEEE (2008)
Shi, H.Z., Tennant, A.: Secure physical-layer communication based on directly modulated antenna arrays. In: Antennas and Propagation Conference (LAPC), pp. 1–4. IEEE, Loughborough (2012)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Tong, X., Xia, J., Chen, L., Li, Y. (2014). A Dynamic Feature-Based Security Detector in Wireless Sensor Network Transceiver. In: Han, W., Huang, Z., Hu, C., Zhang, H., Guo, L. (eds) Web Technologies and Applications. APWeb 2014. Lecture Notes in Computer Science, vol 8710. Springer, Cham. https://doi.org/10.1007/978-3-319-11119-3_32
Download citation
DOI: https://doi.org/10.1007/978-3-319-11119-3_32
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-11118-6
Online ISBN: 978-3-319-11119-3
eBook Packages: Computer ScienceComputer Science (R0)