Skip to main content

DISSN: A Dynamic Intrusion Detection System for Shared Sensor Networks

  • Conference paper
Internet and Distributed Computing Systems (IDCS 2014)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 8729))

Included in the following conference series:

  • 1395 Accesses

Abstract

Recent years we have witnessed the emergence of Shared Sensor Networks (SSNs) as a core component of cyber-physical systems for diverse applications. As Wireless Sensor and Actuator Networks (WSANs) design starts shifting from application-specific platforms to shared system infrastructures, a new but pressing research challenge is security. In scenarios involving unprotected hostile outdoor areas, SSNs are prone to different types of attack which can compromise reliability, integrity and availability of the sensor data traffic and sensor lifetime as well. In this work we propose a dynamic resilient security framework to be applied in the shared sensor network context. Its basic feature is the nodes neighborhood monitoring and collaboration (through the use of the byzantine algorithm) to identify an attack and enhance security. The work was experimentally evaluated in order to demonstrate the efficiency of the proposed solution.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Jiang, X., et al.: Compromise-resilient anti-jamming communication in wireless sensor networks. Wireless Networks 17(6), 1513–1527 (2011), http://dx.doi.org/10.1007/s11276-011-0361-8

    Article  Google Scholar 

  2. Sundaram, S., Revzen, S., Pappas, G.: A control-theoretic approach to disseminating values and overcoming malicious links in wireless networks. Automatica 48(11), 2894–2901 (2012), http://dx.doi.org/10.1016/j.automatica.2012.06.072

    Article  MATH  MathSciNet  Google Scholar 

  3. de Lima, M., Greve, F.G.P.: Detectando Falhas Bizantinas em Sistemas Distribudos Dinmicos. Revista Brasileira de Redes de Computadores e Sistemas Distribudos, 9–21 (2009), http://www.lbd.dcc.ufmg.br/colecoes/rb-resd/2/1/004.pdf

  4. Conti, M., Di Pietro, R., Spognardi, A.: Wireless Sensor Replica Detection in Mobile Environments. In: Bononi, L., Datta, A.K., Devismes, S., Misra, A. (eds.) ICDCN 2012. LNCS, vol. 7129, pp. 249–264. Springer, Heidelberg (2012), http://dx.doi.org/10.1007/978-3-642-25959-3_19

    Chapter  Google Scholar 

  5. Efstratiou, C., Leontiadis, I., Mascolo, C., Crowcroft, J.: A shared sensor network infrastructure. In: Proceedings of the 8th ACM Conference on Embedded Networked Sensor Systems (SenSys 2010), pp. 367–368. ACM, New York (2010), http://dx.doi.org/10.1145/1869983.1870026

    Chapter  Google Scholar 

  6. Hoh, S., Tan, J.S., Hartley, M.: Context-aware systems a primer for user-centred services. BT Technology Journal 24(2), 186–194 (2006), http://www.springerlink.com/content/y81x131125mr63n1/ (accessed October 5, 2012)

  7. Kaur, P., Rattan, D., Bhardwaj, A.: An Analysis of Mechanisms for Making IDS Fault Tolerant. International Journal of Computer 1(24), 31–35 (2010), http://www.ijcaonline.org/journal/number24/pxc387745.pdf (accessed September 28, 2012)

  8. Laprie, J.: From dependability to resilience. In: IFIP Int. Conf. on Dependable Systems and Network (2008)

    Google Scholar 

  9. Salmon, H.M., Farias, C.M., Loureiro, P., Pirmez, L., Rossetto, S., Rodrigues, P.H., Pirmez, R., Delicato, F.C., Carmo, L.F.R.C.: Intrusion Detection System for Wireless Sensor Networks Using Danger Theory Immune-Inspired Techniques. International Journal of Wireless Information Networks 20, 39–66 (2013)

    Article  Google Scholar 

  10. SunSpotWorld, Sun SPOT World (2012), http://www.sunspotworld.com/

  11. Tsai, K.-C., Sung, J.-T., Jin, M.-H.: An Environment Sensor Fusion Application on Smart Building Skins. In: 2008 IEEE International Conference on Sensor Networks Ubiquitous and Trustworthy Computing, Sutc 2008, vol. 078(2), pp. 291–295 (2008)

    Google Scholar 

  12. Leontiadis, I., Efstratiou, C., Mascolo, C., Crowcroft, J.: SenShare: transforming sensor networks into multi-application sensing infrastructures. In: Picco, G.P., Heinzelman, W. (eds.) EWSN 2012. LNCS, vol. 7158, pp. 65–81. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  13. Wu, F., Kao, Y., Tseng, Y.: From wireless sensor networks towards cyber physical systems. Pervasive and Mobile Computing 7(4), 397–413 (2011) ISSN 1574-11

    Google Scholar 

  14. Jacobs, I.S., Bean, C.P.: Fine particles, thin films and exchange anisotropy. In: Rado, G.T., Suhl, H. (eds.) Magnetism, vol. III, pp. 271–350. Academic, New York (1963)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

de Farias, C.M., Pinheiro, R., Costa, R.O., dos Santos, I.L. (2014). DISSN: A Dynamic Intrusion Detection System for Shared Sensor Networks. In: Fortino, G., Di Fatta, G., Li, W., Ochoa, S., Cuzzocrea, A., Pathan, M. (eds) Internet and Distributed Computing Systems. IDCS 2014. Lecture Notes in Computer Science, vol 8729. Springer, Cham. https://doi.org/10.1007/978-3-319-11692-1_30

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-11692-1_30

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-11691-4

  • Online ISBN: 978-3-319-11692-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics