Skip to main content

Lightweight Anomaly Intrusion Detection in Wireless Sensor Networks

  • Conference paper
Intelligence and Security Informatics (PAISI 2007)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4430))

Included in the following conference series:

  • 2006 Accesses

Abstract

Wireless Sensor Networks (WSNs) have an excellent application to monitor environments such as military surveillance and forest fire. However, WSNs are of interest to adversaries in many scenarios. They are susceptible to some types of attacks because they are deployed in open and unprotected environments. The WSNs are constituted of scarce resource devices. These security mechanisms which used for wired networks cannot be transferred directly to wireless sensor networks. In this paper we propose lightweight anomaly intrusions detection. In the scheme, we investigate different key features for WSNs and define some rules to building an efficient, accurate and effective Intrusion Detection Systems (IDSs). We also propose a moving window function method to gather the current activity data. The scheme fits the demands and restrictions of WSNs. The scheme does not need any cooperation among monitor nodes. Simulation results show that we proposed IDSs is efficient and accurate in detecting different kinds of attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Zhang, Y., Lee, W.: Intrusion Detection in Wireless Ad-Hoc Networks. In: Proc. ACM MobiCom, pp. 275–283 (2000)

    Google Scholar 

  2. Mishra, A., Nadkarni, K., Patcha, A.: Intrusion detection in wireless ad hoc networks. IEEE Wireless Communications 11(1), 48–60 (2004)

    Article  Google Scholar 

  3. Bhargava, S., Agrawal, D.: Security enhancements in AODV protocol for wireless ad hoc networks. In: Proceedings of Vehicular Technology Conference (2001)

    Google Scholar 

  4. Marti, S., et al.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of the Sixth annual ACM/IEEE International Conference on Mobile Computing and Networking (2000)

    Google Scholar 

  5. Yu, B., Xiao, B.: Detecting Selective Forwarding Attacks in Wireless Sensor Networks. In: Parallel and Distributed Processing Symposium, IPDPS (2006)

    Google Scholar 

  6. Hu, Y.-C., Perrig, A., Johnson, D.B.: Packet leashes: A defense against wormhole attacks in wireless networks. In: Proc. of IEEE Infocomm (2003)

    Google Scholar 

  7. Pires, W.R., et al.: Malicious node detection in wireless sensor networks. In: 18th Int’l Parallel and Distributed Processing Symp. (2004)

    Google Scholar 

  8. Cressie, N.: Statistics for Spatial Data. John Wiley & Sons, Chichester (1993)

    Google Scholar 

  9. Eschenauer, L., Gligor, V.D.: A keymanagement scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communication Security, November 2002, pp. 41–47 (2002)

    Google Scholar 

  10. Du, W., et al.: A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge. In: Proceedings of the IEEE INFOCOM’04, Hongkong, March 7-11, 2004, pp. 586–597 (2004)

    Google Scholar 

  11. Ilgun, K., Kemmerer, R.A., Porras, P.: State transition analysis: A rule-based intrusion detection approach. IEEE Trans. on Software Engineering 21, 181–199 (1995)

    Article  Google Scholar 

  12. Ilgun, K.: Ustat: A real-time intrusion detection system for unix. In: Proc. of IEEE Computer Society Symp. on Research in Security and Privacity (May 1993)

    Google Scholar 

  13. Paxon, V.: Bro: A system for detecting network intruders in real-time. In: Proc of USENIX, USENIX Security (1998)

    Google Scholar 

  14. Porras, P.A., Neumann, P.G.: Emerald: Event monitoring enabling responses to anomalous live disturbances. In: Proc. of 20th NIST-NCSC Nat’l Info Systems Security Conf., pp. 353–365 (1997)

    Google Scholar 

  15. Chen, H., et al.: A New Kind of Session Keys Based on Message Scheme for Sensor Networks. In: The Seventeenth Asia Pacific Microwave Conference (APMC 2005), Suzhou, China, Dec. 4-7 (2005)

    Google Scholar 

  16. Wood, A.D., Stankovic, J.A.: Denial of service in sensor networks. Computer 35(10), 54–62 (2002)

    Article  Google Scholar 

  17. Park, S., Savvides, A., Srivastava, M.B.: Sensorsim: A simulation framework for sensor networks. In: Proc. of the 3rd ACM Int’l Workshop on Modeling, Analysis and Simulation of Wireless and Mobile Systems, pp. 104–111 (2000)

    Google Scholar 

  18. Shnayder, V., et al.: Simulating the power consumption of large-scale sensor network applications. In: Proc. of the 2nd Int’l Conf. on Embedded Networked Sensor Systems, pp. 188–200 (2004)

    Google Scholar 

  19. Hengstler, S., Aghajan, H.: WiSNAP: A Wireless Image Sensor Network Application Platform. In: Proc. of 2nd Int. IEEE/Create-Net Conf. on Testbeds and Research Infrastructures for the Development of Networks and Communities, Barcelona, Spain (March 2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Christopher C. Yang Daniel Zeng Michael Chau Kuiyu Chang Qing Yang Xueqi Cheng Jue Wang Fei-Yue Wang Hsinchun Chen

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer Berlin Heidelberg

About this paper

Cite this paper

Chen, H., Han, P., Zhou, X., Gao, C. (2007). Lightweight Anomaly Intrusion Detection in Wireless Sensor Networks. In: Yang, C.C., et al. Intelligence and Security Informatics. PAISI 2007. Lecture Notes in Computer Science, vol 4430. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-71549-8_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-71549-8_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-71548-1

  • Online ISBN: 978-3-540-71549-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics