Abstract
Wireless Sensor Networks (WSNs) have an excellent application to monitor environments such as military surveillance and forest fire. However, WSNs are of interest to adversaries in many scenarios. They are susceptible to some types of attacks because they are deployed in open and unprotected environments. The WSNs are constituted of scarce resource devices. These security mechanisms which used for wired networks cannot be transferred directly to wireless sensor networks. In this paper we propose lightweight anomaly intrusions detection. In the scheme, we investigate different key features for WSNs and define some rules to building an efficient, accurate and effective Intrusion Detection Systems (IDSs). We also propose a moving window function method to gather the current activity data. The scheme fits the demands and restrictions of WSNs. The scheme does not need any cooperation among monitor nodes. Simulation results show that we proposed IDSs is efficient and accurate in detecting different kinds of attacks.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Zhang, Y., Lee, W.: Intrusion Detection in Wireless Ad-Hoc Networks. In: Proc. ACM MobiCom, pp. 275–283 (2000)
Mishra, A., Nadkarni, K., Patcha, A.: Intrusion detection in wireless ad hoc networks. IEEE Wireless Communications 11(1), 48–60 (2004)
Bhargava, S., Agrawal, D.: Security enhancements in AODV protocol for wireless ad hoc networks. In: Proceedings of Vehicular Technology Conference (2001)
Marti, S., et al.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of the Sixth annual ACM/IEEE International Conference on Mobile Computing and Networking (2000)
Yu, B., Xiao, B.: Detecting Selective Forwarding Attacks in Wireless Sensor Networks. In: Parallel and Distributed Processing Symposium, IPDPS (2006)
Hu, Y.-C., Perrig, A., Johnson, D.B.: Packet leashes: A defense against wormhole attacks in wireless networks. In: Proc. of IEEE Infocomm (2003)
Pires, W.R., et al.: Malicious node detection in wireless sensor networks. In: 18th Int’l Parallel and Distributed Processing Symp. (2004)
Cressie, N.: Statistics for Spatial Data. John Wiley & Sons, Chichester (1993)
Eschenauer, L., Gligor, V.D.: A keymanagement scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communication Security, November 2002, pp. 41–47 (2002)
Du, W., et al.: A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge. In: Proceedings of the IEEE INFOCOM’04, Hongkong, March 7-11, 2004, pp. 586–597 (2004)
Ilgun, K., Kemmerer, R.A., Porras, P.: State transition analysis: A rule-based intrusion detection approach. IEEE Trans. on Software Engineering 21, 181–199 (1995)
Ilgun, K.: Ustat: A real-time intrusion detection system for unix. In: Proc. of IEEE Computer Society Symp. on Research in Security and Privacity (May 1993)
Paxon, V.: Bro: A system for detecting network intruders in real-time. In: Proc of USENIX, USENIX Security (1998)
Porras, P.A., Neumann, P.G.: Emerald: Event monitoring enabling responses to anomalous live disturbances. In: Proc. of 20th NIST-NCSC Nat’l Info Systems Security Conf., pp. 353–365 (1997)
Chen, H., et al.: A New Kind of Session Keys Based on Message Scheme for Sensor Networks. In: The Seventeenth Asia Pacific Microwave Conference (APMC 2005), Suzhou, China, Dec. 4-7 (2005)
Wood, A.D., Stankovic, J.A.: Denial of service in sensor networks. Computer 35(10), 54–62 (2002)
Park, S., Savvides, A., Srivastava, M.B.: Sensorsim: A simulation framework for sensor networks. In: Proc. of the 3rd ACM Int’l Workshop on Modeling, Analysis and Simulation of Wireless and Mobile Systems, pp. 104–111 (2000)
Shnayder, V., et al.: Simulating the power consumption of large-scale sensor network applications. In: Proc. of the 2nd Int’l Conf. on Embedded Networked Sensor Systems, pp. 188–200 (2004)
Hengstler, S., Aghajan, H.: WiSNAP: A Wireless Image Sensor Network Application Platform. In: Proc. of 2nd Int. IEEE/Create-Net Conf. on Testbeds and Research Infrastructures for the Development of Networks and Communities, Barcelona, Spain (March 2006)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer Berlin Heidelberg
About this paper
Cite this paper
Chen, H., Han, P., Zhou, X., Gao, C. (2007). Lightweight Anomaly Intrusion Detection in Wireless Sensor Networks. In: Yang, C.C., et al. Intelligence and Security Informatics. PAISI 2007. Lecture Notes in Computer Science, vol 4430. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-71549-8_9
Download citation
DOI: https://doi.org/10.1007/978-3-540-71549-8_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-71548-1
Online ISBN: 978-3-540-71549-8
eBook Packages: Computer ScienceComputer Science (R0)