Abstract
6LoWPAN is one of Internet of Things standard, which allows IPv6 over the low-rate wireless personal area networks. All sensor nodes have their own IPv6 address to connect to Internet. Therefore, the challenge of implementing secure communication in the Internet of Things must be addressed. There are various attack in 6LoWPAN, such as Denial-of-service, wormhole and selective forwarding attack methods. And the Dos attack method is one of the major attacks in WSN and 6LoWPAN. The sensor node’s energy will be exhausted by these attacks due to the battery power limitation. For this reason, security has become more important in 6LoWPAN. In this paper, we proposed a lightweight intrusion detection model based on analysis of node’s consumed in 6LowPAN. The 6LoWPAN energy consumption models for mesh-under and route-over routing schemes are also concerned in this paper. The sensor nodes with irregular energy consumptions are identified as malicious attackers. Our simulation results show the proposed intrusion detection system provides the method to accurately and effectively recognize malicious attacks.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Lee TH, Marshall A, Zhou B (2005) A framework for cross-layer design of energy-conserving on-demand routing in multi-hop wireless networks. IEE Mobility
Performance Analysis of IEEE 802.15.4 MAC Protocol for WSNs in Burst Error Channels (ISCIT 2011)
Analytical Modeling of Multi-hop IEEE 802.15.4 Networks (2012). IEEE transactions
Bouabdallah F, Bouabdallah N, Boutaba R (2009) On balancing energy consumption in wireless sensor networks. IEEE Trans Veh Technol 58(6)
Manju VC, Kumar MS (2012) Detection of jamming style DoS attack in wireless sensor network. Parallel distributed and grid computing (PDGC). 2012 2nd IEEE international conference
Mpitziopoulos A et al (2009) A survey on jamming attacks and countermeasures in WSNs. Commun Surv Tutorials, IEEE 11.4(2009):42–56
Pelechrinis K, Iliofotou M, Krishnamurthy SV (2011) Denial of service attacks in wireless networks: the case of jammers. Commun Surv Tutorials, IEEE 13.2(2011):245–257
Modares H, Salleh R, Moravejosharieh A (2011) Overview of security issues in wireless sensor networks. Computational intelligence, modelling and simulation (CIMSiM), 2011 third international conference
Shen W et al (2012) A new energy prediction approach for intrusion detection in cluster-based wireless sensor networks. Green communications and networking. Springer, Berlin, pp 1–12
Ponomarchuk Y, Seo DW (2010) Intrusion detection based on traffic analysis in wireless sensor networks. 19th annual wireless and optical communications conference (WOCC)
Kim K, Hong J (2010) Analysis of power consumption of S-MAC protocol according to DoS attack. 4th IEEE international conference on new trends in information science and service science (NISS)
Wander AS et al (2005) Energy analysis of public-key cryptography for wireless sensor networks. Third IEEE International Conference on Pervasive Computing and Communications, PerCom 2005
QualNet simulator. http://www.qualnet.com/
Acknowledgments
The authors would like to acknowledge the support from the National Science Council of Taiwan (No. 101-2119-M-142-001, 100-2221-E-142 -002) and National Taichung University regarding the MoE project (No. 1020035480A).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer Science+Business Media Dordrecht
About this paper
Cite this paper
Lee, TH., Wen, CH., Chang, LH., Chiang, HS., Hsieh, MC. (2014). A Lightweight Intrusion Detection Scheme Based on Energy Consumption Analysis in 6LowPAN. In: Huang, YM., Chao, HC., Deng, DJ., Park, J. (eds) Advanced Technologies, Embedded and Multimedia for Human-centric Computing. Lecture Notes in Electrical Engineering, vol 260. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-7262-5_137
Download citation
DOI: https://doi.org/10.1007/978-94-007-7262-5_137
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-007-7261-8
Online ISBN: 978-94-007-7262-5
eBook Packages: EngineeringEngineering (R0)