Skip to main content

A Lightweight Intrusion Detection Scheme Based on Energy Consumption Analysis in 6LowPAN

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 260))

Abstract

6LoWPAN is one of Internet of Things standard, which allows IPv6 over the low-rate wireless personal area networks. All sensor nodes have their own IPv6 address to connect to Internet. Therefore, the challenge of implementing secure communication in the Internet of Things must be addressed. There are various attack in 6LoWPAN, such as Denial-of-service, wormhole and selective forwarding attack methods. And the Dos attack method is one of the major attacks in WSN and 6LoWPAN. The sensor node’s energy will be exhausted by these attacks due to the battery power limitation. For this reason, security has become more important in 6LoWPAN. In this paper, we proposed a lightweight intrusion detection model based on analysis of node’s consumed in 6LowPAN. The 6LoWPAN energy consumption models for mesh-under and route-over routing schemes are also concerned in this paper. The sensor nodes with irregular energy consumptions are identified as malicious attackers. Our simulation results show the proposed intrusion detection system provides the method to accurately and effectively recognize malicious attacks.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Lee TH, Marshall A, Zhou B (2005) A framework for cross-layer design of energy-conserving on-demand routing in multi-hop wireless networks. IEE Mobility

    Google Scholar 

  2. Performance Analysis of IEEE 802.15.4 MAC Protocol for WSNs in Burst Error Channels (ISCIT 2011)

    Google Scholar 

  3. Analytical Modeling of Multi-hop IEEE 802.15.4 Networks (2012). IEEE transactions

    Google Scholar 

  4. Bouabdallah F, Bouabdallah N, Boutaba R (2009) On balancing energy consumption in wireless sensor networks. IEEE Trans Veh Technol 58(6)

    Google Scholar 

  5. Manju VC, Kumar MS (2012) Detection of jamming style DoS attack in wireless sensor network. Parallel distributed and grid computing (PDGC). 2012 2nd IEEE international conference

    Google Scholar 

  6. Mpitziopoulos A et al (2009) A survey on jamming attacks and countermeasures in WSNs. Commun Surv Tutorials, IEEE 11.4(2009):42–56

    Google Scholar 

  7. Pelechrinis K, Iliofotou M, Krishnamurthy SV (2011) Denial of service attacks in wireless networks: the case of jammers. Commun Surv Tutorials, IEEE 13.2(2011):245–257

    Google Scholar 

  8. Modares H, Salleh R, Moravejosharieh A (2011) Overview of security issues in wireless sensor networks. Computational intelligence, modelling and simulation (CIMSiM), 2011 third international conference

    Google Scholar 

  9. Shen W et al (2012) A new energy prediction approach for intrusion detection in cluster-based wireless sensor networks. Green communications and networking. Springer, Berlin, pp 1–12

    Google Scholar 

  10. Ponomarchuk Y, Seo DW (2010) Intrusion detection based on traffic analysis in wireless sensor networks. 19th annual wireless and optical communications conference (WOCC)

    Google Scholar 

  11. Kim K, Hong J (2010) Analysis of power consumption of S-MAC protocol according to DoS attack. 4th IEEE international conference on new trends in information science and service science (NISS)

    Google Scholar 

  12. Wander AS et al (2005) Energy analysis of public-key cryptography for wireless sensor networks. Third IEEE International Conference on Pervasive Computing and Communications, PerCom 2005

    Google Scholar 

  13. QualNet simulator. http://www.qualnet.com/

Download references

Acknowledgments

The authors would like to acknowledge the support from the National Science Council of Taiwan (No. 101-2119-M-142-001, 100-2221-E-142 -002) and National Taichung University regarding the MoE project (No. 1020035480A).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lin-Huang Chang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer Science+Business Media Dordrecht

About this paper

Cite this paper

Lee, TH., Wen, CH., Chang, LH., Chiang, HS., Hsieh, MC. (2014). A Lightweight Intrusion Detection Scheme Based on Energy Consumption Analysis in 6LowPAN. In: Huang, YM., Chao, HC., Deng, DJ., Park, J. (eds) Advanced Technologies, Embedded and Multimedia for Human-centric Computing. Lecture Notes in Electrical Engineering, vol 260. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-7262-5_137

Download citation

  • DOI: https://doi.org/10.1007/978-94-007-7262-5_137

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-007-7261-8

  • Online ISBN: 978-94-007-7262-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics