Skip to main content

Advertisement

Log in

Centralized IDS Based on Misuse Detection for Cluster-Based Wireless Sensors Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Despite of their energy efficiency, most of WSN’s cluster-based routing protocols are vulnerable to security threats. Selective forwarding and black hole attacks are ranked among the most devastating attacks which they target this class of routing protocols. In this paper, a new centralized intrusion detection system is proposed to detect selective forwarding and black hole attacks in cluster-based wireless sensors networks. The main idea is the use of a centralized detection approach, where the base station decides on potential intrusions based on control packets sent from the cluster heads. The proposed intrusion detection technique is simple and energy efficient, it is thus suitable for sensor nodes with resource constrained. The simulation results confirm the expected performance of the proposed IDS in terms of security and energy efficiency.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Akyildiz, F., et al. (2002). Wireless sensor networks: A survey. Computer Networks, 38(4), 393–422.

    Article  Google Scholar 

  2. Estrin, D., Govindan, R., Heidemann, J. S., & Kumar, S. (1999). Next century challenges: Scalable coordination in sensor networks. In Proceedings of the 5th annual ACM/IEEE international conference on mobile computing and networking, Seattle, WA USA, pp. 263–270.

  3. Heinzelman, W. R., Chandrakasan, A., & Balakrishnan, H. (2000, January). Energy-efficient communication protocol for wireless microsensor networks. In: Proceedings of the 33rd Hawaii international conference on system sciences, Hawaii, USA, pp. 1–7.

  4. Abbasi, A. A., & Younis, M. (2007). A survey on clustering algorithms for wireless sensor networks. Computer Communications, 30(14–15), 2826–2841.

    Article  Google Scholar 

  5. Lindsey, S., & Raghavendra, C. (2002). PEGASIS: Power-efficient gathering in sensor information systems. Proceedings of the IEEE Aerospace Conference, 3, 1125–1130.

    Google Scholar 

  6. Boubiche, D., & Bilami, A. (2011). HEEP (Hybrid Energy Efficiency Protocol) based on chain clustering. International Journal of Sensor Networks, 10(1/2), 25–35.

    Article  Google Scholar 

  7. Karlof, C., & Wagner, D. (2003). Secure routing in wireless sensor networks: Attacks and coun-termeasures. Ad-Hoc Networks, Special Issue on Sensor Network Applications and Protocols, 1(2–3), 293–315.

    Google Scholar 

  8. Lee, S., Noh, Y., & Kim, K. (2013). Key schemes for security enhanced TEEN routing protocol in wireless sensor networks. International Journal of Distributed Sensor Networks, 2013, 1–8.

    Google Scholar 

  9. Zhang, Y., Lee, W., & Huang, Y. (2003). Intrusion detection techniques for mobile wireless networks. ACM Wireless Networks, 9(5), 545–556.

    Article  Google Scholar 

  10. Alrajeh, N. A., Khan, S., & Shams, B. (2013). Intrusion detection systems in wireless sensor networks: A review. International Journal of Distributed Sensor Networks, 2013, 1–7.

  11. Roman, R., Zhou, J., & Lopez, J. (2005, May). On the security of wireless sensor networks. In Proceedings of the ICCSA workshop on internet communications security, Singapur, pp. 681–690.

  12. Wood, A. D., & Stankovic, J. A. (2002). Denial of service in sensor networks. Computer, 35(10), 54–62.

    Article  Google Scholar 

  13. Pathan, A. S. K., Lee, H.-W., & Hong, C. S. (2006). Security in wireless sensor networks: Issues and challenges. In Proceedings of the 8th international conference on advanced communication technology (Vol. 2, no. 20–22, pp. 1043–1048). Korea: Phoenix Park.

  14. Chen, X. Y., Meng, L. X., & Zhan, Y. Z. (2013). Detecting and defending against replication attacks in wireless sensor networks. International Journal of Distributed Sensor Networks, Volume., 2013, 1–10.

    Google Scholar 

  15. Kong, J., Luo, H., Xu, K., Gu, D. L., Gerla, M., & Lu, S. (2002). Adaptive security for multi-layer ad-hoc networks. Special Issue of Wireless Communications and Mobile Computing, New York : Wiley Interscience Press.

  16. Albers, P., Camp, O., Percher, J., Jouga, B., Me, L., & Puttini, R. (2002, April). Security in ad hoc networks: A general intrusion detection architecture enhancing trust based approaches. In Proceedings of the first international workshop on wireless information systems, pp. 1–12.

  17. Ngai, E. C. H., Liu, J., & Lyu, M. R. (2006, June). On the intruder detection for sinkhole attack in wireless sensor networks. In Proceedings of the IEEE international conference on communications, Istanbul, pp. 3383–3389.

  18. Kaplantzis, S., Shilton, A., Mani, N., & AhmetSekercioglu, Y. (2007, December). Detecting selective forwarding attacks in wireless sensor networks using support vector machines. In Proceedings of the 3rd international conference on intelligent sensors, sensor networks and information, Melbourne, QLD, pp. 335–340.

  19. Hai, T. H., Huh, E. N., & Jo, M. (2010). A lightweight intrusion detection framework for wireless sensor networks. Wireless Communications and Mobile Computing, 10(4), 559–572.

    Google Scholar 

  20. Boubiche, D., & Bilami, A. (2012). Cross layer intrusion detection system for wireless sensor network. International Journal of Network Security & Its Applications, 4(2), 35–52.

    Article  Google Scholar 

  21. Sardar, A. R., Sahoo, R. R., Singh, M., Sarkar, S., Singh, J. K., & Majumder, K. (2014). Intelligent intrusion detection system in wireless sensor network. In Proceedings of the 3rd international conference on frontiers of intelligent computing: theory and applications (Vol. 328, pp. 707–712), Advances in Intelligent Systems and Computing.

  22. Alrajeh, N. A., & Lloret, J. (2013). Intrusion detection systems based on artificial intelligence techniques in wireless sensor networks. International Journal of Distributed Sensor Networks, 2013, 1–6.

  23. Riecker, M., Thies, D., & Hollick, M. (2014). Lightweight detection of denial-of-service attacks in practical wireless sensor networks: A systematic approach. Technical report, Technische Universität Darmstadt, Darmstadt, Germany. http://www.seemoo.de/dl/seemoo/seemoo-tr-2014-01.pdf, January 2014.

  24. Jatav, V. K., Tripathi, M., Gaur, M. S., & Laxmi, V. (2012). Wireless sensor networks: Attack models and detection. In Proceedings of the IACSIT Hong Kong conferences IPCSIT (Vol. 30, pp. 144–149). Singapore: IACSIT Press.

  25. Pathak, G. R., Patil, S. H., & Tryambake, J. S. (2014). Efficient and trust based black hole attack detection and prevention in WSN. International Journal of Computer Science and Business Informatics, 14(2), 93–103.

    Google Scholar 

  26. Sheela, D., Srividhya, V. R., Begam, A., Anjali, & Chidanand G. M. (2012). Detecting black hole attacks in wireless sensor networks using mobile agent. In Proceedings of the international conference on artificial intelligence and embedded systems (pp. 45–48) Singapore, 15–16 July 2012.

  27. Dighe, P. G., & Vaidya, M. B. (2013). Deployment of multiple base stations to counter effects of black hole attack on data transmission in wireless sensor network. International Journal of Engineering and Innovative Technology, 3(4), 209–213.

    Google Scholar 

  28. Gondwal, N., & Diwaker, C. (2013). Detecting blackhole attack in WSN by check agent using multiple base stations. American International Journal of Research in Science, Technology, Engineering & Mathematics, 13–244, 149–152.

    Google Scholar 

  29. Kaur, J., & Kaur, B. (2014). BHDP using fuzzy logic algorithm for wireless sensor network under black hole attack. International Journal of Advance Research in Computer Science and Management Studies, 2(9), 142–151.

    Google Scholar 

  30. Da Silva, A. P., Martins, M., Rocha, B., Loureiro, A., Ruiz, L., & Wong, H. C. (2005, October). Decentralized intrusion detection in wireless sensor networks. In: Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile net-works, Montreal, QC, Canada, pp. 16–23.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Faouzi Hidoussi.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hidoussi, F., Toral-Cruz, H., Boubiche, D.E. et al. Centralized IDS Based on Misuse Detection for Cluster-Based Wireless Sensors Networks. Wireless Pers Commun 85, 207–224 (2015). https://doi.org/10.1007/s11277-015-2734-2

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-015-2734-2

Keywords

Navigation