skip to main content
10.1145/1089761.1089765acmconferencesArticle/Chapter ViewAbstractPublication PagesmswimConference Proceedingsconference-collections
Article

Decentralized intrusion detection in wireless sensor networks

Published: 13 October 2005 Publication History

Abstract

Wireless sensor networks (WSNs) have many potential applications. Furthermore, in many scenarios WSNs are of interest to adversaries and they become susceptible to some types of attacks since they are deployed in open and unprotected environments and are constituted of cheap small devices. Preventive mechanisms can be applied to protect WSNs against some types of attacks. However, there are some attacks for which there is no known prevention methods. For these cases, it is necessary to use some mechanism of intrusion detection. Besides preventing the intruder from causing damages to the network, the intrusion detection system (IDS) can acquire information related to the attack techniques, helping in the development of prevention systems. In this work we propose an IDS that fits the demands and restrictions of WSNs. Simulation results reveal that the proposed IDS is efficient and accurate in detecting different kinds of simulated attacks.

References

[1]
Y. an Huang and W. Lee, A cooperative intrusion detection system for ad hoc networks, in Proc of the 1st ACM Workshop on Security of Ad hoc and Sensor Networks, 2003, pp. 135--147.
[2]
I. Balepin, S. Maltsev, J. Rowe, and K. Levitt, Using specification-based intrusion detection for automated response, in Proc of the 6th Int'l Symp on Recent Advances in Intrusion Detection, September 2003.
[3]
J. Deng, R. Han, and S. Mishra, A performance evaluation of intrusion-tolerant routing in wireless sensor networks, in Proc of IEEE 2nd Int'l Workshop on Info Processing in Sensor Networks, April 2003, pp. 349--364.
[4]
Y.-C. Hu, A. Perrig, and D. B. Johnson, Packet leashes: A defense against wormhole attacks in wireless networks, in Proc of IEEE Infocomm 2003, 2003.
[5]
M.-Y. Huang, R. J. Jasper, and T. M. Wicks, A large scale distributed intrusion detection framework based on attack strategy analysis, Computer Networks, 31 (1999), pp. 2465--2475.
[6]
K. Ilgun, Ustat: A real-time intrusion detection system for unix, in Proc of IEEE Computer Society Symp on Research in Security and Privacity, May 1993.
[7]
K. Ilgun, R. A. Kemmerer, and P. Porras, State transition analysis: A rule-based intrusion detection approach, IEEE Trans on Software Engineering, 21 (1995), pp. 181--199.
[8]
C. Karlof, N. Sastry, and D. Wagner, Tinysec: A link layer security architecture for wireless sensor networks, in Proc of the 2nd Int'l Conf on Embedded Networked Sensor Systems, 2004, pp. 162--175.
[9]
C. Karlof and D. Wagner, Secure routing in wireless sensor networks: Attacks and countermeasures, in Proc of 1st IEEE Int'l Workshop on Sensor Network Protocols and Applications, 2003.
[10]
C. Ko, M. Ruschitzka, and K. Levitt, Execution monitoring of security-critical programs in distributed systems: a specification-based approach, in Proc of the 1997 IEEE Symp on Security and Privacy, 1997, p. 175.
[11]
S. Kumar and E. H. Spafford, A software architecture to support misuse intrusion detection, in Proc of the 18th Nat'l Info Security Conf, 1995, pp. 194--204.
[12]
P. Levis, N. Lee, M. Welsh, and D. Culler, Tossim: Accurate and scalable simulation of entire tinyos applications, in Proc of the 1st Int'l Conf on Embedded Networked Sensor Systems, 2003, pp. 126--137.
[13]
S. Marti, T. J. Giuli, K. Lai, and M. Baker, Mitigating routing misbehavior in mobile ad hoc networks, in Mobile Computing and Networking, 2000, pp. 255--265.
[14]
M. H. T. Martins, A. P. R. da Silva, A. A. F. Loureiro, and L. B. Ruiz, An IDS simulator for wireless sensor networks. Sensornet Technical Report, Comp Sci Dept, Federal University of Minas Gerais, May 2005.
[15]
S. Park, A. Savvides, and M. B. Srivastava, Sensorsim: A simulation framework for sensor networks, in Proc of the 3rd ACM Int'l Workshop on Modeling, Analysis and Simulation of Wireless and Mobile Systems, 2000, pp. 104--111.S. Park, A. Savvides, and M. B. Srivastava, Sensorsim: A simulation framework for sensor networks, in Proc of the 3rd ACM Int'l Workshop on Modeling, Analysis and Simulation of Wireless and Mobile Systems, 2000, pp. 104--111.
[16]
V. Paxon, Bro: A system for detecting network intruders in real-time, in Proc of USENIX, USENIX - Security, 1998.
[17]
A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler, Spins: Security protocols for sensor networks, Wireless Network Journal, 8 (2002), pp. 521--534.
[18]
W. R. Pires, T. H. P. Figueiredo, H. C. Wong, and A. A. F. Loureiro, Malicious node detection in wireless sensor networks, in 18th Int'l Parallel and Distributed Processing Symp, 2004.
[19]
P. A. Porras and P. G. Neumann, Emerald: Event monitoring enabling responses to anomalous live disturbances, in Proc of 20th NIST-NCSC Nat'l Info Systems Security Conf, 1997, pp. 353--365.
[20]
L. B. Ruiz, J. M. S. Nogueira, and A. A. Loureiro, Manna: A management architecture for wireless sensor networks, IEEE Comm Magazine, 41 (2003), pp. 116--125.
[21]
A. Segall, Distributed network protocols, IEEE Trans on Info Theory, 29 (1983), pp. 23--35.
[22]
V. Shnayder, M. Hempstead, B. rong Chen, G. W. Allen, and M. Welsh, Simulating the power consumption of large-scale sensor network applications, in Proc of the 2nd Int'l Conf on Embedded Networked Sensor Systems, 2004, pp. 188--200.
[23]
C.-Y. Tseng, P. Balasubramanyam, C. Ko, R. Limprasittiporn, J. Rowe, and K. Levitt, A specification-based intrusion detection system for aodv, in Proc of the 1st ACM Workshop on Security of Ad hoc and Sensor Networks, 2003, pp. 125--134.
[24]
A. D. Wood and J. A. Stankovic, Denial of service in sensor networks, IEEE Computer, 35 (2002), pp. 54--62.

Cited By

View all
  • (2024)Green Intrusion Detection Systems: A Comprehensive Review and DirectionsSensors10.3390/s2417551624:17(5516)Online publication date: 26-Aug-2024
  • (2024)A Survey on Security in Data Transmission in IoT: Layered ArchitectureInternet of Things – ICIOT 202310.1007/978-3-031-51734-1_1(1-17)Online publication date: 19-Jan-2024
  • (2023)A Machine Learning Approach for the Underwater Investigation of Malicious Activity in a Wireless Sensor Network2023 International Conference on Sustainable Communication Networks and Application (ICSCNA)10.1109/ICSCNA58489.2023.10370730(128-132)Online publication date: 15-Nov-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
Q2SWinet '05: Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks
October 2005
158 pages
ISBN:1595932410
DOI:10.1145/1089761
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 13 October 2005

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. intrusion detection
  2. security
  3. wireless sensor networks

Qualifiers

  • Article

Conference

MSWiM05
Sponsor:

Acceptance Rates

Overall Acceptance Rate 46 of 131 submissions, 35%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)25
  • Downloads (Last 6 weeks)6
Reflects downloads up to 14 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Green Intrusion Detection Systems: A Comprehensive Review and DirectionsSensors10.3390/s2417551624:17(5516)Online publication date: 26-Aug-2024
  • (2024)A Survey on Security in Data Transmission in IoT: Layered ArchitectureInternet of Things – ICIOT 202310.1007/978-3-031-51734-1_1(1-17)Online publication date: 19-Jan-2024
  • (2023)A Machine Learning Approach for the Underwater Investigation of Malicious Activity in a Wireless Sensor Network2023 International Conference on Sustainable Communication Networks and Application (ICSCNA)10.1109/ICSCNA58489.2023.10370730(128-132)Online publication date: 15-Nov-2023
  • (2023)Data security techniques in cloud computing based on machine learning algorithms and cryptographic algorithms: Lightweight algorithms and genetics algorithmsConcurrency and Computation: Practice and Experience10.1002/cpe.769135:21Online publication date: 3-Apr-2023
  • (2022)Node Replication Attack Detection in Distributed Wireless Sensor NetworksWireless Communications and Mobile Computing10.1155/2022/72527912022(1-11)Online publication date: 31-May-2022
  • (2022)Nonparametric Decentralized Detection and Sparse Sensor Selection via Multi-Sensor Online Kernel Scalar QuantizationIEEE Transactions on Signal Processing10.1109/TSP.2022.317610970(2593-2608)Online publication date: 2022
  • (2022)Lightweight cryptography in IoT networksFuture Generation Computer Systems10.1016/j.future.2021.11.011129:C(77-89)Online publication date: 1-Apr-2022
  • (2021)Narcoleptic philosophersJournal of Computing Sciences in Colleges10.5555/3469581.346958536:7(39-46)Online publication date: 6-Jun-2021
  • (2021)Kablosuz Algılayıcı Ağlarda Hibrit Saldırı Tespit Sistemi GeliştirmeComputer Science10.53070/bbd.990934Online publication date: 5-Oct-2021
  • (2021)Lightweight Anomaly Detection Scheme Using Incremental Principal Component Analysis and Support Vector MachineSensors10.3390/s2123801721:23(8017)Online publication date: 30-Nov-2021
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media