Skip to main content
main-content
Top

Hint

Swipe to navigate through the chapters of this book

2020 | OriginalPaper | Chapter

A Study of Intrusion Detection System in Wireless Sensor Network

share
SHARE

Abstract

Wireless Sensor Networks are most widely used in networking because of their large application domain. These networks due to their nature and appealing features, like multihop wireless communication, deployment in a hostile unprotected environment, low installation cost, auto-configurable etc, are very prone to security. Sensors are small devices deployed in the unprotected region and are vulnerable to attacks. To collect information from the surroundings sensor node senses information and follows multi-hop communication and the data reaches to sink. In these networks, there is no monitoring of information flow, hence security is a big concern. To provide security in Wireless Sensor Network operations, all kinds of intrusions should be detected and appropriate action must be taken against them in order to ensure that there is no harm done to the sensor network. This paper presents a review of Intrusion Detection Systems in Wireless Sensor Networks. Out of several detection techniques, this paper focuses on signature-based, anomaly-based and hybrid-based techniques. Various detection models are examined based on certain parameters. This paper summarizes various Intrusion Detection algorithms with their features which are used in Wireless Sensor Networks.
Literature
1.
go back to reference Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Comput. Netw. 38(4), 393–422 (2002) CrossRef Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Comput. Netw. 38(4), 393–422 (2002) CrossRef
2.
go back to reference Ping, Y., Xinghao, J., Yue, W., Ning, L.: Distributed intrusion detection for mobile ad hoc networks. J. Syst. Eng. Electron. 19(4), 851–859 (2008) CrossRef Ping, Y., Xinghao, J., Yue, W., Ning, L.: Distributed intrusion detection for mobile ad hoc networks. J. Syst. Eng. Electron. 19(4), 851–859 (2008) CrossRef
3.
go back to reference Padmavathi, G., Shanmugapriya, M., et al.: A survey of attacks, security mechanisms and challenges in wireless sensor networks. arXiv preprint arXiv:​0909.​0576 (2009) Padmavathi, G., Shanmugapriya, M., et al.: A survey of attacks, security mechanisms and challenges in wireless sensor networks. arXiv preprint arXiv:​0909.​0576 (2009)
4.
go back to reference Fuchsberger, A.: Intrusion detection systems and intrusion prevention systems. Inf. Secur. Tech. Rep. 10(3), 134–139 (2005) CrossRef Fuchsberger, A.: Intrusion detection systems and intrusion prevention systems. Inf. Secur. Tech. Rep. 10(3), 134–139 (2005) CrossRef
5.
go back to reference Khan, S., Loo, J., Ud Din, Z.: Framework for intrusion detection in IEEE 802.11 wireless mesh networks. Int. Arab J. Inf. Technol. 7(4), 435–440 (2010) Khan, S., Loo, J., Ud Din, Z.: Framework for intrusion detection in IEEE 802.11 wireless mesh networks. Int. Arab J. Inf. Technol. 7(4), 435–440 (2010)
6.
go back to reference Jha, S., Hassan, M.: Building agents for rule-based intrusion detection system. Comput. Commun. 25(15), 1366–1373 (2002) CrossRef Jha, S., Hassan, M.: Building agents for rule-based intrusion detection system. Comput. Commun. 25(15), 1366–1373 (2002) CrossRef
7.
go back to reference Xie, M., Han, S., Tian, B., Parvin, S.: Anomaly detection in wireless sensor networks: a survey. J. Netw. Comput. Appl. 34(4), 1302–1325 (2011) CrossRef Xie, M., Han, S., Tian, B., Parvin, S.: Anomaly detection in wireless sensor networks: a survey. J. Netw. Comput. Appl. 34(4), 1302–1325 (2011) CrossRef
8.
go back to reference Sedjelmaci, H., Feham, M.: Novel hybrid intrusion detection system for clustered wireless sensor network. arXiv preprint arXiv:​1108.​2656 (2011) Sedjelmaci, H., Feham, M.: Novel hybrid intrusion detection system for clustered wireless sensor network. arXiv preprint arXiv:​1108.​2656 (2011)
9.
go back to reference Mehmood, A., Khanan, A., Umar, M.M., Abdullah, S., Ariffin, K.A.Z., Song, H.: Secure knowledge and cluster-based intrusion detection mechanism for smart wireless sensor networks. IEEE Access 6, 5688–5694 (2018) CrossRef Mehmood, A., Khanan, A., Umar, M.M., Abdullah, S., Ariffin, K.A.Z., Song, H.: Secure knowledge and cluster-based intrusion detection mechanism for smart wireless sensor networks. IEEE Access 6, 5688–5694 (2018) CrossRef
10.
go back to reference Yan, K.Q., Wang, S.C., Liu, C.W.: A hybrid intrusion detection system of cluster-based wireless sensor networks. In: Proceedings of the International MultiConference of Engineers and Computer Scientists, vol. 1, pp. 18–20 (2009) Yan, K.Q., Wang, S.C., Liu, C.W.: A hybrid intrusion detection system of cluster-based wireless sensor networks. In: Proceedings of the International MultiConference of Engineers and Computer Scientists, vol. 1, pp. 18–20 (2009)
11.
go back to reference Wang, S.-S., Yan, K.-Q., Wang, S.-C., Liu, C.-W.: An integrated intrusion detection system for cluster-based wireless sensor networks. Exp. Syst. Appl. 38(12), 15234–15243 (2011) CrossRef Wang, S.-S., Yan, K.-Q., Wang, S.-C., Liu, C.-W.: An integrated intrusion detection system for cluster-based wireless sensor networks. Exp. Syst. Appl. 38(12), 15234–15243 (2011) CrossRef
12.
go back to reference Saeed, A., Ahmadinia, A., Javed, A., Larijani, H.: Random neural network based intelligent intrusion detection for wireless sensor networks. Procedia Comput. Sci. 80, 2372–2376 (2016) CrossRef Saeed, A., Ahmadinia, A., Javed, A., Larijani, H.: Random neural network based intelligent intrusion detection for wireless sensor networks. Procedia Comput. Sci. 80, 2372–2376 (2016) CrossRef
13.
go back to reference Jinhui, X., Yang, T., Feiyue, Y., Leina, P., Juan, X., Yao, H.: Intrusion detection system for hybrid dos attacks using energy trust in wireless sensor networks. Procedia Comput. Sci. 131, 1188–1195 (2018) CrossRef Jinhui, X., Yang, T., Feiyue, Y., Leina, P., Juan, X., Yao, H.: Intrusion detection system for hybrid dos attacks using energy trust in wireless sensor networks. Procedia Comput. Sci. 131, 1188–1195 (2018) CrossRef
14.
go back to reference Kalnoor, G., Agarkhed, J.: Detection of intruder using kmp pattern matching technique in wireless sensor networks. Procedia Comput. Sci. 125, 187–193 (2018) CrossRef Kalnoor, G., Agarkhed, J.: Detection of intruder using kmp pattern matching technique in wireless sensor networks. Procedia Comput. Sci. 125, 187–193 (2018) CrossRef
15.
go back to reference Jianjian, D., Yang, T., Feiyue, Y.: A novel intrusion detection system based on IABRBFSVM for wireless sensor networks. Procedia Comput. Sci. 131, 1113–1121 (2018) CrossRef Jianjian, D., Yang, T., Feiyue, Y.: A novel intrusion detection system based on IABRBFSVM for wireless sensor networks. Procedia Comput. Sci. 131, 1113–1121 (2018) CrossRef
16.
go back to reference Jin, X., Liang, J., Tong, W., Lei, L., Li, Z.: Multi-agent trust-based intrusion detection scheme for wireless sensor networks. Comput. Electr. Eng. 59, 262–273 (2017) CrossRef Jin, X., Liang, J., Tong, W., Lei, L., Li, Z.: Multi-agent trust-based intrusion detection scheme for wireless sensor networks. Comput. Electr. Eng. 59, 262–273 (2017) CrossRef
17.
go back to reference Eik Loo, C., Yong Ng, M., Leckie, C., Palaniswami, M.: Intrusion detection for routing attacks in sensor networks. Int. J. Distrib. Sens. Netw. 2(4), 313–332 (2006) CrossRef Eik Loo, C., Yong Ng, M., Leckie, C., Palaniswami, M.: Intrusion detection for routing attacks in sensor networks. Int. J. Distrib. Sens. Netw. 2(4), 313–332 (2006) CrossRef
18.
go back to reference Sedjelmaci, H., Senouci, S.M., Feham, M.: An efficient intrusion detection framework in cluster-based wireless sensor networks. Secur. Commun. Netw. 6(10), 1211–1224 (2013) Sedjelmaci, H., Senouci, S.M., Feham, M.: An efficient intrusion detection framework in cluster-based wireless sensor networks. Secur. Commun. Netw. 6(10), 1211–1224 (2013)
19.
go back to reference Meng, W., Li, W., Kwok, L.-F.: EFM: enhancing the performance of signature-based network intrusion detection systems using enhanced filter mechanism. Comput. Secur. 43, 189–204 (2014) CrossRef Meng, W., Li, W., Kwok, L.-F.: EFM: enhancing the performance of signature-based network intrusion detection systems using enhanced filter mechanism. Comput. Secur. 43, 189–204 (2014) CrossRef
20.
go back to reference Gowrison, G., Ramar, K., Muneeswaran, K., Revathi, T.: Minimal complexity attack classification intrusion detection system. Appl. Soft Comput. 13(2), 921–927 (2013) CrossRef Gowrison, G., Ramar, K., Muneeswaran, K., Revathi, T.: Minimal complexity attack classification intrusion detection system. Appl. Soft Comput. 13(2), 921–927 (2013) CrossRef
Metadata
Title
A Study of Intrusion Detection System in Wireless Sensor Network
Authors
Atul Agarwal
Narottam Chand Kaushal
Copyright Year
2020
DOI
https://doi.org/10.1007/978-3-030-39875-0_36