Skip to main content
Erschienen in: Wireless Personal Communications 1/2015

01.11.2015

Centralized IDS Based on Misuse Detection for Cluster-Based Wireless Sensors Networks

verfasst von: Faouzi Hidoussi, Homero Toral-Cruz, Djallel Eddine Boubiche, Kamaljit Lakhtaria, Albena Mihovska, Miroslav Voznak

Erschienen in: Wireless Personal Communications | Ausgabe 1/2015

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Despite of their energy efficiency, most of WSN’s cluster-based routing protocols are vulnerable to security threats. Selective forwarding and black hole attacks are ranked among the most devastating attacks which they target this class of routing protocols. In this paper, a new centralized intrusion detection system is proposed to detect selective forwarding and black hole attacks in cluster-based wireless sensors networks. The main idea is the use of a centralized detection approach, where the base station decides on potential intrusions based on control packets sent from the cluster heads. The proposed intrusion detection technique is simple and energy efficient, it is thus suitable for sensor nodes with resource constrained. The simulation results confirm the expected performance of the proposed IDS in terms of security and energy efficiency.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Akyildiz, F., et al. (2002). Wireless sensor networks: A survey. Computer Networks, 38(4), 393–422.CrossRef Akyildiz, F., et al. (2002). Wireless sensor networks: A survey. Computer Networks, 38(4), 393–422.CrossRef
2.
Zurück zum Zitat Estrin, D., Govindan, R., Heidemann, J. S., & Kumar, S. (1999). Next century challenges: Scalable coordination in sensor networks. In Proceedings of the 5th annual ACM/IEEE international conference on mobile computing and networking, Seattle, WA USA, pp. 263–270. Estrin, D., Govindan, R., Heidemann, J. S., & Kumar, S. (1999). Next century challenges: Scalable coordination in sensor networks. In Proceedings of the 5th annual ACM/IEEE international conference on mobile computing and networking, Seattle, WA USA, pp. 263–270.
3.
Zurück zum Zitat Heinzelman, W. R., Chandrakasan, A., & Balakrishnan, H. (2000, January). Energy-efficient communication protocol for wireless microsensor networks. In: Proceedings of the 33rd Hawaii international conference on system sciences, Hawaii, USA, pp. 1–7. Heinzelman, W. R., Chandrakasan, A., & Balakrishnan, H. (2000, January). Energy-efficient communication protocol for wireless microsensor networks. In: Proceedings of the 33rd Hawaii international conference on system sciences, Hawaii, USA, pp. 1–7.
4.
Zurück zum Zitat Abbasi, A. A., & Younis, M. (2007). A survey on clustering algorithms for wireless sensor networks. Computer Communications, 30(14–15), 2826–2841.CrossRef Abbasi, A. A., & Younis, M. (2007). A survey on clustering algorithms for wireless sensor networks. Computer Communications, 30(14–15), 2826–2841.CrossRef
5.
Zurück zum Zitat Lindsey, S., & Raghavendra, C. (2002). PEGASIS: Power-efficient gathering in sensor information systems. Proceedings of the IEEE Aerospace Conference, 3, 1125–1130. Lindsey, S., & Raghavendra, C. (2002). PEGASIS: Power-efficient gathering in sensor information systems. Proceedings of the IEEE Aerospace Conference, 3, 1125–1130.
6.
Zurück zum Zitat Boubiche, D., & Bilami, A. (2011). HEEP (Hybrid Energy Efficiency Protocol) based on chain clustering. International Journal of Sensor Networks, 10(1/2), 25–35.CrossRef Boubiche, D., & Bilami, A. (2011). HEEP (Hybrid Energy Efficiency Protocol) based on chain clustering. International Journal of Sensor Networks, 10(1/2), 25–35.CrossRef
7.
Zurück zum Zitat Karlof, C., & Wagner, D. (2003). Secure routing in wireless sensor networks: Attacks and coun-termeasures. Ad-Hoc Networks, Special Issue on Sensor Network Applications and Protocols, 1(2–3), 293–315. Karlof, C., & Wagner, D. (2003). Secure routing in wireless sensor networks: Attacks and coun-termeasures. Ad-Hoc Networks, Special Issue on Sensor Network Applications and Protocols, 1(2–3), 293–315.
8.
Zurück zum Zitat Lee, S., Noh, Y., & Kim, K. (2013). Key schemes for security enhanced TEEN routing protocol in wireless sensor networks. International Journal of Distributed Sensor Networks, 2013, 1–8. Lee, S., Noh, Y., & Kim, K. (2013). Key schemes for security enhanced TEEN routing protocol in wireless sensor networks. International Journal of Distributed Sensor Networks, 2013, 1–8.
9.
Zurück zum Zitat Zhang, Y., Lee, W., & Huang, Y. (2003). Intrusion detection techniques for mobile wireless networks. ACM Wireless Networks, 9(5), 545–556.CrossRef Zhang, Y., Lee, W., & Huang, Y. (2003). Intrusion detection techniques for mobile wireless networks. ACM Wireless Networks, 9(5), 545–556.CrossRef
10.
Zurück zum Zitat Alrajeh, N. A., Khan, S., & Shams, B. (2013). Intrusion detection systems in wireless sensor networks: A review. International Journal of Distributed Sensor Networks, 2013, 1–7. Alrajeh, N. A., Khan, S., & Shams, B. (2013). Intrusion detection systems in wireless sensor networks: A review. International Journal of Distributed Sensor Networks, 2013, 1–7.
11.
Zurück zum Zitat Roman, R., Zhou, J., & Lopez, J. (2005, May). On the security of wireless sensor networks. In Proceedings of the ICCSA workshop on internet communications security, Singapur, pp. 681–690. Roman, R., Zhou, J., & Lopez, J. (2005, May). On the security of wireless sensor networks. In Proceedings of the ICCSA workshop on internet communications security, Singapur, pp. 681–690.
12.
Zurück zum Zitat Wood, A. D., & Stankovic, J. A. (2002). Denial of service in sensor networks. Computer, 35(10), 54–62.CrossRef Wood, A. D., & Stankovic, J. A. (2002). Denial of service in sensor networks. Computer, 35(10), 54–62.CrossRef
13.
Zurück zum Zitat Pathan, A. S. K., Lee, H.-W., & Hong, C. S. (2006). Security in wireless sensor networks: Issues and challenges. In Proceedings of the 8th international conference on advanced communication technology (Vol. 2, no. 20–22, pp. 1043–1048). Korea: Phoenix Park. Pathan, A. S. K., Lee, H.-W., & Hong, C. S. (2006). Security in wireless sensor networks: Issues and challenges. In Proceedings of the 8th international conference on advanced communication technology (Vol. 2, no. 20–22, pp. 1043–1048). Korea: Phoenix Park.
14.
Zurück zum Zitat Chen, X. Y., Meng, L. X., & Zhan, Y. Z. (2013). Detecting and defending against replication attacks in wireless sensor networks. International Journal of Distributed Sensor Networks, Volume., 2013, 1–10. Chen, X. Y., Meng, L. X., & Zhan, Y. Z. (2013). Detecting and defending against replication attacks in wireless sensor networks. International Journal of Distributed Sensor Networks, Volume., 2013, 1–10.
15.
Zurück zum Zitat Kong, J., Luo, H., Xu, K., Gu, D. L., Gerla, M., & Lu, S. (2002). Adaptive security for multi-layer ad-hoc networks. Special Issue of Wireless Communications and Mobile Computing, New York : Wiley Interscience Press. Kong, J., Luo, H., Xu, K., Gu, D. L., Gerla, M., & Lu, S. (2002). Adaptive security for multi-layer ad-hoc networks. Special Issue of Wireless Communications and Mobile Computing, New York : Wiley Interscience Press.
16.
Zurück zum Zitat Albers, P., Camp, O., Percher, J., Jouga, B., Me, L., & Puttini, R. (2002, April). Security in ad hoc networks: A general intrusion detection architecture enhancing trust based approaches. In Proceedings of the first international workshop on wireless information systems, pp. 1–12. Albers, P., Camp, O., Percher, J., Jouga, B., Me, L., & Puttini, R. (2002, April). Security in ad hoc networks: A general intrusion detection architecture enhancing trust based approaches. In Proceedings of the first international workshop on wireless information systems, pp. 1–12.
17.
Zurück zum Zitat Ngai, E. C. H., Liu, J., & Lyu, M. R. (2006, June). On the intruder detection for sinkhole attack in wireless sensor networks. In Proceedings of the IEEE international conference on communications, Istanbul, pp. 3383–3389. Ngai, E. C. H., Liu, J., & Lyu, M. R. (2006, June). On the intruder detection for sinkhole attack in wireless sensor networks. In Proceedings of the IEEE international conference on communications, Istanbul, pp. 3383–3389.
18.
Zurück zum Zitat Kaplantzis, S., Shilton, A., Mani, N., & AhmetSekercioglu, Y. (2007, December). Detecting selective forwarding attacks in wireless sensor networks using support vector machines. In Proceedings of the 3rd international conference on intelligent sensors, sensor networks and information, Melbourne, QLD, pp. 335–340. Kaplantzis, S., Shilton, A., Mani, N., & AhmetSekercioglu, Y. (2007, December). Detecting selective forwarding attacks in wireless sensor networks using support vector machines. In Proceedings of the 3rd international conference on intelligent sensors, sensor networks and information, Melbourne, QLD, pp. 335–340.
19.
Zurück zum Zitat Hai, T. H., Huh, E. N., & Jo, M. (2010). A lightweight intrusion detection framework for wireless sensor networks. Wireless Communications and Mobile Computing, 10(4), 559–572. Hai, T. H., Huh, E. N., & Jo, M. (2010). A lightweight intrusion detection framework for wireless sensor networks. Wireless Communications and Mobile Computing, 10(4), 559–572.
20.
Zurück zum Zitat Boubiche, D., & Bilami, A. (2012). Cross layer intrusion detection system for wireless sensor network. International Journal of Network Security & Its Applications, 4(2), 35–52.CrossRef Boubiche, D., & Bilami, A. (2012). Cross layer intrusion detection system for wireless sensor network. International Journal of Network Security & Its Applications, 4(2), 35–52.CrossRef
21.
Zurück zum Zitat Sardar, A. R., Sahoo, R. R., Singh, M., Sarkar, S., Singh, J. K., & Majumder, K. (2014). Intelligent intrusion detection system in wireless sensor network. In Proceedings of the 3rd international conference on frontiers of intelligent computing: theory and applications (Vol. 328, pp. 707–712), Advances in Intelligent Systems and Computing. Sardar, A. R., Sahoo, R. R., Singh, M., Sarkar, S., Singh, J. K., & Majumder, K. (2014). Intelligent intrusion detection system in wireless sensor network. In Proceedings of the 3rd international conference on frontiers of intelligent computing: theory and applications (Vol. 328, pp. 707–712), Advances in Intelligent Systems and Computing.
22.
Zurück zum Zitat Alrajeh, N. A., & Lloret, J. (2013). Intrusion detection systems based on artificial intelligence techniques in wireless sensor networks. International Journal of Distributed Sensor Networks, 2013, 1–6. Alrajeh, N. A., & Lloret, J. (2013). Intrusion detection systems based on artificial intelligence techniques in wireless sensor networks. International Journal of Distributed Sensor Networks, 2013, 1–6.
24.
Zurück zum Zitat Jatav, V. K., Tripathi, M., Gaur, M. S., & Laxmi, V. (2012). Wireless sensor networks: Attack models and detection. In Proceedings of the IACSIT Hong Kong conferences IPCSIT (Vol. 30, pp. 144–149). Singapore: IACSIT Press. Jatav, V. K., Tripathi, M., Gaur, M. S., & Laxmi, V. (2012). Wireless sensor networks: Attack models and detection. In Proceedings of the IACSIT Hong Kong conferences IPCSIT (Vol. 30, pp. 144–149). Singapore: IACSIT Press.
25.
Zurück zum Zitat Pathak, G. R., Patil, S. H., & Tryambake, J. S. (2014). Efficient and trust based black hole attack detection and prevention in WSN. International Journal of Computer Science and Business Informatics, 14(2), 93–103. Pathak, G. R., Patil, S. H., & Tryambake, J. S. (2014). Efficient and trust based black hole attack detection and prevention in WSN. International Journal of Computer Science and Business Informatics, 14(2), 93–103.
26.
Zurück zum Zitat Sheela, D., Srividhya, V. R., Begam, A., Anjali, & Chidanand G. M. (2012). Detecting black hole attacks in wireless sensor networks using mobile agent. In Proceedings of the international conference on artificial intelligence and embedded systems (pp. 45–48) Singapore, 15–16 July 2012. Sheela, D., Srividhya, V. R., Begam, A., Anjali, & Chidanand G. M. (2012). Detecting black hole attacks in wireless sensor networks using mobile agent. In Proceedings of the international conference on artificial intelligence and embedded systems (pp. 45–48) Singapore, 15–16 July 2012.
27.
Zurück zum Zitat Dighe, P. G., & Vaidya, M. B. (2013). Deployment of multiple base stations to counter effects of black hole attack on data transmission in wireless sensor network. International Journal of Engineering and Innovative Technology, 3(4), 209–213. Dighe, P. G., & Vaidya, M. B. (2013). Deployment of multiple base stations to counter effects of black hole attack on data transmission in wireless sensor network. International Journal of Engineering and Innovative Technology, 3(4), 209–213.
28.
Zurück zum Zitat Gondwal, N., & Diwaker, C. (2013). Detecting blackhole attack in WSN by check agent using multiple base stations. American International Journal of Research in Science, Technology, Engineering & Mathematics, 13–244, 149–152. Gondwal, N., & Diwaker, C. (2013). Detecting blackhole attack in WSN by check agent using multiple base stations. American International Journal of Research in Science, Technology, Engineering & Mathematics, 13–244, 149–152.
29.
Zurück zum Zitat Kaur, J., & Kaur, B. (2014). BHDP using fuzzy logic algorithm for wireless sensor network under black hole attack. International Journal of Advance Research in Computer Science and Management Studies, 2(9), 142–151. Kaur, J., & Kaur, B. (2014). BHDP using fuzzy logic algorithm for wireless sensor network under black hole attack. International Journal of Advance Research in Computer Science and Management Studies, 2(9), 142–151.
30.
Zurück zum Zitat Da Silva, A. P., Martins, M., Rocha, B., Loureiro, A., Ruiz, L., & Wong, H. C. (2005, October). Decentralized intrusion detection in wireless sensor networks. In: Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile net-works, Montreal, QC, Canada, pp. 16–23. Da Silva, A. P., Martins, M., Rocha, B., Loureiro, A., Ruiz, L., & Wong, H. C. (2005, October). Decentralized intrusion detection in wireless sensor networks. In: Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile net-works, Montreal, QC, Canada, pp. 16–23.
Metadaten
Titel
Centralized IDS Based on Misuse Detection for Cluster-Based Wireless Sensors Networks
verfasst von
Faouzi Hidoussi
Homero Toral-Cruz
Djallel Eddine Boubiche
Kamaljit Lakhtaria
Albena Mihovska
Miroslav Voznak
Publikationsdatum
01.11.2015
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 1/2015
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-015-2734-2

Weitere Artikel der Ausgabe 1/2015

Wireless Personal Communications 1/2015 Zur Ausgabe

Neuer Inhalt