Weitere Artikel dieser Ausgabe durch Wischen aufrufen
Cloud computing has a great potential to assist in storing and processing data collected from sensors placed in any environment such as smart homes, vehicles, hospitals, enemy surveillance areas, volcanoes, oceans, etc. The sensors may be implanted in the form of a body sensor network or placed in the surroundings. The data recorded by these sensors may further be used for several applications implemented in the cloud as well as other services. Here, the data is acquired from sensors through the wireless medium. Recent studies show that wireless sensor networks (WSNs) are vulnerable to various kinds of security threats and there is a requirement of a security solution that safeguards them from lethal attacks. In this paper, we modify the low-energy adaptive clustering hierarchy (LEACH) protocol for WSNs and add the functionality of intrusion detection to secure WSNs from sinkhole, black hole, and selective forwarding attacks. The modified protocol is called LEACH++. We perform two types of analyses: numerical analysis to check the effect on throughput and energy, and simulations in Network Simulator-2 (NS-2) to prove the results found from the numerical analysis. The results are quite promising and favor LEACH++ over LEACH under attack with respect to throughput and energy consumption.
Bitte loggen Sie sich ein, um Zugang zu diesem Inhalt zu erhalten
Sie möchten Zugang zu diesem Inhalt erhalten? Dann informieren Sie sich jetzt über unsere Produkte:
Abdullah M, Alsanee E, Alseheymi N (2014) Energy efficient cluster-based intrusion detection system for wireless sensor networks. Int J Adv Comput Sci Appl 5(9):10–15
Akkaya, K., & Younis, M. (2005). A survey on routing protocols for wireless sensor networks. Elsevier Ad Hoc Networks , 325–349.
Al-Shurman, M., Yoo, S. M., & Park, S. (2004). Black hole attack in mobile ad hoc networks. 42nd Annual Southeast Regional Conference ACM-SE, (pp. 96–97).
Biren G. (2012). Cloud: An enabler for a smarter home. https://www.ibm.com/blogs/cloudcomputing/2012/03/cloud-an-enabler-for-a-smarter-home/
Bojkovic ZS, Bakmaz BM, Bakmaz MR (2008) Security issues in wireless sensor networks. International Journal of Communications II(1):106–115.
Doukas, C. & Maglogiannis, I. (2011). Managing wearable sensor data through cloud computing. Third IEEE International Conference on Cloud Computing Technology and Science, (pp. 440–445).
Camara C, Peris-Lopez P, Tapiador J (2015) Security and privacy issues in implantable medical devices. Journal of Biomedical Informatics 55:272–289.
Chen, S., Yang, G., & Chen, S. (2010). A security routing mechanism against Sybil attack for wireless sensor networks. International Conference on Communications and Mobile Computing, (pp. 142–146).
Da Silva AP, Martins MH, Rocha BP, Loureiro AA, Ruiz LB, Wong WC (2005) Decentralized intrusion detection in wireless sensor networks. Proceedings of the 1st ACM international workshop on quality of service & security in wireless and mobile networks. ACM, Quebec, pp 16–23
Deng H, Li W, Agrawal DP (2002) Routing security in ad hoc networks. IEEE Communications Magazine, Special Topics on security in Telecommunication Networks 40(10):70–75
Farooqi, A. H., & Khan, F. A. (2012). A survey of intrusion detection systems for wireless sensor networks. International Journal of Ad Hoc and Ubiquitous Computing, 9(2):69–83.
Farooqi, A. H., & Khan, F. A. (2009). “Intrusion Detection Systems for Wireless Sensor Networks: A Survey. International Conference on Future Generation Communication and Networking, Jeju, South Korea. 234–241.
Farooqi AH, Khan FA, Wang J, Lee S (2013) A novel intrusion detection framework for wireless sensor networks. Pers Ubiquit Comput 17(5):907–919 CrossRef
Ferreira, A. C., Vilaça, M. A., Oliveira, L. B., Habib, E., Wong, H. C., & Loureiro, A. A. (2005). On the security of cluster-based communication protocols for wireless sensor networks. 4th IEEE International Conference on Networking, (pp. 449–458).
Hayajneh T, Mohd BJ, Imran M, Almashaqbeh G, Vasilakos AV (March 2016) Secure authentication for remote patient monitoring with wireless medical sensor networks. Sensors 16(424):1–25
Heinzelman, W. (2011). From Wendi Heinzelman Home page: http://www.ece.rochester.edu/~wheinzel/research.html#code
Heinzelman WB, Chandrakasan AP, Balakrishnan H (2002) An application-specific protocol architecture for wireless microsensor networks. IEEE Trans Wirel Commun 1(4):660–670 CrossRef
Heinzelman, W. B., Chandrakasan, A. P., & Balakrishnan, H. (2000). Energy-efficient routing protocols for wireless microsensor networks. 33rd Hawaii International Conference System Sciences. Maui, HI.
Herbert D, Sundaram V, Lu YH, Bagchi S, Li Z (2007) Adaptive correctness monitoring for wireless sensor networks using hierarchical distributed run-time invariant checking. ACM Transactions on Autonomous and Adaptive Systems 2(3):1–23 CrossRef
Hsieh MY, Huang YM, Chao HC (2007) Adaptive security design with malicious node detection in cluster-based sensor networks. Comput Commun 30(11–12):2385–2400 CrossRef
Karlof, C., & Wagner, D. (2003). Secure routing in wireless sensor networks: attacks and countermeasures. The first IEEE International Workshop on Sensor Network Protocols and Applications (pp. 113–127). IEEE.
Krontiris I, Dimitriou T (2007) Towards intrusion detection in wireless sensor networks. In: 13th European Wireless Conference. ENSTA and SEE, Paris
Krontiris I, Dimitriou T, Giannetsos T (2008a) LIDeA: a distributed lightweight intrusion detection architecture for sensor networks. ACM Secure Communication. Fourth International Conference on Security and Privacy for Communication Networks, Istanbul, Turkey CrossRef
Krontiris, I., Giannetsos, T., & Dimitriou, T. (2008b). Launching a sinkhole attack in wireless sensor networks: the intruder side. International Conference on Wireless and Mobile Computing Networking and Communications, (pp. 526–531).
Lee S, Lee Y, Yoo SG (2012) A specification based intrusion detection mechanism for LEACH protocol. Inf Technol J 11(1):40–48 CrossRef
Lounis A, Hadjidj A, Bouabdallah A, Challal Y (2015) Healing on the cloud: secure cloud architecture for medical wireless sensor networks. Futur Gener Comput Syst 55:266–277 CrossRef
Marchang, N., & Datta, R. (2008). Collaborative techniques for intrusion detection in mobile ad-hoc networks. Ad Hoc Networks, 6(4): 508–523
Masdari M, Bazarchi SM, Bidaki M (2013) Analysis of secure LEACH-based clustering protocols in wireless sensor networks. J Netw Comput Appl 36(2013):1243–1260 CrossRef
Sultan, N. (2014). Making use of cloud computing for healthcare provision: Opportunities and challenges. International Journal of Information Management 34(2): 177–184
Rolim, C. O., Koch, F. L., Westphall, C. B., Werner, J., Fracalossi, A. & Salvador, G. S. (2010). A cloud computing solution for patient's data collection in health care institutions. Second IEEE International Conference on eHealth, Telemedicine, and Social Medicine, (pp. 95–99)
Zhang, R. & Liu, L. (2010). Security models and requirements for healthcare application clouds. 3rd IEEE International Conference on Cloud Computing, (pp. 268–275), Miami, FL.
Rahayu, T. M., Lee, S.-G., & Lee, H.-J. (2014, February). Survey on LEACH-based security protocols. 16th International Conference on Advanced Communication Technology, 304–309.
Rajasegarar S, Leckie C, Palansiwami M (2008) Anomaly detection in wireless sensor networks. IEEE Wirel Commun 15(4):34–40 CrossRef
Roman, R., Zhou, J., & Lopez, J. (2006). Applying intrusion detection systems to wireless sensor networks. 3rd IEEE Consumer Communications and Networking Conference (pp. 640–644). IEEE Communications Society.
Roosta, T., Shieh, S., & Sastry, S. (2006). Taxonomy of security attacks in sensor networks and countermeasures. First International Conference on System Integration and Reliability Improvements. Hanoi, Vietnam: IEEE.
Su, C. C., Chang, K. M., Kuo, Y. H., & Horng, M. F. (2005). The new intrusion prevention and detection approaches for clustering-based sensor networks. IEEE Wireless Communications and Networking Conference, (pp. 1927–1932).
Sundararajan RK, Arumugam U (2015) Intrusion detection algorithm for mitigating sinkhole attack on LEACH protocol in wireless sensor networks. Journal of Sensors 2015:1–12
Teodoroa PG, Verdejo JD, Fernandez GM, Vazquez E (2009) Anomaly-based network intrusion detection: techniques, systems and challenges. Computers and Security 28:18–28 CrossRef
Tian, L., ChangDu, H., & Huang, Y. (2012, June). The simulation and analysis of LEACH protocol for wireless sensor network protocol for wireless sensor network based on NS2. International Conference on System Science and Engineering, 530–533.
Wood, A. D., & Stankovic, J. A. (2002). Denial of service in sensor networks. Computer (pp. 54–62). IEEE Computer Society.
Wu, D., Hu, G., & Ni, G. (2008). Research and improve on secure routing protocols in wireless sensor networks. 4th IEEE International Conference on Circuits and Systems for Communications (pp. 853–856).
Wang, X. & Tan, Y. (2010). Application of cloud computing in the health information system. International Conference on Computer Application and System Modeling, (pp. 179–182).
Xie M, Han S, Tian B, Parvin S (2011) Anomaly detection in wireless sensor networks: a survey. J Netw Comput Appl 34:1302–1325 CrossRef
Zhang, K., Wang, C., & Wang C. (2008). A secure routing protocol for cluster-based wireless sensor networks using group key management. 4th IEEE International conference on Wireless Communications, Networking and Mobile Computing (pp. 1–5).
Zhang Y, Lee W, Huang YA (2003) Intrusion detection techniques for mobile wireless networks. Wirel Netw 9(5):545–556 CrossRef
Zhou, J., Cao, Z., Dong, X., & Lin, X. (2015). Security and privacy in cloud-assisted wireless wearable communications: challenges, solutions and, future directions. IEEE Wireless Communications, 136–144.
- Securing wireless sensor networks for improved performance in cloud-based environments
Ashfaq Hussain Farooqi
Farrukh Aslam Khan
- Springer Paris