Efficient monitoring for intrusion detection in wireless sensor networks

被引:13
作者
Abdellatif, Takoua [1 ]
Mosbah, Mohamed [2 ]
机构
[1] Polytech Sch Tunisia, SERCOM Lab, La Marsa 2078, Tunisia
[2] Univ Bordeaux, LaBRI Lab, Bordeaux, France
关键词
intrusion detection; LEACH; trust-based clustering; wireless sensor networks; CLUSTERING-ALGORITHM; SYSTEM; SECURITY;
D O I
10.1002/cpe.4907
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In wireless sensor networks (WSN), Intrusion Detection through sensor monitoring enables the detection of intricate security attacks such as denial of service and routing attacks. However, the monitoring process, which observes sensor behaviour, can induce a large amount of energy and bandwidth overhead, thus reducing the system lifetime. Furthermore, monitors can be attacked and their observations corrupted, which breaks the system security. Therefore, our goal is the design of a reliable and energy-efficient monitoring system that resists internal security attacks. We present DAMS (Distributed and Adaptable Monitoring System) that extends LEACH protocol with a trust-based and energy-efficient clustering protocols for both cluster heads and monitors election. Compared to other LEACH extensions, the obtained topology reduces monitoring energy overhead, improves the system lifetime, and increases the packet delivery ratio.
引用
收藏
页数:13
相关论文
共 33 条
[1]  
[Anonymous], 2007, P 13 EUR WIR C PAR F
[2]   Securing wireless sensor networks: Security architectures [J].
Boyle, David ;
Newe, Thomas .
Journal of Networks, 2008, 3 (01) :65-77
[3]  
Buchegger S., 2003, A robust reputation system for mobile adhoc networks
[4]   A Survey of Intrusion Detection Systems in Wireless Sensor Networks [J].
Butun, Ismail ;
Morgera, Salvatore D. ;
Sankar, Ravi .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (01) :266-282
[5]  
Chatterjee P., 2009, INT J COMPUTER NETWO, V1, P2
[6]   Sensor Network Security: A Survey [J].
Chen, Xiangqian ;
Makki, Kia ;
Yen, Kang ;
Pissinou, Niki .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2009, 11 (02) :52-73
[7]   CASAN: Clustering algorithm for security in ad hoc networks [J].
Elhdhili, Mohamed Elhoucine ;
Ben Azzouz, Lamia ;
Kamoun, Farouk .
COMPUTER COMMUNICATIONS, 2008, 31 (13) :2972-2980
[8]  
Ferdous R, 2011, IEEE 10 INT C TRUST
[9]   A Comparative Study of Anomaly Detection Techniques for Smart City Wireless Sensor Networks [J].
Garcia-Font, Victor ;
Garrigues, Carles ;
Rifa-Pous, Helena .
SENSORS, 2016, 16 (06)
[10]  
Heinzelman A., 2000, P 33 ANN HAW INT C S, VVolume 2, P10, DOI [10.1109/HICSS.2000.926982, DOI 10.1109/HICSS.2000.926982]