IDSEP: a novel intrusion detection scheme based on energy prediction in cluster-based wireless sensor networks

被引:38
作者
Han, Guangjie [1 ,2 ]
Jiang, Jinfang [1 ,2 ]
Shen, Wen [1 ]
Shu, Lei [3 ]
Rodrigues, Joel [4 ]
机构
[1] Hohai Univ, Dept Informat & Commun Syst, Changzhou, Peoples R China
[2] Changzhou Key Lab Sensor Networks & Environm Sens, Changzhou, Peoples R China
[3] Guangdong Univ Petrochem Technol, Coll Elect Informat & Comp, Maoming, Peoples R China
[4] Univ Beira Interior, Inst Telecomunicacoes, Dept Informat, Covilha, Portugal
关键词
SECURITY;
D O I
10.1049/iet-ifs.2012.0052
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Owing to wireless communication's broadcast nature, wireless sensor networks (WSNs) are vulnerable to denial-of-service (DoS) attacks. It is of great importance to design an efficient intrusion detection scheme (IDS) for WSNs. In this study, the authors propose a novel IDS based on energy prediction (IDSEP) in cluster-based WSNs. The main idea of IDSEP is to detect malicious nodes based on energy consumption of sensor nodes. Sensor nodes with abnormal energy consumption are identified as malicious ones. Furthermore, IDSEP is designed to differentiate categories of ongoing DoS attacks based on energy consumption thresholds. The simulation results show that IDSEP detects and recognises malicious nodes effectively.
引用
收藏
页码:97 / 105
页数:9
相关论文
共 26 条
[1]  
[Anonymous], 2008 NEW TECHNOLOGIE
[2]   Integrating power control with routing to satisfy energy and delay constraints in sensor networks [J].
Bravos, George ;
Kanatas, Athanasios G. .
EUROPEAN TRANSACTIONS ON TELECOMMUNICATIONS, 2009, 20 (02) :233-245
[3]   Sensor Network Security: A Survey [J].
Chen, Xiangqian ;
Makki, Kia ;
Yen, Kang ;
Pissinou, Niki .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2009, 11 (02) :52-73
[4]   A novel node level security policy framework for wireless sensor networks [J].
Claycomb, William R. ;
Shin, Dongwan .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (01) :418-428
[5]   Clustering and Cluster-Based Routing Protocol for Delay-Tolerant Mobile Networks [J].
Dang, Ha ;
Wu, Hongyi .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2010, 9 (06) :1874-1881
[6]  
Deng J., 2005, ELSEVIER J COMPUTER, V29, P216
[7]  
Han G., 2011, SECUR COMMUN NETW, P3005
[8]  
Heinzelman W. Rabiner, 2000, IEEE P HAW INT C SYS, P3005
[9]   Adaptive security design with malicious node detection in cluster-based sensor networks [J].
Hsieh, Meng-Yen ;
Huang, Yueh-Min ;
Chao, Han-Chieh .
COMPUTER COMMUNICATIONS, 2007, 30 (11-12) :2385-2400
[10]   On the security of an enhanced UMTS authentication and key agreement protocol [J].
Hwang, Min-Shiang ;
Chong, Song-Kong ;
Ou, Hsia-Hung .
EUROPEAN TRANSACTIONS ON TELECOMMUNICATIONS, 2011, 22 (03) :99-112