An Efficient Intrusion Detection Scheme for Wireless Sensor Networks

被引:0
作者
Rong, Chunming [1 ]
Eggen, Skjalg [2 ]
Cheng, Hongbing [1 ,3 ]
机构
[1] Univ Stavanger, Dept Elect Engn & Comp Sci, N-4036 Stavanger, Norway
[2] Univ Oslo, Dept Informat, N-0316 Oslo, Norway
[3] Nanjing Univ Posts & Telecommun, Coll Comp, Nanjing 210003, Peoples R China
来源
SECURE AND TRUST COMPUTING, DATA MANAGEMENT, AND APPLICATIONS | 2011年 / 187卷
关键词
Wireless Sensor Network; Intrusion Detection; Security;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As a hot issue, wireless sensor network have gained widely attention. WSNs in general and in nature are unattended and physically reachable from the outside world, they could be vulnerable to physical attacks in the form of node capture or node destruction. These forms of attacks are hard to protect against and require intelligent prevention methods. It is necessary for WSNs to have security measures in place as to prevent an intruder from inserting compromised nodes in order to decimate or disturb the network performance. In this paper we present an intrusion detection algorithm for wireless sensor networks which does not require prior knowledge of network behavior or a learning period in order to establish this knowledge. We have taken a more practical approach and constructed this algorithm with small to middle-size networks in mind, like home or office networks. The proposed algorithm is also dynamic in nature as to cope with new and unknown attack types. This algorithm is intended to protect the network and ensure reliable and accurate aggregated sensor readings. Theoretical simulation results in three different scenarios indicate that compromised nodes can be detected with high accuracy and low false alarm probability.
引用
收藏
页码:116 / +
页数:2
相关论文
共 11 条
[1]  
Alberts P., 2002, 1 INT WORKSH WIR INF
[2]  
ALQALLAF FA, 2002, ACM SIGKDD, P14
[3]   Challenges in intrusion detection for wireless ad-hoc networks [J].
Brutch, P ;
Ko, C .
2003 SYMPOSIUM ON APPLICATIONS AND THE INTERNET WORKSHOPS, PROCEEDINGS, 2003, :368-373
[4]  
Hussain S., 2008, PERFORMANCE EVALUATI
[5]  
Lancaster HO., 1969, CHI SQUARED DISTRIBU
[6]  
Liu F., 2007, IEEE P INFOCOM 2007, V2007
[7]  
Maronna R.A., 2006, ROBUST STAT THEORY M, P205
[8]  
Newsome J., 2004, The Sybil Attack in Sensor Networks: Analysis Defenses
[9]  
Ngai E.C.H., 2005, INTRUSION DETECTION
[10]  
Sarma H.K.D., 2006, SECURITY THREATS WIR