Intrusion Detection of Sinkhole Attacks in Large-scale Wireless Sensor Networks

被引:14
作者
Chen, Changlong [1 ]
Song, Min [1 ]
Hsieh, George [2 ]
机构
[1] Old Dominion Univ, Dept Elect & Comp Engn, Norfolk, VA 23529 USA
[2] Norfolk State Univ, Dept Comp Sci, Norfolk, VA 23504 USA
来源
2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1 | 2010年
基金
美国国家科学基金会;
关键词
Intrusion detection; sinkhole attack; sensor network; wireless network; algorithm;
D O I
10.1109/WCINS.2010.5541872
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In wireless sensor networks, an adversary may deploy malicious nodes into the network and launch various attacks. These nodes are collectively called compromised nodes. In this paper, we first analyze the unique features of wireless sensor networks and discuss the challenges for compromised nodes detection. Then we propose a novel algorithm for detecting sinkhole attacks for large-scale wireless sensor networks. We formulate the detection problem as a change-point detection problem. Specifically, we monitor the CPU usage of each sensor node and analyze the consistency of the CPU usage. Thus, the proposed algorithm is able to differentiate between the malicious and the legitimate nodes. Extensive simulations have been conducted to verify the effectiveness of the algorithm.
引用
收藏
页码:711 / +
页数:3
相关论文
共 12 条
[1]  
[Anonymous], AD HOC NETWORKS, DOI DOI 10.1016/S1570-8705(03)00008-8
[2]  
Brodsky B., 1993, NONPARAMETRIC METHOD
[3]  
Junior W. R. P., 2004, P 18 INT PAR DISTR P
[4]  
Kefayati M., 2006, P 4 ACM WORKSH SEC A, P91
[5]  
Krontiris I, 2008, LECT NOTES COMPUT SC, V4837, P150
[6]  
Mathews M., 2007, P 8 ACIS INT C SOFTW
[7]  
Ngai ECH, 2006, IEEE ICC, P3383
[8]  
Onat I, 2005, WIMOB 2005: IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS, VOL 3, PROCEEDINGS, P253
[9]  
Song H., 2007, Proceedings of the 2007 international conference on Wireless communications and mobile computing, IWCMC '07, P242, DOI DOI 10.1145/1280940.1280993
[10]  
Tao Li, 2008, 2008 28th International Conference on Distributed Computing Systems Workshops (ICDCS Workshops), P352, DOI 10.1109/ICDCS.Workshops.2008.59