Intrusion Detection of Sinkhole Attacks in Large-scale Wireless Sensor Networks

被引:14
作者
Chen, Changlong [1 ]
Song, Min [1 ]
Hsieh, George [2 ]
机构
[1] Old Dominion Univ, Dept Elect & Comp Engn, Norfolk, VA 23529 USA
[2] Norfolk State Univ, Dept Comp Sci, Norfolk, VA 23504 USA
来源
2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1 | 2010年
基金
美国国家科学基金会;
关键词
Intrusion detection; sinkhole attack; sensor network; wireless network; algorithm;
D O I
10.1109/WCINS.2010.5541872
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In wireless sensor networks, an adversary may deploy malicious nodes into the network and launch various attacks. These nodes are collectively called compromised nodes. In this paper, we first analyze the unique features of wireless sensor networks and discuss the challenges for compromised nodes detection. Then we propose a novel algorithm for detecting sinkhole attacks for large-scale wireless sensor networks. We formulate the detection problem as a change-point detection problem. Specifically, we monitor the CPU usage of each sensor node and analyze the consistency of the CPU usage. Thus, the proposed algorithm is able to differentiate between the malicious and the legitimate nodes. Extensive simulations have been conducted to verify the effectiveness of the algorithm.
引用
收藏
页码:711 / +
页数:3
相关论文
共 50 条
  • [21] PRISM: A Hierarchical Intrusion Detection Architecture for Large-Scale Cyber Networks
    Javed Y.
    Khayat M.A.
    Elghariani A.A.
    Ghafoor A.
    IEEE Transactions on Dependable and Secure Computing, 2023, 20 (06) : 5070 - 5086
  • [22] Behavioural Intrusion Detection for Wireless Sensor Networks
    Smith, A.
    Ramotsoela, T. D.
    Hancke, G. F.
    PROCEEDINGS OF 2021 IEEE 30TH INTERNATIONAL SYMPOSIUM ON INDUSTRIAL ELECTRONICS (ISIE), 2021,
  • [23] Deployment cost minimization for composite event detection in large-scale heterogeneous wireless sensor networks
    Dong, Xiaoqing
    Cheng, Lianglun
    Zheng, Gengzhong
    Wang, Tao
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2017, 13 (06): : 1 - 12
  • [24] The simulation and analysis of the large-scale intrusion detection model in shuffle networks
    Likewei
    MECHATRONICS ENGINEERING, COMPUTING AND INFORMATION TECHNOLOGY, 2014, 556-562 : 2878 - 2881
  • [25] A systematic review of routing attacks detection in wireless sensor networks
    Alansari, Zainab
    Anuar, Nor Badrul
    Kamsin, Amirrudin
    Belgaum, Mohammad Riyaz
    PEERJ COMPUTER SCIENCE, 2022, 8
  • [26] A novel agent-based approach to detect sinkhole attacks in wireless sensor networks
    Hamedheidari, Sina
    Rafeh, Reza
    COMPUTERS & SECURITY, 2013, 37 : 1 - 14
  • [27] M optimal routes hops strategy: detecting sinkhole attacks in wireless sensor networks
    Zhaohui Zhang
    Sanyang Liu
    Yiguang Bai
    Yalin Zheng
    Cluster Computing, 2019, 22 : 7677 - 7685
  • [28] Adaptively Directional Wireless Power Transfer for Large-Scale Sensor Networks
    Wang, Zhe
    Duan, Lingjie
    Zhang, Rui
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2016, 34 (05) : 1785 - 1800
  • [29] Sinkhole attack detection and avoidance mechanism for RPL in wireless sensor networks
    Jamil A.
    Ali M.Q.
    Abd Alkhalec M.E.
    Annals of Emerging Technologies in Computing, 2021, 5 (Special issue 5) : 94 - 101
  • [30] M optimal routes hops strategy: detecting sinkhole attacks in wireless sensor networks
    Zhang, Zhaohui
    Liu, Sanyang
    Bai, Yiguang
    Zheng, Yalin
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 3): : S7677 - S7685