Intrusion Detection of Sinkhole Attacks in Large-scale Wireless Sensor Networks

被引:14
作者
Chen, Changlong [1 ]
Song, Min [1 ]
Hsieh, George [2 ]
机构
[1] Old Dominion Univ, Dept Elect & Comp Engn, Norfolk, VA 23529 USA
[2] Norfolk State Univ, Dept Comp Sci, Norfolk, VA 23504 USA
来源
2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1 | 2010年
基金
美国国家科学基金会;
关键词
Intrusion detection; sinkhole attack; sensor network; wireless network; algorithm;
D O I
10.1109/WCINS.2010.5541872
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In wireless sensor networks, an adversary may deploy malicious nodes into the network and launch various attacks. These nodes are collectively called compromised nodes. In this paper, we first analyze the unique features of wireless sensor networks and discuss the challenges for compromised nodes detection. Then we propose a novel algorithm for detecting sinkhole attacks for large-scale wireless sensor networks. We formulate the detection problem as a change-point detection problem. Specifically, we monitor the CPU usage of each sensor node and analyze the consistency of the CPU usage. Thus, the proposed algorithm is able to differentiate between the malicious and the legitimate nodes. Extensive simulations have been conducted to verify the effectiveness of the algorithm.
引用
收藏
页码:711 / +
页数:3
相关论文
共 50 条
[21]   Research on Intrusion Detection of Wireless Sensor Networks [J].
Guo, Jianli .
PROCEEDINGS OF THE 2015 CONFERENCE ON INFORMATIZATION IN EDUCATION, MANAGEMENT AND BUSINESS, 2015, 20 :65-69
[22]   The simulation and analysis of the large-scale intrusion detection model in shuffle networks [J].
Likewei .
MECHATRONICS ENGINEERING, COMPUTING AND INFORMATION TECHNOLOGY, 2014, 556-562 :2878-2881
[23]   PRISM: A Hierarchical Intrusion Detection Architecture for Large-Scale Cyber Networks [J].
Javed Y. ;
Khayat M.A. ;
Elghariani A.A. ;
Ghafoor A. .
IEEE Transactions on Dependable and Secure Computing, 2023, 20 (06) :5070-5086
[24]   Deployment cost minimization for composite event detection in large-scale heterogeneous wireless sensor networks [J].
Dong, Xiaoqing ;
Cheng, Lianglun ;
Zheng, Gengzhong ;
Wang, Tao .
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2017, 13 (06) :1-12
[25]   Adaptively Directional Wireless Power Transfer for Large-Scale Sensor Networks [J].
Wang, Zhe ;
Duan, Lingjie ;
Zhang, Rui .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2016, 34 (05) :1785-1800
[26]   A systematic review of routing attacks detection in wireless sensor networks [J].
Alansari, Zainab ;
Anuar, Nor Badrul ;
Kamsin, Amirrudin ;
Belgaum, Mohammad Riyaz .
PEERJ COMPUTER SCIENCE, 2022, 8
[27]   A novel agent-based approach to detect sinkhole attacks in wireless sensor networks [J].
Hamedheidari, Sina ;
Rafeh, Reza .
COMPUTERS & SECURITY, 2013, 37 :1-14
[28]   M optimal routes hops strategy: detecting sinkhole attacks in wireless sensor networks [J].
Zhaohui Zhang ;
Sanyang Liu ;
Yiguang Bai ;
Yalin Zheng .
Cluster Computing, 2019, 22 :7677-7685
[29]   M optimal routes hops strategy: detecting sinkhole attacks in wireless sensor networks [J].
Zhang, Zhaohui ;
Liu, Sanyang ;
Bai, Yiguang ;
Zheng, Yalin .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 3) :S7677-S7685
[30]   Sinkhole attack detection and avoidance mechanism for RPL in wireless sensor networks [J].
Jamil A. ;
Ali M.Q. ;
Abd Alkhalec M.E. .
Annals of Emerging Technologies in Computing, 2021, 5 (Special issue 5) :94-101