Intrusion Detection of Sinkhole Attacks in Large-scale Wireless Sensor Networks

被引:14
作者
Chen, Changlong [1 ]
Song, Min [1 ]
Hsieh, George [2 ]
机构
[1] Old Dominion Univ, Dept Elect & Comp Engn, Norfolk, VA 23529 USA
[2] Norfolk State Univ, Dept Comp Sci, Norfolk, VA 23504 USA
来源
2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1 | 2010年
基金
美国国家科学基金会;
关键词
Intrusion detection; sinkhole attack; sensor network; wireless network; algorithm;
D O I
10.1109/WCINS.2010.5541872
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In wireless sensor networks, an adversary may deploy malicious nodes into the network and launch various attacks. These nodes are collectively called compromised nodes. In this paper, we first analyze the unique features of wireless sensor networks and discuss the challenges for compromised nodes detection. Then we propose a novel algorithm for detecting sinkhole attacks for large-scale wireless sensor networks. We formulate the detection problem as a change-point detection problem. Specifically, we monitor the CPU usage of each sensor node and analyze the consistency of the CPU usage. Thus, the proposed algorithm is able to differentiate between the malicious and the legitimate nodes. Extensive simulations have been conducted to verify the effectiveness of the algorithm.
引用
收藏
页码:711 / +
页数:3
相关论文
共 50 条
  • [31] Sinkhole attack detection based on redundancy mechanism in wireless sensor networks
    Zhang, Fang-Jiao
    Zhai, Li-Dong
    Yang, Jin-Cui
    Cui, Xiang
    [J]. 2ND INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND QUANTITATIVE MANAGEMENT, ITQM 2014, 2014, 31 : 711 - 720
  • [32] A lightweight intrusion detection framework for wireless sensor networks
    Hai, Tran Hoang
    Huh, Eui-Nam
    Jo, Minho
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2010, 10 (04) : 559 - 572
  • [33] Intrusion detection in homogeneous and heterogeneous Wireless Sensor Networks
    Wang, Yun
    Wang, Xiaodong
    Xie, Bin
    Wang, Demin
    Agrawal, Dharma P.
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2008, 7 (06) : 698 - 711
  • [34] Improving Intrusion Detection Systems for Wireless Sensor Networks
    Stetsko, Andriy
    Smolka, Tobias
    Matyas, Vashek
    Stehlik, Martin
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2014, 2014, 8479 : 343 - 360
  • [35] Adaptable Monitoring for Intrusion Detection in Wireless Sensor Networks
    Abdellatif, Takoua
    Rouis, Kais
    Mosbah, Mohamed
    [J]. 2017 IEEE 26TH INTERNATIONAL CONFERENCE ON ENABLING TECHNOLOGIES - INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES (WETICE), 2017, : 54 - 59
  • [36] Data Integrity And Intrusion Detection In Wireless Sensor Networks
    Acharya, Rathanakar
    Asha, K.
    [J]. PROCEEDINGS OF THE 2008 16TH INTERNATIONAL CONFERENCE ON NETWORKS, 2008, : 462 - +
  • [37] Intrusion Detection in Gaussian Distributed Wireless Sensor Networks
    Wang, Yun
    Fu, Weihuang
    Agrawal, Dharma P.
    [J]. 2009 IEEE 6TH INTERNATIONAL CONFERENCE ON MOBILE ADHOC AND SENSOR SYSTEMS (MASS 2009), 2009, : 494 - 502
  • [38] Intrusion Detection in Wireless Sensor Networks for Destructive Intruders
    Yu, Qixiang
    Luo, Zhenxing
    Min, Paul
    [J]. 2015 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA), 2015, : 68 - 75
  • [39] Hybrid intrusion detection system for wireless sensor networks
    Hai, Tran Hoang
    Khan, Faraz
    Huh, Eui-Nam
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2007, PT 2, PROCEEDINGS, 2007, 4706 : 383 - 396
  • [40] Efficient monitoring for intrusion detection in wireless sensor networks
    Abdellatif, Takoua
    Mosbah, Mohamed
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (15)