Intrusion Detection of Sinkhole Attacks in Large-scale Wireless Sensor Networks

被引:14
作者
Chen, Changlong [1 ]
Song, Min [1 ]
Hsieh, George [2 ]
机构
[1] Old Dominion Univ, Dept Elect & Comp Engn, Norfolk, VA 23529 USA
[2] Norfolk State Univ, Dept Comp Sci, Norfolk, VA 23504 USA
来源
2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1 | 2010年
基金
美国国家科学基金会;
关键词
Intrusion detection; sinkhole attack; sensor network; wireless network; algorithm;
D O I
10.1109/WCINS.2010.5541872
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In wireless sensor networks, an adversary may deploy malicious nodes into the network and launch various attacks. These nodes are collectively called compromised nodes. In this paper, we first analyze the unique features of wireless sensor networks and discuss the challenges for compromised nodes detection. Then we propose a novel algorithm for detecting sinkhole attacks for large-scale wireless sensor networks. We formulate the detection problem as a change-point detection problem. Specifically, we monitor the CPU usage of each sensor node and analyze the consistency of the CPU usage. Thus, the proposed algorithm is able to differentiate between the malicious and the legitimate nodes. Extensive simulations have been conducted to verify the effectiveness of the algorithm.
引用
收藏
页码:711 / +
页数:3
相关论文
共 50 条
[41]   An Intrusion Detection Scheme for Home Wireless Sensor Networks [J].
Wei, Min ;
Rim, Keewook ;
Kim, Keecheon .
FRONTIERS OF MANUFACTURING AND DESIGN SCIENCE II, PTS 1-6, 2012, 121-126 :3799-+
[42]   Distributed Intrusion Detection System for Wireless Sensor Networks [J].
Medhat, Karen ;
Ramadan, Rabie A. ;
Talkhan, Ihab .
2015 9TH INTERNATIONAL CONFERENCE ON NEXT GENERATION MOBILE APPLICATIONS, SERVICES AND TECHNOLOGIES (NGMAST 2015), 2015, :234-239
[43]   An Efficient Intrusion Detection Scheme for Wireless Sensor Networks [J].
Rong, Chunming ;
Eggen, Skjalg ;
Cheng, Hongbing .
SECURE AND TRUST COMPUTING, DATA MANAGEMENT, AND APPLICATIONS, 2011, 187 :116-+
[44]   A Survey of Intrusion Detection Systems in Wireless Sensor Networks [J].
Butun, Ismail ;
Morgera, Salvatore D. ;
Sankar, Ravi .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (01) :266-282
[45]   Generalized Intrusion Detection Mechanism for Empowered Intruders in Wireless Sensor Networks [J].
Wang, Wenming ;
Huang, Haiping ;
Li, Qi ;
He, Fan ;
Sha, Chao .
IEEE ACCESS, 2020, 8 (25170-25183) :25170-25183
[46]   An Optimal Anchor Placement Method for Localization in Large-Scale Wireless Sensor Networks [J].
Cavdar, Tugrul ;
Gunay, Faruk Baturalp ;
Ebrahimpour, Nader ;
Kakiz, Muhammet Talha .
INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2022, 31 (02) :1197-1222
[47]   Double firefly based efficient clustering for large-scale wireless sensor networks [J].
Sahraoui, Mohamed ;
Harous, Saad .
JOURNAL OF SUPERCOMPUTING, 2024, 80 (13) :19669-19695
[48]   Hierarchical Topology Formation in Large-Scale IEEE 802.15.4 Wireless Sensor Networks [J].
Siedersberger, D. ;
Montez, Carlos ;
Leao, Erico ;
Vasques, F. .
45TH ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY (IECON 2019), 2019, :2837-2842
[49]   Distributed Detection of Wormhole Attacks in Wireless Sensor Networks [J].
de Graaf, Rennie ;
Hegazy, Islam ;
Horton, Jeffrey ;
Safavi-Naini, Reihaneh .
AD HOC NETWORKS, 2010, 28 :208-+
[50]   A Decision Support System for Placement of Intrusion Detection and Prevention Devices in Large-Scale Networks [J].
Puzis, Rami ;
Tubi, Meytal ;
Elovici, Yuval ;
Glezer, Chanan ;
Dolev, Shlomi .
ACM TRANSACTIONS ON MODELING AND COMPUTER SIMULATION, 2011, 22 (01)