Applying an Intrusion Detection Algorithm to Wireless Sensor Networks

被引:1
作者
Wang, Qi [1 ]
Wang, Shu [1 ]
Meng, Zhonglou [1 ]
机构
[1] Huazhong Univ Sci & Technol, Elect & Informat Engn Dept, Wuhan 430074, Peoples R China
来源
WKDD: 2009 SECOND INTERNATIONAL WORKSHOP ON KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS | 2009年
关键词
Wireless sensor networks; intrusion detection algorithm; abnormal receive power; algorithm simulation;
D O I
10.1109/WKDD.2009.92
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Although static sensor nodes have low computation and communication capabilities, they have specific properties, and can acquire stable neighboring nodes' information, which can be used for detection of anomalies in networking and behaviors of the neighbor nodes, thus providing security for Wireless sensor networks. In many attacks against sensor networks, the first step for an attacker is to impersonate itself as a legitimate node within the network. To make a sensor node capable of detecting an intruder, a simple dynamic statistical model of the neighboring nodes is needed to build, together with a low-complexity detection algorithm to monitor received packet power levels. A detection algorithm based on security scheme for Wireless sensor networks is introduced in this paper.
引用
收藏
页码:284 / 287
页数:4
相关论文
共 50 条
  • [21] Wireless sensor networks for intrusion detection:: Packet traffic modeling
    Demirkol, I
    Alagöz, F
    Deliç, H
    Ersoy, C
    IEEE COMMUNICATIONS LETTERS, 2006, 10 (01) : 22 - 24
  • [22] Probabilistic Intrusion Detection in Randomly Deployed Wireless Sensor Networks
    Sagar, Anil Kumar
    Lobiyal, D. K.
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 84 (02) : 1017 - 1037
  • [23] Trust-Based Intrusion Detection in Wireless Sensor Networks
    Bao, Fenye
    Chen, Ing-Ray
    Chang, MoonJeong
    Cho, Jin-Hee
    2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
  • [24] On Data-centric Intrusion Detection in Wireless Sensor Networks
    Riecker, Michael
    Barroso, Ana
    Hollick, Matthias
    Biedermann, Sebastian
    2012 IEEE INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND COMMUNICATIONS, CONFERENCE ON INTERNET OF THINGS, AND CONFERENCE ON CYBER, PHYSICAL AND SOCIAL COMPUTING (GREENCOM 2012), 2012, : 325 - 334
  • [25] Intrusion detection based security architecture for wireless sensor networks
    Xiao, DB
    Chen, C
    Chen, GL
    INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES 2005, VOLS 1 AND 2, PROCEEDINGS, 2005, : 1365 - 1368
  • [26] Intrusion Detection in Gaussian Distributed Heterogeneous Wireless Sensor Networks
    Wang, Yun
    GLOBECOM 2009 - 2009 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-8, 2009, : 5294 - 5299
  • [27] Probabilistic Intrusion Detection in Randomly Deployed Wireless Sensor Networks
    Anil Kumar Sagar
    D. K. Lobiyal
    Wireless Personal Communications, 2015, 84 : 1017 - 1037
  • [28] Intrusion Detection System in Wireless Sensor Networks: A Comprehensive Review
    Duhan, Sonu
    Khandnor, Padmavati
    2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 2707 - 2712
  • [29] Key Management Integrated with Intrusion Detection in Wireless Sensor Networks
    Zhang, Xing
    He, Jingsha
    Wei, Qian
    2009 INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2009), VOLUMES 1 AND 2, 2009, : 744 - +
  • [30] An intrusion detection system for cluster based wireless sensor networks
    Deng, Xue
    Wu, Renyong
    Wang, Wenru
    Bu, Renfei
    Information Technology Journal, 2013, 12 (09) : 1764 - 1771