A New Intrusion Detection System Based on KNN Classification Algorithm in Wireless Sensor Network

被引:179
作者
Li, Wenchao [1 ]
Yi, Ping [1 ]
Wu, Yue [1 ]
Pan, Li [1 ]
Li, Jianhua [1 ]
机构
[1] Shanghai Jiao Tong Univ, Sch Informat Secur Engn, Shanghai 200240, Peoples R China
基金
中国国家自然科学基金;
关键词
D O I
10.1155/2014/240217
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things has broad application in military field, commerce, environmental monitoring, and many other fields. However, the open nature of the information media and the poor deployment environment have brought great risks to the security of wireless sensor networks, seriously restricting the application of wireless sensor network. Internet of Things composed of wireless sensor network faces security threats mainly from Dos attack, replay attack, integrity attack, false routing information attack, and flooding attack. In this paper, we proposed a new intrusion detection system based on K-nearest neighbor (K-nearest neighbor, referred to as KNN below) classification algorithm in wireless sensor network. This system can separate abnormal nodes from normal nodes by observing their abnormal behaviors, and we analyse parameter selection and error rate of the intrusion detection system. The paper elaborates on the design and implementation of the detection system. This system has achieved efficient, rapid intrusion detection by improving the wireless ad hoc on-demand distance vector routing protocol (Ad hoc On-Demand Distance the Vector Routing, AODV). Finally, the test results show that: the system has high detection accuracy and speed, in accordance with the requirement of wireless sensor network intrusion detection.
引用
收藏
页数:8
相关论文
共 40 条
[1]  
Asaka M, 2001, IEICE T INF SYST, VE84D, P570
[2]   A new relaxation labeling architecture for secure localization in sensor networks [J].
Chang, Chih-Chieh Geoff ;
Snyder, Wesley E. ;
Wang, Cliff .
2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, :3076-+
[3]   An Efficient Cross-Layer based Flooding Algorithm with Retransmission Node Selection for Wireless Sensor Networks [J].
Choi, Seung-Joon ;
Kwon, Ki-Hyuk ;
Yoo, Sang-Jo .
2008 22ND INTERNATIONAL WORKSHOPS ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOLS 1-3, 2008, :941-948
[4]   Defending DoS attacks on broadcast authentication in wireless sensor networks [J].
Du, Xiaojiang ;
Xiao, Yang ;
Guizani, Mohsen ;
Chen, Hsiao-Hwa .
2008 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS, VOLS 1-13, 2008, :1653-+
[5]  
Eschenauer L., 2002, P 9 ACM C COMP COMM, P41, DOI DOI 10.1145/586110.586117
[6]  
Ferrer D. J., 2002, P 5 INT C INF SEC LO
[7]   PDA: Privacy-preserving data aggregation in wireless sensor networks [J].
He, Wenbo ;
Liu, Xue ;
Nguyen, Hoang ;
Nahrstedt, Klara ;
Abdelzaher, Tarek .
INFOCOM 2007, VOLS 1-5, 2007, :2045-+
[8]  
JOHNSON DB, 2004, DYNAMIC SOURCE ROUTI
[9]  
Lee W., 1998, P 7 USENIX SEC S JAN
[10]   Use of K-Nearest Neighbor classifier for intrusion detection [J].
Liao, YH ;
Vemuri, VR .
COMPUTERS & SECURITY, 2002, 21 (05) :439-448