Skip to main content

Cross-layer Based Intrusion Detection System for Wireless Sensor Networks: Challenges, Solutions, and Future Directions

  • Conference paper
  • First Online:
Computing and Informatics (ICOCI 2023)

Abstract

Wireless Sensor Networks (WSNs) consist of numerous affordable, energy-efficient, compact wireless sensors. These sensors are designed to collect, process, and communicate data from their surrounding environment. Several energy-efficient protocols have been created specifically for WSNs to optimize data transfer rates and prolong network lifespan. Multi-channel protocols in WSN are one of the ways to optimize efficiency and enable seamless communication between nodes, thereby reducing interference and minimizing packet loss through multiple channels. Despite their numerous advantages in data sensing and monitoring, various attacks can pose a threat to a WSN. There are several types of attacks that a WSN may encounter, including spoofing, eavesdropping, jamming, sinkhole attacks, wormhole attacks, black hole attacks, Sybil attacks, and DoS attacks. One of the strategies for enhancing security in WSNs is implementing a cross-layer intrusion detection system (IDS) that can detect initial indicators of attacks that target vulnerabilities across multiple WSN layers. This paper reviews the existing IDS at each layer and the challenges in an energy-efficient cross-layer IDS for WSN in terms of the attacks and IDS approaches.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Khan, K., Mehmood, A., Khan, S., Khan, M.A., Iqbal, Z., Mashwani, W.K.: A survey on intrusion detection and prevention in wireless ad-hoc networks. J. Syst. Architect. 105, 101701 (2020)

    Article  Google Scholar 

  2. Pundir, S., Wazid, M., Singh, D.P., Das, A.K., Rodrigues, J.J., Park, Y.: Intrusion detection protocols in wireless sensor networks integrated to Internet of Things deployment: survey and future challenges. IEEE Access 8, 3343–3363 (2019)

    Article  Google Scholar 

  3. Elsaid, S.A., Albatati, N.S.: An optimized collaborative intrusion detection system for wireless sensor networks. Soft. Comput. 24(16), 12553–12567 (2020)

    Article  Google Scholar 

  4. Faris, M., Mahmud, M.N., Salleh, M.F.M., Alnoor, A.: Wireless sensor network security: a recent review based on state-of-the-art works. Int. J. Eng. Bus. Manag. 15 (2023)

    Google Scholar 

  5. Godala, S., Vaddella, R.P.V.: A study on intrusion detection system in wireless sensor networks. Int. J. Commun. Netw. Inf. Secur. 12(1), 127–141 (2020)

    Google Scholar 

  6. Kong, H.Y.: Energy efficient cooperative LEACH protocol for wireless sensor networks. J. Commun. Netw. 12(4), 358–365 (2010)

    Article  Google Scholar 

  7. Winter, T., et al.: RPL: IPv6 routing protocol for low-power and lossy networks (No. RFC6550) (2012)

    Google Scholar 

  8. Iyer, V., Woehrle, M., Langendoen, K.: Chrysso—a multi-channel approach to mitigate external interference. In: 2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, pp. 449–457. IEEE (2011)

    Google Scholar 

  9. Al Nahas, B., Duquennoy, S., Iyer, V., Voigt, T.: Low-power listening goes multi-channel. In: 2014 IEEE International Conference on Distributed Computing in Sensor Systems, pp. 2–9. IEEE (2014)

    Google Scholar 

  10. Nordin, N., Clegg, R.G., Rio, M.: Multi-channel cross-layer routing for sensor networks. In: 2016 23rd International Conference on Telecommunications (ICT), pp. 1–6. IEEE (2016)

    Google Scholar 

  11. Kurniawan, M.T., Yazid, S.: Mitigation and detection strategy of dos attack on wireless sensor network using blocking approach and intrusion detection system. In: 2020 International Conference on Electrical, Communication, and Computer Engineering (ICECCE), pp. 1–5. IEEE (2020)

    Google Scholar 

  12. Mohd, N., Singh, A., Bhadauria, H.S.: A novel SVM based IDS for distributed denial of sleep strike in wireless sensor networks. Wirel. Pers. Commun. 111(3), 1999–2022 (2020)

    Article  Google Scholar 

  13. Mehbodniya, A., Webber, J.L., Shabaz, M., Mohafez, H., Yadav, K.: Machine learning technique to detect Sybil attack on IoT based sensor network. IETE J. Res. 1–9 (2021)

    Google Scholar 

  14. Mounica, M., Vijayasaraswathi, R., Vasavi, R.: Detecting Sybil attack in wireless sensor networks using machine learning algorithms. IOP Conf. Ser. Mater. Sci. Eng. 1042(1). IOP Publishing (2021)

    Google Scholar 

  15. Althubaity, A., Gong, T., Raymond, K.K., Nixon, M., Ammar, R., Han, S.: Specification-based distributed detection of rank-related attacks in RPL-based resource-constrained real-time wireless networks. In: 2020 IEEE Conference on Industrial Cyberphysical Systems (ICPS), vol. 1, pp. 168–175. IEEE (2020)

    Google Scholar 

  16. Gothawal, D.B., Nagaraj, S.V.: Intrusion detection for enhancing RPL security. Procedia Comput. Sci. 165, 565–572 (2019)

    Article  Google Scholar 

  17. Bhushan, B., Sahoo, G.: A hybrid secure and energy efficient cluster based intrusion detection system for wireless sensing environment. In: 2019 2nd International Conference on Signal Processing and Communication (ICSPC), pp. 325–329. IEEE (2019)

    Google Scholar 

  18. Huang, D.W., Luo, F., Bi, J., Sun, M.: An efficient hybrid IDS deployment architecture for multi-hop clustered wireless sensor networks. IEEE Trans. Inf. Forensics Secur. 17, 2688–2702 (2022)

    Article  Google Scholar 

  19. Gandhimathi, L., Murugaboopathi, G.: A novel hybrid intrusion detection using flow-based anomaly detection and cross-layer features in wireless sensor network. Autom. Control. Comput. Sci. 54, 62–69 (2020)

    Article  Google Scholar 

  20. Jilani, S.A., Koner, C., Nandi, S.: Security in wireless sensor networks: attacks and evasion. In: 2020 National Conference on Emerging Trends on Sustainable Technology and Engineering Applications (NCETSTEA), pp. 1–5. IEEE (2020)

    Google Scholar 

  21. Ghugar, U., Pradhan, J., Bhoi, S.K., Sahoo, R.R.: LB-IDS: securing wireless sensor network using protocol layer trust-based intrusion detection system. J. Comput. Netw. Commun. (2019)

    Google Scholar 

  22. Bengag, A., Moussaoui, O., Moussaoui, M.: A new IDS for detecting jamming attacks in WBAN. In: 2019 Third International Conference on Intelligent Computing in Data Sciences (ICDS), pp. 1–5. IEEE (2019)

    Google Scholar 

  23. Bengag, A., Bengag, A., Moussaoui, O., Mohamed, B.: A fuzzy logic-based intrusion detection system for WBAN against jamming attacks. In: Bekkay, H., Mellit, A., Gagliano, A., Rabhi, A., Amine Koulali, M. (eds.) ICEERE 2022. LNEE, vol. 954, pp. 3–11. Springer, Singapore (2023). https://doi.org/10.1007/978-981-19-6223-3_1

  24. Savva, M., Ioannou, I., Vassiliou, V.: Fuzzy-logic based IDS for detecting jamming attacks in wireless mesh IoT networks. In: 2022 20th Mediterranean Communication and Computer Networking Conference (MedComNet), pp. 54–63. IEEE (2022)

    Google Scholar 

  25. Ghugar, U., Pradhan, J.: ML-IDS: MAC layer trust-based intrusion detection system for wireless sensor networks. In: Behera, H.S., Nayak, J., Naik, B., Pelusi, D. (eds.) Computational Intelligence in Data Mining. AISC, vol. 990, pp. 427–434. Springer, Singapore (2020). https://doi.org/10.1007/978-981-13-8676-3_37

    Chapter  Google Scholar 

  26. Yaghoubi, M., Ahmed, K., Miao, Y.: TIDS: trust value-based IDS framework for wireless body area network. In: 2022 32nd International Telecommunication Networks and Applications Conference (ITNAC), pp. 142–148. IEEE (2022)

    Google Scholar 

  27. Hussain, I., Zahra, S., Hussain, A., Bedru, H. D., Haider, S., Gumzhacheva, D.: Intruder attacks on wireless sensor networks: a soft decision and prevention mechanism. Int. J. Adv. Comput. Sci. Appl. 10(5) (2019)

    Google Scholar 

  28. Arshad, D., Asim, M., Tariq, N., Baker, T., Tawfik, H., Al-Jumeily OBE, D.: THC-RPL: a lightweight trust-enabled routing in RPL-based IoT networks against Sybil attack. PloS ONE 17(7) (2022)

    Google Scholar 

  29. Soni, G., Sudhakar, R.: A L-IDS against dropping attack to secure and improve RPL performance in WSN aided IoT. In: 2020 7th International Conference on Signal Processing and Integrated Networks (SPIN), pp. 377–383. IEEE (2020)

    Google Scholar 

  30. Kumar, V.N., et al.: Anomaly-based hierarchical intrusion detection for black hole attack detection and prevention in WSN. In: Reddy, K.A., Devi, B.R., George, B., Raju, K.S., Sellathurai, M. (eds.) Proceedings of Fourth International Conference on Computer and Communication Technologies. Lecture Notes in Networks and Systems, vol. 606, pp. 319–327. Springer, Singapore (2023). https://doi.org/10.1007/978-981-19-8563-8_30

  31. Deshmukh-Bhosale, S., Sonavane, S.S.: A real-time intrusion detection system for wormhole attack in the RPL based Internet of Things. Procedia Manuf. 32, 840–847 (2019)

    Article  Google Scholar 

  32. Bhosale, S.A., Sonavane, S.S.: Wormhole attack detection system for IoT network: a hybrid approach. Wirel. Pers. Commun. 124(2), 1081–1108 (2022)

    Article  Google Scholar 

  33. Maniriho, P., Niyigaba, E., Bizimana, Z., Twiringiyimana, V., Mahoro, L.J., Ahmad, T.: Anomaly-based intrusion detection approach for IoT networks using machine learning. In: 2020 International Conference on Computer Engineering, Network, and Intelligent Multimedia (CENIM), pp. 303–308. IEEE (2020)

    Google Scholar 

  34. Amouri, A., Morgera, S.D., Bencherif, M.A., Manthena, R.: A cross-layer, anomaly-based IDS for WSN and MANET. Sensors 18(2), 651 (2018)

    Google Scholar 

  35. Alharthi, M., Abdullah, M.: XLID: cross-layer intrusion detection system for wireless sensor networks. Indian J. Sci. Technol. 12, 3 (2019)

    Article  Google Scholar 

  36. Canbalaban, E., Sen, S.: A cross-layer intrusion detection system for RPL-based Internet of Things. In: Grieco, L.A., Boggia, G., Piro, G., Jararweh, Y., Campolo, C. (eds.) ADHOC-NOW 2020. LNCS, vol. 12338, pp. 214–227. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-61746-2_16

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Noradila Nordin .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Nordin, N., Mohd Pozi, M.S. (2024). Cross-layer Based Intrusion Detection System for Wireless Sensor Networks: Challenges, Solutions, and Future Directions. In: Zakaria, N.H., Mansor, N.S., Husni, H., Mohammed, F. (eds) Computing and Informatics. ICOCI 2023. Communications in Computer and Information Science, vol 2001. Springer, Singapore. https://doi.org/10.1007/978-981-99-9589-9_9

Download citation

  • DOI: https://doi.org/10.1007/978-981-99-9589-9_9

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-99-9588-2

  • Online ISBN: 978-981-99-9589-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics