Abstract
Wireless Sensor Networks (WSNs) consist of numerous affordable, energy-efficient, compact wireless sensors. These sensors are designed to collect, process, and communicate data from their surrounding environment. Several energy-efficient protocols have been created specifically for WSNs to optimize data transfer rates and prolong network lifespan. Multi-channel protocols in WSN are one of the ways to optimize efficiency and enable seamless communication between nodes, thereby reducing interference and minimizing packet loss through multiple channels. Despite their numerous advantages in data sensing and monitoring, various attacks can pose a threat to a WSN. There are several types of attacks that a WSN may encounter, including spoofing, eavesdropping, jamming, sinkhole attacks, wormhole attacks, black hole attacks, Sybil attacks, and DoS attacks. One of the strategies for enhancing security in WSNs is implementing a cross-layer intrusion detection system (IDS) that can detect initial indicators of attacks that target vulnerabilities across multiple WSN layers. This paper reviews the existing IDS at each layer and the challenges in an energy-efficient cross-layer IDS for WSN in terms of the attacks and IDS approaches.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Khan, K., Mehmood, A., Khan, S., Khan, M.A., Iqbal, Z., Mashwani, W.K.: A survey on intrusion detection and prevention in wireless ad-hoc networks. J. Syst. Architect. 105, 101701 (2020)
Pundir, S., Wazid, M., Singh, D.P., Das, A.K., Rodrigues, J.J., Park, Y.: Intrusion detection protocols in wireless sensor networks integrated to Internet of Things deployment: survey and future challenges. IEEE Access 8, 3343–3363 (2019)
Elsaid, S.A., Albatati, N.S.: An optimized collaborative intrusion detection system for wireless sensor networks. Soft. Comput. 24(16), 12553–12567 (2020)
Faris, M., Mahmud, M.N., Salleh, M.F.M., Alnoor, A.: Wireless sensor network security: a recent review based on state-of-the-art works. Int. J. Eng. Bus. Manag. 15 (2023)
Godala, S., Vaddella, R.P.V.: A study on intrusion detection system in wireless sensor networks. Int. J. Commun. Netw. Inf. Secur. 12(1), 127–141 (2020)
Kong, H.Y.: Energy efficient cooperative LEACH protocol for wireless sensor networks. J. Commun. Netw. 12(4), 358–365 (2010)
Winter, T., et al.: RPL: IPv6 routing protocol for low-power and lossy networks (No. RFC6550) (2012)
Iyer, V., Woehrle, M., Langendoen, K.: Chrysso—a multi-channel approach to mitigate external interference. In: 2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, pp. 449–457. IEEE (2011)
Al Nahas, B., Duquennoy, S., Iyer, V., Voigt, T.: Low-power listening goes multi-channel. In: 2014 IEEE International Conference on Distributed Computing in Sensor Systems, pp. 2–9. IEEE (2014)
Nordin, N., Clegg, R.G., Rio, M.: Multi-channel cross-layer routing for sensor networks. In: 2016 23rd International Conference on Telecommunications (ICT), pp. 1–6. IEEE (2016)
Kurniawan, M.T., Yazid, S.: Mitigation and detection strategy of dos attack on wireless sensor network using blocking approach and intrusion detection system. In: 2020 International Conference on Electrical, Communication, and Computer Engineering (ICECCE), pp. 1–5. IEEE (2020)
Mohd, N., Singh, A., Bhadauria, H.S.: A novel SVM based IDS for distributed denial of sleep strike in wireless sensor networks. Wirel. Pers. Commun. 111(3), 1999–2022 (2020)
Mehbodniya, A., Webber, J.L., Shabaz, M., Mohafez, H., Yadav, K.: Machine learning technique to detect Sybil attack on IoT based sensor network. IETE J. Res. 1–9 (2021)
Mounica, M., Vijayasaraswathi, R., Vasavi, R.: Detecting Sybil attack in wireless sensor networks using machine learning algorithms. IOP Conf. Ser. Mater. Sci. Eng. 1042(1). IOP Publishing (2021)
Althubaity, A., Gong, T., Raymond, K.K., Nixon, M., Ammar, R., Han, S.: Specification-based distributed detection of rank-related attacks in RPL-based resource-constrained real-time wireless networks. In: 2020 IEEE Conference on Industrial Cyberphysical Systems (ICPS), vol. 1, pp. 168–175. IEEE (2020)
Gothawal, D.B., Nagaraj, S.V.: Intrusion detection for enhancing RPL security. Procedia Comput. Sci. 165, 565–572 (2019)
Bhushan, B., Sahoo, G.: A hybrid secure and energy efficient cluster based intrusion detection system for wireless sensing environment. In: 2019 2nd International Conference on Signal Processing and Communication (ICSPC), pp. 325–329. IEEE (2019)
Huang, D.W., Luo, F., Bi, J., Sun, M.: An efficient hybrid IDS deployment architecture for multi-hop clustered wireless sensor networks. IEEE Trans. Inf. Forensics Secur. 17, 2688–2702 (2022)
Gandhimathi, L., Murugaboopathi, G.: A novel hybrid intrusion detection using flow-based anomaly detection and cross-layer features in wireless sensor network. Autom. Control. Comput. Sci. 54, 62–69 (2020)
Jilani, S.A., Koner, C., Nandi, S.: Security in wireless sensor networks: attacks and evasion. In: 2020 National Conference on Emerging Trends on Sustainable Technology and Engineering Applications (NCETSTEA), pp. 1–5. IEEE (2020)
Ghugar, U., Pradhan, J., Bhoi, S.K., Sahoo, R.R.: LB-IDS: securing wireless sensor network using protocol layer trust-based intrusion detection system. J. Comput. Netw. Commun. (2019)
Bengag, A., Moussaoui, O., Moussaoui, M.: A new IDS for detecting jamming attacks in WBAN. In: 2019 Third International Conference on Intelligent Computing in Data Sciences (ICDS), pp. 1–5. IEEE (2019)
Bengag, A., Bengag, A., Moussaoui, O., Mohamed, B.: A fuzzy logic-based intrusion detection system for WBAN against jamming attacks. In: Bekkay, H., Mellit, A., Gagliano, A., Rabhi, A., Amine Koulali, M. (eds.) ICEERE 2022. LNEE, vol. 954, pp. 3–11. Springer, Singapore (2023). https://doi.org/10.1007/978-981-19-6223-3_1
Savva, M., Ioannou, I., Vassiliou, V.: Fuzzy-logic based IDS for detecting jamming attacks in wireless mesh IoT networks. In: 2022 20th Mediterranean Communication and Computer Networking Conference (MedComNet), pp. 54–63. IEEE (2022)
Ghugar, U., Pradhan, J.: ML-IDS: MAC layer trust-based intrusion detection system for wireless sensor networks. In: Behera, H.S., Nayak, J., Naik, B., Pelusi, D. (eds.) Computational Intelligence in Data Mining. AISC, vol. 990, pp. 427–434. Springer, Singapore (2020). https://doi.org/10.1007/978-981-13-8676-3_37
Yaghoubi, M., Ahmed, K., Miao, Y.: TIDS: trust value-based IDS framework for wireless body area network. In: 2022 32nd International Telecommunication Networks and Applications Conference (ITNAC), pp. 142–148. IEEE (2022)
Hussain, I., Zahra, S., Hussain, A., Bedru, H. D., Haider, S., Gumzhacheva, D.: Intruder attacks on wireless sensor networks: a soft decision and prevention mechanism. Int. J. Adv. Comput. Sci. Appl. 10(5) (2019)
Arshad, D., Asim, M., Tariq, N., Baker, T., Tawfik, H., Al-Jumeily OBE, D.: THC-RPL: a lightweight trust-enabled routing in RPL-based IoT networks against Sybil attack. PloS ONE 17(7) (2022)
Soni, G., Sudhakar, R.: A L-IDS against dropping attack to secure and improve RPL performance in WSN aided IoT. In: 2020 7th International Conference on Signal Processing and Integrated Networks (SPIN), pp. 377–383. IEEE (2020)
Kumar, V.N., et al.: Anomaly-based hierarchical intrusion detection for black hole attack detection and prevention in WSN. In: Reddy, K.A., Devi, B.R., George, B., Raju, K.S., Sellathurai, M. (eds.) Proceedings of Fourth International Conference on Computer and Communication Technologies. Lecture Notes in Networks and Systems, vol. 606, pp. 319–327. Springer, Singapore (2023). https://doi.org/10.1007/978-981-19-8563-8_30
Deshmukh-Bhosale, S., Sonavane, S.S.: A real-time intrusion detection system for wormhole attack in the RPL based Internet of Things. Procedia Manuf. 32, 840–847 (2019)
Bhosale, S.A., Sonavane, S.S.: Wormhole attack detection system for IoT network: a hybrid approach. Wirel. Pers. Commun. 124(2), 1081–1108 (2022)
Maniriho, P., Niyigaba, E., Bizimana, Z., Twiringiyimana, V., Mahoro, L.J., Ahmad, T.: Anomaly-based intrusion detection approach for IoT networks using machine learning. In: 2020 International Conference on Computer Engineering, Network, and Intelligent Multimedia (CENIM), pp. 303–308. IEEE (2020)
Amouri, A., Morgera, S.D., Bencherif, M.A., Manthena, R.: A cross-layer, anomaly-based IDS for WSN and MANET. Sensors 18(2), 651 (2018)
Alharthi, M., Abdullah, M.: XLID: cross-layer intrusion detection system for wireless sensor networks. Indian J. Sci. Technol. 12, 3 (2019)
Canbalaban, E., Sen, S.: A cross-layer intrusion detection system for RPL-based Internet of Things. In: Grieco, L.A., Boggia, G., Piro, G., Jararweh, Y., Campolo, C. (eds.) ADHOC-NOW 2020. LNCS, vol. 12338, pp. 214–227. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-61746-2_16
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Nordin, N., Mohd Pozi, M.S. (2024). Cross-layer Based Intrusion Detection System for Wireless Sensor Networks: Challenges, Solutions, and Future Directions. In: Zakaria, N.H., Mansor, N.S., Husni, H., Mohammed, F. (eds) Computing and Informatics. ICOCI 2023. Communications in Computer and Information Science, vol 2001. Springer, Singapore. https://doi.org/10.1007/978-981-99-9589-9_9
Download citation
DOI: https://doi.org/10.1007/978-981-99-9589-9_9
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-9588-2
Online ISBN: 978-981-99-9589-9
eBook Packages: Computer ScienceComputer Science (R0)