A New Collaborative Approach for Intrusion Detection System on Wireless Sensor Networks

  • Marcus Vinícius de Sousa Lemos
  • Líliam Barroso Leal
  • Raimir Holanda Filho
Conference paper

Abstract

Due to its characteristics, the Wireless Sensor Networks (WSN) are useful in a variety of applications such as environmental monitoring, surveillance, tracking, among others. Given the nature of such applications, where many are mission critical, the WSN become targets of possible attackers interested in harming the network. Among the defense mechanisms, the intrusion detection systems play important role in detecting attacks that can overcome the preventing techniques. This paper proposes a new collaborative and decentralized approach for intrusion detection system. Special nodes, called monitors, will be responsible for monitoring the behavior of neighbor nodes. The malicious activities evidences discovered by each monitor will be shared and correlated with the purpose of increasing the accuracy in detection of intruders. Experiment conducted by simulation show that our solution is effective in reducing the false positives.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [1]
    H. Alzaid, E. Foo and J. G. Nieto, “Secure Data Aggregation in Wireless Sensor Network: a survey, “ In 6th Australasian Information Security Conference, ACSC2008, Wollongong, Australia, January 2008.Google Scholar
  2. [2]
    B. Parno, E. Gaustad, M. Luk and A. Perrig, “Secure Sensor Network Routing: A Clean-Slate Approach,” CoNEXT 2006, Lisboa, Portugal.Google Scholar
  3. [3]
    A. P. R. Silva, M. H. T. Martins, B. P. S. Rocha, A. A. F. Loureiro, L. B. Ruiz and H. C. Wong, “Decentralized Intrusion Detection in Wireless Sensor Networks,“ In Q2Swinet’05. Montreal, Quebec, Canada, 2005.Google Scholar
  4. [4]
    R. Shorey, A. Ananda, M. C. Chan, and W. T. Ooi, Mobile, Wireless and Sensor Networks: technology, applications, and future directions. John Wiley & Sons. Hoboken, New Jersey. 2006Google Scholar
  5. [5]
    I. Balepin, S. Maltsev, J. Rowe, and K. Levitt, “Using specification-based intrusion detection for automated response,” In Proceeding of 6 th International Symposium, Pittsburgh, PA, September 2003. RAID 2003, Recent Advances in Intrusion Detection.Google Scholar
  6. [6]
    S. Marti, T. Giuli, K. Lai, and M. Baker, “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks,” In 6th ACM/IEEE Internacional Conference on Mobile Computing and Networking MobiCom’ 00, Agosto 2000.Google Scholar
  7. [7]
    R. Roman, J. Zhou and J. Lopez, “Applying Intrusion Detection Systems to Wireless Sensor Networks,” in Consumer Communications and Networking Conference, 2006. CCNC 2006. 3rd IEEEGoogle Scholar
  8. [8]
    W. R. Pires Jr., T. H. P. Figueiredo, H. C. Wong and A. A. F. Loureiro. “Malicious node detection in wireless sensor networks,” In Proceedings of the 8th International Parallel & Distributed Processing Symposium (IPDPS’04), Santa Fe, NM, USA. ISBN 0-7695-2132-0.Google Scholar
  9. [9]
    Guorui Li, Jingsha He, Yingfang Fu, “A Distributed Intrusion Detection Scheme for Wireless Sensor Networks,” Distributed Computing Systems Workshops, International Conference on, vol. 0, no.0, pp. 309–314, 2008 The 28th International Conference on Distributed Computing Systems Workshops, 2008.Google Scholar
  10. [10]
    C. V. Z. Zhou, S. Karunasekera and C. Leckie, “A peer-to-peer Collaborative Intrusion Detection System”, Networks, 2005. Jointly held with the 2005, IEEE 7th Malaysia International Conference on Communication.Google Scholar
  11. [11]
    A. Perrig, R. Szewczyk, V. Wen, D. Culler and J. D. Tygar, “SPINS: Security Protocols for Sensor Networks,” In Mobile Computing and Networking 2001, Rome, Italy.Google Scholar
  12. [12]
    K. Holger and W. Andreas, Protocols and Architectures for Wireless Sensor Networks. Jonh Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex. England. 2008.Google Scholar
  13. [13]
    I. Stoica, R. Morris, D. Karger, M. F. Kaashoek and H. Balakrishnan, “Chord: A scalable peer-to-peer lookup service for internet applications”, Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications. San Diego, California, United States. pp. 149 – 160. 2001.Google Scholar
  14. [14]
    D. Karger, E. Lehman, T. Leighton, M. Levine, D. Lewin, R. Panigrahy, “Consistent hashing and random trees: Distributed caching protocols for relieving hot spots on the World Wide Web,” Proc. 29th Annu. ACM Symp.,May 1997, pp. 654–663.Google Scholar
  15. [15]
  16. [16]

Copyright information

© Springer Science+Business Media B.V. 2010

Authors and Affiliations

  • Marcus Vinícius de Sousa Lemos
    • 1
  • Líliam Barroso Leal
    • 1
  • Raimir Holanda Filho
    • 1
  1. 1.Applied Computer Science DepartmentUniversity of FortalezaFortalezaBrazil

Personalised recommendations