A Collaborative, Secure and Energy Efficient Intrusion Detection Method for Homogeneous WSN

  • T. Mohamed Mubarak
  • Syed Abdul Sattar
  • Appa Rao
  • M. Sajitha
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 192)


Intrusion detection in WSN has to be done with the trusted nodes in order to secure the process. This paper deals with selection of a set of trusted nodes and does the intrusion detection only with this set of nodes. If the detection is carried out by other types of nodes, we propose a multi-detection model in order to secure the process. Here we also analyze the probability of intrusion detection with these set of nodes. Our proposed selection algorithm also helps in energy efficiency as the information is routed only through these set of nodes. This method is more secure as the detection process is carried out by sensor nodes which are trusted. It is found that our analytical results validate the simulation


Intrusion detection Trust node density sensing range Wireless Sensor Network (WSN) 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A Survey on Sensor Networks. IEEE Communication Magazine 40(8), 102–114 (2002)CrossRefGoogle Scholar
  2. 2.
    Lee, J.J., Krishnamachari, B., Kuo, C.C.J.: Impact of Heterogeneous Deployment on Lifetime Sensing Coverage in Sensor Networks, IEEE SECON (2004)Google Scholar
  3. 3.
    Hu, W., Chou, C.T., Jha, S., Bulusu, N.: Deploying Long-Lived and Cost-effective Hybrid Sensor Networks. Elsevier Ad-Hoc Networks 4(6), 749–767 (2006)CrossRefGoogle Scholar
  4. 4.
    da Silva, A.P., Martins, M., Rocha, B., Loureiro, A., Ruiz, L., Wong, H.C.: Decentralized intrusion detection in wireless sensor networks. In: Proceedings of the 1st ACM International Workshop on Quality of Service & Security in Wireless and Mobile NetworksGoogle Scholar
  5. 5.
    Onat, I., Miri, A.: An intrusion detection system for wireless sensor networks. In: Proceeding of the IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, Montreal, Canada, vol. 3, pp. 253–259 (August 2005)Google Scholar
  6. 6.
    Zhang, Y., Lee, W.: Intrusion Detection in Wireless Ad-Hoc Networks. In: Proc. ACM MobiCom, pp. 275–283 (2000)Google Scholar
  7. 7.
    Liu, B., Brass, P., Dousse, O., Nain, P., Towsley, D.: Mobility improves coverage of sensor networks. In: Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc (2005)Google Scholar
  8. 8.
    Wang, Y., Wang, X., Xie, B., Wang, D., Agrawal, D.P.: Intrusion detection in homogeneous and heterogeneous wireless sensor networks. IEEE Transactions on Mobile Computing 7(6), 698–711 (2008)CrossRefGoogle Scholar
  9. 9.
    Wang, Y., Leow, Y.K., Yin, J.: Is Straight-line Path Always the Best for Intrusion Detection in Wireless Sensor Networks. In: 15th International Conference on Parallel and Distributed Systems (2009)Google Scholar
  10. 10.
    Xiao, Y., Chen, H., Zhang, Y., Du, X., Sun, B., Wu, K.: Intrusion Objects with Shapes under Randomized Scheduling Algorithm. In: The 28th International Conference on Distributed Sensor Networks, in Computing Systems Workshops (2008)Google Scholar
  11. 11.
    Peng, X., Wu, Z., Xiao, D., Yu, Y.: Study on Security Management Architecture for Sensor Network based on Intrusion Detection. In: 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing (2009)Google Scholar
  12. 12.
    Brutch, P., Ko, C.: Challenges in intrusion detection for wireless ad-hoc networks. In: 2003 Symposium on Applications and the Internet Workshops (SAINT 2003 Workshops), 2003 (Q2SWinet 2005), pp. 16–23. ACM Press, New York (2005)Google Scholar
  13. 13.
    Shaikh, J., Lee, H., Lee, S., Song, Y.-J.: Group Based Trust Management Scheme for Clustered WSN. IEE Transaction on Parallel and Distributed Systems 20, 1698–1712 (2009)CrossRefGoogle Scholar
  14. 14.
    Mubarak, M., Sattar, S.A., Rao, A., Sajitha, M.: Energy efficient intrusion detection in three dimensional wireless sensor networks. In: 2010 International Conference on Computational Intelligence and Computing Research (December 2010)Google Scholar
  15. 15.
    Mubarak, M., Sattar, S.A., Rao, A., Sajitha, M.: Intrusion detection: A probability Model for 3D Heterogeneous WSN. International Journal of Computer Applications 6(12) (September 2010)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • T. Mohamed Mubarak
    • 1
  • Syed Abdul Sattar
    • 2
  • Appa Rao
    • 3
  • M. Sajitha
    • 4
  1. 1.Department of CSERoyal college of Engineering and TechnologyTrichurIndia
  2. 2.Department of Computer ScienceRoyal Institute of Technology and ScienceHyderabadIndia
  3. 3.Department of Computer ScienceGITAM Institute of Technology, GITAM UniversityVisakhapatnamIndia
  4. 4.Department of Computer ScienceMES College of EngineeringIndia

Personalised recommendations