A Lightweight Intrusion Detection Scheme Based on Energy Consumption Analysis in 6LowPAN

  • Tsung-Han Lee
  • Chih-Hao Wen
  • Lin-Huang Chang
  • Hung-Shiou Chiang
  • Ming-Chun Hsieh
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 260)


6LoWPAN is one of Internet of Things standard, which allows IPv6 over the low-rate wireless personal area networks. All sensor nodes have their own IPv6 address to connect to Internet. Therefore, the challenge of implementing secure communication in the Internet of Things must be addressed. There are various attack in 6LoWPAN, such as Denial-of-service, wormhole and selective forwarding attack methods. And the Dos attack method is one of the major attacks in WSN and 6LoWPAN. The sensor node’s energy will be exhausted by these attacks due to the battery power limitation. For this reason, security has become more important in 6LoWPAN. In this paper, we proposed a lightweight intrusion detection model based on analysis of node’s consumed in 6LowPAN. The 6LoWPAN energy consumption models for mesh-under and route-over routing schemes are also concerned in this paper. The sensor nodes with irregular energy consumptions are identified as malicious attackers. Our simulation results show the proposed intrusion detection system provides the method to accurately and effectively recognize malicious attacks.


6LoWPAN Energy consumption Intrusion detection 



The authors would like to acknowledge the support from the National Science Council of Taiwan (No. 101-2119-M-142-001, 100-2221-E-142 -002) and National Taichung University regarding the MoE project (No. 1020035480A).


  1. 1.
    Lee TH, Marshall A, Zhou B (2005) A framework for cross-layer design of energy-conserving on-demand routing in multi-hop wireless networks. IEE MobilityGoogle Scholar
  2. 2.
    Performance Analysis of IEEE 802.15.4 MAC Protocol for WSNs in Burst Error Channels (ISCIT 2011)Google Scholar
  3. 3.
    Analytical Modeling of Multi-hop IEEE 802.15.4 Networks (2012). IEEE transactionsGoogle Scholar
  4. 4.
    Bouabdallah F, Bouabdallah N, Boutaba R (2009) On balancing energy consumption in wireless sensor networks. IEEE Trans Veh Technol 58(6)Google Scholar
  5. 5.
    Manju VC, Kumar MS (2012) Detection of jamming style DoS attack in wireless sensor network. Parallel distributed and grid computing (PDGC). 2012 2nd IEEE international conferenceGoogle Scholar
  6. 6.
    Mpitziopoulos A et al (2009) A survey on jamming attacks and countermeasures in WSNs. Commun Surv Tutorials, IEEE 11.4(2009):42–56Google Scholar
  7. 7.
    Pelechrinis K, Iliofotou M, Krishnamurthy SV (2011) Denial of service attacks in wireless networks: the case of jammers. Commun Surv Tutorials, IEEE 13.2(2011):245–257Google Scholar
  8. 8.
    Modares H, Salleh R, Moravejosharieh A (2011) Overview of security issues in wireless sensor networks. Computational intelligence, modelling and simulation (CIMSiM), 2011 third international conferenceGoogle Scholar
  9. 9.
    Shen W et al (2012) A new energy prediction approach for intrusion detection in cluster-based wireless sensor networks. Green communications and networking. Springer, Berlin, pp 1–12Google Scholar
  10. 10.
    Ponomarchuk Y, Seo DW (2010) Intrusion detection based on traffic analysis in wireless sensor networks. 19th annual wireless and optical communications conference (WOCC)Google Scholar
  11. 11.
    Kim K, Hong J (2010) Analysis of power consumption of S-MAC protocol according to DoS attack. 4th IEEE international conference on new trends in information science and service science (NISS)Google Scholar
  12. 12.
    Wander AS et al (2005) Energy analysis of public-key cryptography for wireless sensor networks. Third IEEE International Conference on Pervasive Computing and Communications, PerCom 2005Google Scholar
  13. 13.
    QualNet simulator.

Copyright information

© Springer Science+Business Media Dordrecht 2014

Authors and Affiliations

  • Tsung-Han Lee
    • 1
  • Chih-Hao Wen
    • 1
  • Lin-Huang Chang
    • 1
  • Hung-Shiou Chiang
    • 1
  • Ming-Chun Hsieh
    • 1
  1. 1.Department of Computer ScienceNational Taichung University of EducationTaichungTaiwan, Republic of China

Personalised recommendations