Open Access Open Access  Restricted Access Subscription Access

Survey of Intrusion Detection Techniques and Architectures in Wireless Sensor Networks


Affiliations
1 Department of Computer Science &Engg., I. K. Gujral Punjab Technical University, Jalandhar, Punjab, India
2 Department of Computer Science & Engg., Gulzar group of Institutes, Khanna, Punjab, India
 

Advances in electronics and wireless communication technologies have enabled the development of large-scale wireless sensor networks (WSNs). However, WSNs practice from lots of constraints, with low computation capability, small memory, limited energy resources, vulnerability to physical capture, and the need of infrastructure, which enforce lonely security challenges mostly for the applications where confidentiality has key significance. There are diverse applications for wireless sensor networks, and security is very major issue for several of them. Before attackers can damage the WSN system (i.e., sensor nodes) and/or information destination (i.e., data sink or base station) in order to work WSNs in a secure way, any sort of intrusions should be detected.

Keywords

Intrusion Detection, IDS, Security, Wireless Sensor Network, WSN.
User
Notifications
Font Size

  • I.F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci, “A survey on sensor networks”, IEEE Commun. Mag., vol. 40, num. 8, pp. 102- 114, 2002.
  • M. Ngadi, A.H. Abdullah, and S. Mandala, “A survey on MANET intrusion detection”, International J.Computer Science and Security, volume 2, number 1, pages 1-11, 2008.
  • Y. Zhang, W. Lee, and Y.A. Huang, “Intrusion detection techniques for mobile wireless networks”, J. Wireless Networks, vol. 9, num. 5, pp.545-556, 2003.
  • T.S. Sobh, “Wired and wireless intrusion detection system: Classifications, good characteristics and state-oftheart”, Elsevier J. Computer Standards and Interfaces, volume 28, number 6, pages 670-694, 2006.
  • T. Anantvalee and J. Wu, “A survey on intrusion detection in mobile ad hoc networks”, Springer J. Wireless Network Security, pages 159-180, 2007.
  • P. Albers, O. Camp, J. Percher, B. Jouga, L. M, and R. Puttini, “Security in Ad Hoc Networks: A General Intrusion Detection Architecture Enhancing Trust Based Approaches,” Proc. 1st International Workshop on Wireless Information Systems (WIS-2002), pp. 1-12, April 2002.
  • Noureddine Assad, Brahim Elbhiri, Moulay Ahmed Faqihi, Mohamed Ouadou and Driss Aboutajdine, "Efficient deployment quality analysis for intrusion detection in wireless sensor networks", Wireless Networks, vol. 22, no. 3, pp. 991-1006, April 2016.
  • Michael Riecker, Sebastian Biedermann, Rachid El Bansarkhani and Matthias Hollick, "Lightweight energy consumption-based intrusion detection system for wireless sensor networks", International Journal of Information Security, vol. 14, no. 2, pp. 155-167, 2015.
  • Hussein Moosavi and Francis Minhthang Bui, "A Game-Theoretic Framework for Robust Optimal Intrusion Detection in Wireless Sensor Networks", IEEE Transactions on Information Forensics and Security, vol. 9, no. 9, pp. 1367-1379, June 2014.
  • Mohammad Wazid and Ashok Kumar Das, "An Efficient Hybrid Anomaly Detection Scheme Using K-Means Clustering for Wireless Sensor Networks", Wireless Personal Communications, vol. 90, no. 4, pp. 1971-2000, October 2016.
  • Helio Mendes Salmon, Claudio M. de Farias, Paula Loureiro, Luci Pirmez, "Intrusion Detection System for Wireless Sensor Networks Using Danger Theory ImmuneInspired Techniques", International Journal of Wireless Information Networks, vol. 20, no. 1, pp. 39-66, 2013.
  • Shahaboddin Shamshirband, Nor Badrul Anuar and Miss Laiha Mat Kiah, "Co-FAIS: Cooperative fuzzy artificial immune system for detecting intrusion in wireless sensor networks", Journal of Network and Computer Applications, vol. 42, pp. 102-117, 2014.
  • Sutharshan Rajasegarar, Christopher Leckie and Marimuthu Palaniswami, "Hyperspherical cluster based distributed anomaly detection in wireless sensor networks", Journal of Parallel and Distributed Computing, vol. 74, no. 1, pp. 1833-1847, 2014.
  • Anil Kumar Sagar and D. K. Lobiyal, "Probabilistic Intrusion Detection in Randomly Deployed Wireless Sensor Networks", Wireless Personal Communications, vol. 84, no. 2, pp. 1017-1037, 2015.
  • Ashfaq Hussain Farooqi, Farrukh Aslam Khan, Jin Wang and Sungyoung Lee, "A novel intrusion detection framework for wireless sensor networks", Personal and Ubiquitous Computing, vol. 17, no. 5, pp. 907-919, 2013.
  • Ahmed Saeed, Ali Ahmadinia, Abbas Javed and Hadi Larijani, "Random Neural Network based Intelligent Intrusion Detection for Wireless Sensor Networks", In proceedings of International Conference on Computational Science, vol. 80, pp. 2372-2376, 2016.
  • Sandhya G and Anitha Julian, "Intrusion Detection in Wireless Sensor Network Using Genetic K-Means Algorithm", In proceedings of IEEE International Conference on Advanced Communication Control and Computing Teclmologies, pp. 1-4, 2014.
  • Shahaboddin Shamshirband, Amineh Amini, Nor Badrul Anuar, Miss Laiha Mat Kiah, Teh Ying Wah and Steven Furnell, "D-FICCA: A Density-based Fuzzy Imperialist Competitive Clustering Algorithm for Intrusion Detection in Wireless Sensor Networks", Measurement, vol. 55, pp. 212-226, 2014.
  • Guangjie Han, Jinfang Jiang, Wen Shen, Lei Shu and Joel Rodrigues, "IDSEP: a novel intrusion detection scheme based on energy prediction in cluster-based wireless sensor networks", IET Information Security, vol. 7, no. 2, pp. 97-105, 2013.
  • Maissa Elleuch, Osman Hasan, Sofi`ene Tahar and Mohamed Abid, "Formal probabilistic analysis of detection properties in wireless sensor networks", Formal Aspects of Computing, vol. 27, no. 1, pp. 79-102, 2015.
  • Laura Gheorghe, Razvan Rughinis and Razvan Tataroiu, "Adaptive Trust Management Protocol based on Intrusion Detection for Wireless Sensor Networks", In proceedings of IEEE International Conference on Networking in Education and Research, pp. 1-7, 2013.
  • Masud Moshtaghi, Christopher Leckie, Shanika Karunaseker and Sutharshan Rajasegarar, "An adaptive elliptical anomaly detection model for wireless sensor networks", Computer Networks, vol. 64, pp. 195-207, 2014.
  • Yassine Maleh, Abdellah Ezzati, Youssef Qasmaoui and Mohamed Mbida, "A Global Hybrid Intrusion Detection System for Wireless Sensor Networks", The fiifth International Symposium on Frontiers in Ambient and Mobile Systems, vol. 52, pp. 1047-1052, 2015.
  • Yun Wang, Xiaodong Wang, Bin Xie, Demin Wang and Dharma P. Agrawal, "Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks", IEEE Transactions on Mobile computing, vol. 7, no. 6, pp. 698-710, 2008.
  • S. Shamshirband, N.B. Anuar, M.L.M. Kiah, A. Patel, "An appraisal and design of a multi-agent system based cooperative wireless intrusion detection computational intelligence technique", Engineering Applications of Artificial Intelligence, vol. 26, no. 9, pp. 2105-2127, 2013.
  • Yun Wang and Zhengdong Lun, "Intrusion detection in a K-Gaussian distributed wireless sensor network", Journal of Parallel and Distributed Computing", vol. 71, no. 12, pp. 1598-1607, 2011.
  • Shigen Shen, Yuanjie Li, Hongyun Xu and Qiying Cao, "Signaling game based strategy of intrusion detection in wireless sensor networks”, Computers & Mathematics with Applications, vol. 62, no. 6, pp. 2404-2416, 2011.
  • Guorui Li, Jingsha He and Yingfang Fu, "Group-based intrusion detection system in wireless sensor Networks”, Computer Communications, vol. 31. No.18, pp. 4324-4332, 2008.
  • Hichem Sedjelmaci and Mohamed Feham, “ Novel Hybrid Intrusion Detection System For Clustered Wireless Sensor Network”, International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.4 July 2011.
  • Hossein Jadidoleslamy, “A hierarchical intrusion detection architecture for wireless sensor networks”, International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.5, Sep 2011.
  • K.Q. Yan, S.C. Wang, C.W. Liu, “A Hybrid Intrusion Detection System of Cluster-based Wireless Sensor Networks”, Proceedings of the International Multi Conference of Engineers and Computer Scientists 2009 Vol I IMECS 2009, March 18 – 20, 2009.
  • Ioannis Krontiris, Zinaida Benenson, Thanassis Giannetsos,Felix C. Freiling, and Tassos Dimitriou, “Cooperative Intrusion Detection in Wireless Sensor Networks”, U. Roedig and C.J. Sreenan (Eds.): EWSN 2009, LNCS 5432, pp. 263–278, 2009. Springer-Verlag Berlin Heidelberg, 2009.
  • Soumya Banerjee, Crina Grosan and Ajith Abraham, “IDEAS: Intrusion Detection based on Emotional Ants for Sensors”, 5th international conference on Intelligent systems design and application, pp. 344-349, Sep 2005.

Abstract Views: 150

PDF Views: 0




  • Survey of Intrusion Detection Techniques and Architectures in Wireless Sensor Networks

Abstract Views: 150  |  PDF Views: 0

Authors

Rakesh Sharma
Department of Computer Science &Engg., I. K. Gujral Punjab Technical University, Jalandhar, Punjab, India
Vijay Anant Athavale
Department of Computer Science & Engg., Gulzar group of Institutes, Khanna, Punjab, India

Abstract


Advances in electronics and wireless communication technologies have enabled the development of large-scale wireless sensor networks (WSNs). However, WSNs practice from lots of constraints, with low computation capability, small memory, limited energy resources, vulnerability to physical capture, and the need of infrastructure, which enforce lonely security challenges mostly for the applications where confidentiality has key significance. There are diverse applications for wireless sensor networks, and security is very major issue for several of them. Before attackers can damage the WSN system (i.e., sensor nodes) and/or information destination (i.e., data sink or base station) in order to work WSNs in a secure way, any sort of intrusions should be detected.

Keywords


Intrusion Detection, IDS, Security, Wireless Sensor Network, WSN.

References