یک سیستم تشخیص نفوذ سبک مبتنی بر اعتماد دوسطحی برای شبکههای حسگر بیسیم
الموضوعات :مهدی صادقی زاده 1 , امیدرضا معروضی 2
1 - دانشگاه صنعتی قوچان
2 - دانشگاه صنعتی شاهرود
الکلمات المفتاحية: شبکههای حسگر بیسیمحملات مسیریابیسیستمهای تشخیص نفوذتشخیص مبتنی بر خصوصیاتعملیات مبتنی بر اعتمادمعیار کارایی,
ملخص المقالة :
شبکههای حسگر بیسیم یکی از فناوریهای کاربردی و جذاب است که در سالهای اخیر بسیار مورد توجه قرار گرفته است. این شبکهها به دلیل ویژگیهایی همچون سهولت استفاده و هزینه پایین آن، در زمینههای متنوعی به کار گرفته شدهاند. با توجه به بحرانیبودن اغلب کاربردهای این شبکهها، امنیت بهعنوان یکی از پارامترهای اساسی کیفیت سرویس در آنها مطرح بوده و بنابراین تشخیص نفوذ نیز بهعنوان یک لازمه اساسی برای تأمین امنیت در این شبکهها تلقی میشود. این مقاله یک سیستم تشخیص نفوذ سبک مبتنی بر اعتماد را برای محافظت از شبکه حسگر بیسیم در برابر همه حملات لایه شبکه و مسیریابی ارائه مینماید که مبتنی بر خصوصیات استخراجشده از آنها است. از طریق شبیهسازیها، سیستم تشخیص نفوذ پیشنهادی با تمامی معیارهای کارایی مورد ارزیابی قرار گرفته است. نتایج بهدستآمده نشان میدهد که سیستم تشخیص نفوذ پیشنهادی در مقایسه با کارهای موجود که اغلب بر روی یک حمله خاص تمرکز دارند، همه حملات لایه شبکه و مسیریابی را در شبکههای حسگر بیسیم پوشش داده و همچنین با توجه به دقت تشخیص بالا، نرخ هشدار نادرست پایین و مصرف انرژی کم، بهعنوان یک سیستم تشخیص نفوذ مطلوب و سبک برای شبکههای حسگر بیسیم مطرح است.
[1] M. G. Ball, B. Qela, and S. Wesolkowski, "A review of the use of computational intelligence in the design of military surveillance networks," Recent Advances in Computational Intelligence in Defense and Security, vol. 621, pp. 663-693, Dec. 2015.
[2] D. He, N. Kumar, J. Chen, C. C. Lee, and N. Chilamkurti, "Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks," Multimedia Systems, vol. 21, no. 1, pp. 49-60, Feb. 2015.
[3] M. Li and H. J. Lin, "Design and implementation of smart home control systems based on wireless sensor networks and power line communications," IEEE Trans. on Industrial Electronics, vol. 62, no. 7, pp. 4430-4442, Jul. 2015.
[4] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "A survey on sensor networks," IEEE Communications Magazine, vol. 40, no. 8, pp. 102-114, Aug. 2002.
[5] H. C. Qu, S. Jian, X. M. Tang, and P. Wang, "Hybrid computational intelligent methods incorporating into network intrusion detection," J. of Computational and Theoretical Nanoscience, vol. 12, no. 12, pp. 5492-5496, Dec. 2015.
[6] X. Chen, K. Makki, K. Yen, and N. Pissinou, "Sensor network security: a survey," IEEE Communications Surveys & Tutorials, vol. 11, no. 2, pp. 52-73, Jun. 2009.
[7] G. Padmavathi and D. Shanm, "A survey of attacks, security mechanisms and challenges in wireless sensor networks," International J. of Computer Science and Information Security, vol. 4, no. 1, pp. 1-9, Aug. 2009.
[8] Y. Maleh and A. Ezzati, "A review of security attacks and intrusion detection schemes in wireless sensor network," International J. of Wireless & Mobile Networks, vol. 5, no. 6, 12 pp., Dec. 2013.
[9] E. J. Kumar Patel and K. Tripathi, "Sinkhole attack detection and prevention in WSN & improving the performance of AODV protocol," International J. of Innovative Research in Computer and Communication Engineering, vol. 4, no. 5, pp. 9660-9669, May 2016.
[10] V. C. Manju, "Sybil attack prevention in wireless sensor network," International J. of Computer Networking, Wireless and Mobile Communications, vol. 4, no. 2, pp. 125-132, Apr. 2014.
[11] P. Amish and V. B. Vaghela, "Detection and prevention of wormhole attack in wireless sensor network using AOMDV protocol," Procedia Computer Science, vol. 79, pp. 700-707, 2016.
[12] M. A. Salam and N. Halemani, "Performance evaluation of wireless sensor networks under hello_flood attack," International J. of Computer Networks & Communications, vol. 8, no. 2, pp. 77-78, Mar. 2016.
[13] A. Liu, M. Dong, K. Ota, and J. Long, "PHACK-an efficient scheme for selective forwarding attack detection in WSNs," Sensors, vol. 15, no. 12, pp. 30942-30963, Dec. 2015.
[14] Y. Zhang, W. Lee, and Y. A. Huang, "Intrusion detection techniques for mobile wireless networks," J. of Wireless Networks, vol. 9, no. 5, pp. 545-556, Sept. 2003.
[15] A. Ghosal and S. Halder, "A survey on energy efficient intrusion detection in wireless sensor networks," J. of Ambient Intelligence and Smart Environments, vol. 9, no. 2, pp. 239-261, Feb. 2017.
[16] S. Duhan and P. khandnor, "Intrusion detection system in wireless sensor networks a comprehensive review," in Proc. Int. Conf. on Electrical, Electronics, and Optimization Techniques, ICEEOT'16, pp. 2707-2712, Chennai, India, 3-5 Mar. 2016.
[17] A. Abduvaliyev, S. K. Pathan, J. Zhou, R. Roman, and W. C. Wong, "On the vital areas of intrusion detection systems in wireless sensor networks," IEEE Communications Surveys & Tutorials, vol. 15, no. 3, pp. 1223-1237, Third Quarter 2013.
[18] S. Shin, T. Kwon, G. Y. Jo, Y. Park, and H. Rhy, "An experimental study of hierarchical intrusion detection for wireless industrial sensor networks," IEEE Trans. on Industrial Informatics, vol. 6, no. 4, pp. 744-757, Nov. 2010.
[19] A. Agah and S. K. Das, "Preventing DoS attacks in wireless sensor networks: a repeated game theory approach," International J. of Network Security, vol. 5, no. 2, pp. 145-153, 2007.
[20] V. Bhuse and A. Gupta, "Anomaly intrusion detection in wireless sensor networks," J. of High Speed Networks, vol. 15, no. 1, pp. 33-51, Jan. 2006.
[21] C. F. Hsieh, R. C. Chen, and Y. F. Huang, "Applying an ontology to a patrol intrusion detection system for wireless sensor networks," International J. of Distributed Sensor Networks, vol. 10, no. 1, pp. 1-14, Jan. 2014.
[22] Y. Maleh, A. Ezzati, Y. Qasmaoui, and M. Mbida, "A global hybrid intrusion detection system for wireless sensor networks," Procedia Computer Science, vol. 52, pp. 1047-1052, Jun. 2015.
[23] J. Wang, S. Jiang, and A. O. Fapojuwo, "A protocol layer trust-based intrusion detection scheme for wireless sensor networks," Sensors, vol. 17, no. 6, Article 1227, May 2017.
[24] M. M. Ozcelik, E. Irmak, and S. Ozdemir, "A hybrid trust based intrusion detection system for wireless sensor networks," in Proc. Int. Symp. on Networks, Computers and Communications, ISNCC’17, 6 pp., Marrakech, Morocco, 16-18 May 2017.
[25] K. K. Waraich and B. Singh, "Performance analysis of AODV routing protocol with and without malicious attack in mobile adhoc networks," International J. of Advanced Science and Technology, vol. 82, no. 6, pp. 63-70, Sep. 2015.
[26] H. Ehsan and F. A. Khan, "Malicious AODV: implementation and analysis of routing attacks in MANETs," in Proc. IEEE 11th Int. Conf. on Trust, Security and Privacy in Computing and Communications, pp. 1181-1187, Liverpool, UK, 25-27 Jun. 2012.