A Lightweight Intrusion Detection System Based on Two-Level Trust for Wireless Sensor Networks
Subject Areas : electrical and computer engineeringM. sadeghizade 1 , O. R. Marouzi 2
1 - Quchan University of Technology
2 -
Abstract :
Wireless sensor networks (WSNs) are one of the useful and attractive technologies that have received much attention in recent years. These networks have been used in a variety of applications, due to their ease of use and inexpensive deployment. Due to the criticality of most applications of these networks, security is considered as one of the essential parameters of the quality of service (QoS), and thus Intrusion Detection System (IDS) is considered as a fundamental requirement for security in these networks. This paper provides a trust-based IDS to protect the WSN against all network layer and routing attacks based on the features extracted from them. Through simulations, the proposed IDS has been evaluated with all performance criteria. The results show that the proposed IDS, in comparison with existing works, which often focuses on a specific attack, covers all network layer and routing attacks in WSNs, and also, due to high detection accuracy, low false alarms rate, and low energy consumption is considered as a desirable and lightweight IDS for WSNs.
[1] M. G. Ball, B. Qela, and S. Wesolkowski, "A review of the use of computational intelligence in the design of military surveillance networks," Recent Advances in Computational Intelligence in Defense and Security, vol. 621, pp. 663-693, Dec. 2015.
[2] D. He, N. Kumar, J. Chen, C. C. Lee, and N. Chilamkurti, "Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks," Multimedia Systems, vol. 21, no. 1, pp. 49-60, Feb. 2015.
[3] M. Li and H. J. Lin, "Design and implementation of smart home control systems based on wireless sensor networks and power line communications," IEEE Trans. on Industrial Electronics, vol. 62, no. 7, pp. 4430-4442, Jul. 2015.
[4] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "A survey on sensor networks," IEEE Communications Magazine, vol. 40, no. 8, pp. 102-114, Aug. 2002.
[5] H. C. Qu, S. Jian, X. M. Tang, and P. Wang, "Hybrid computational intelligent methods incorporating into network intrusion detection," J. of Computational and Theoretical Nanoscience, vol. 12, no. 12, pp. 5492-5496, Dec. 2015.
[6] X. Chen, K. Makki, K. Yen, and N. Pissinou, "Sensor network security: a survey," IEEE Communications Surveys & Tutorials, vol. 11, no. 2, pp. 52-73, Jun. 2009.
[7] G. Padmavathi and D. Shanm, "A survey of attacks, security mechanisms and challenges in wireless sensor networks," International J. of Computer Science and Information Security, vol. 4, no. 1, pp. 1-9, Aug. 2009.
[8] Y. Maleh and A. Ezzati, "A review of security attacks and intrusion detection schemes in wireless sensor network," International J. of Wireless & Mobile Networks, vol. 5, no. 6, 12 pp., Dec. 2013.
[9] E. J. Kumar Patel and K. Tripathi, "Sinkhole attack detection and prevention in WSN & improving the performance of AODV protocol," International J. of Innovative Research in Computer and Communication Engineering, vol. 4, no. 5, pp. 9660-9669, May 2016.
[10] V. C. Manju, "Sybil attack prevention in wireless sensor network," International J. of Computer Networking, Wireless and Mobile Communications, vol. 4, no. 2, pp. 125-132, Apr. 2014.
[11] P. Amish and V. B. Vaghela, "Detection and prevention of wormhole attack in wireless sensor network using AOMDV protocol," Procedia Computer Science, vol. 79, pp. 700-707, 2016.
[12] M. A. Salam and N. Halemani, "Performance evaluation of wireless sensor networks under hello_flood attack," International J. of Computer Networks & Communications, vol. 8, no. 2, pp. 77-78, Mar. 2016.
[13] A. Liu, M. Dong, K. Ota, and J. Long, "PHACK-an efficient scheme for selective forwarding attack detection in WSNs," Sensors, vol. 15, no. 12, pp. 30942-30963, Dec. 2015.
[14] Y. Zhang, W. Lee, and Y. A. Huang, "Intrusion detection techniques for mobile wireless networks," J. of Wireless Networks, vol. 9, no. 5, pp. 545-556, Sept. 2003.
[15] A. Ghosal and S. Halder, "A survey on energy efficient intrusion detection in wireless sensor networks," J. of Ambient Intelligence and Smart Environments, vol. 9, no. 2, pp. 239-261, Feb. 2017.
[16] S. Duhan and P. khandnor, "Intrusion detection system in wireless sensor networks a comprehensive review," in Proc. Int. Conf. on Electrical, Electronics, and Optimization Techniques, ICEEOT'16, pp. 2707-2712, Chennai, India, 3-5 Mar. 2016.
[17] A. Abduvaliyev, S. K. Pathan, J. Zhou, R. Roman, and W. C. Wong, "On the vital areas of intrusion detection systems in wireless sensor networks," IEEE Communications Surveys & Tutorials, vol. 15, no. 3, pp. 1223-1237, Third Quarter 2013.
[18] S. Shin, T. Kwon, G. Y. Jo, Y. Park, and H. Rhy, "An experimental study of hierarchical intrusion detection for wireless industrial sensor networks," IEEE Trans. on Industrial Informatics, vol. 6, no. 4, pp. 744-757, Nov. 2010.
[19] A. Agah and S. K. Das, "Preventing DoS attacks in wireless sensor networks: a repeated game theory approach," International J. of Network Security, vol. 5, no. 2, pp. 145-153, 2007.
[20] V. Bhuse and A. Gupta, "Anomaly intrusion detection in wireless sensor networks," J. of High Speed Networks, vol. 15, no. 1, pp. 33-51, Jan. 2006.
[21] C. F. Hsieh, R. C. Chen, and Y. F. Huang, "Applying an ontology to a patrol intrusion detection system for wireless sensor networks," International J. of Distributed Sensor Networks, vol. 10, no. 1, pp. 1-14, Jan. 2014.
[22] Y. Maleh, A. Ezzati, Y. Qasmaoui, and M. Mbida, "A global hybrid intrusion detection system for wireless sensor networks," Procedia Computer Science, vol. 52, pp. 1047-1052, Jun. 2015.
[23] J. Wang, S. Jiang, and A. O. Fapojuwo, "A protocol layer trust-based intrusion detection scheme for wireless sensor networks," Sensors, vol. 17, no. 6, Article 1227, May 2017.
[24] M. M. Ozcelik, E. Irmak, and S. Ozdemir, "A hybrid trust based intrusion detection system for wireless sensor networks," in Proc. Int. Symp. on Networks, Computers and Communications, ISNCC’17, 6 pp., Marrakech, Morocco, 16-18 May 2017.
[25] K. K. Waraich and B. Singh, "Performance analysis of AODV routing protocol with and without malicious attack in mobile adhoc networks," International J. of Advanced Science and Technology, vol. 82, no. 6, pp. 63-70, Sep. 2015.
[26] H. Ehsan and F. A. Khan, "Malicious AODV: implementation and analysis of routing attacks in MANETs," in Proc. IEEE 11th Int. Conf. on Trust, Security and Privacy in Computing and Communications, pp. 1181-1187, Liverpool, UK, 25-27 Jun. 2012.