Share This Article:

Trusted-CDS Based Intrusion Detection System in Wireless Sensor Network (TC-IDS)

Abstract PP. 1-10
DOI: 10.4236/oalib.1100848    1,309 Downloads   1,784 Views   Citations

ABSTRACT

Security mechanism is a fundamental requirement of wireless networks in general and Wireless Sensor Networks (WSN) in particular. The Intrusion Detection System (IDS) has become a critical component of wireless sensor networks security strategy. There are several architectures for embedding IDS in WSN. Due to Energy Limitation, in this paper we use a distributed architecture which activates intrusion detection system for limited number of nodes. For this purpose we select a secure set of nodes called secure Connected Dominating Set (CDS). In this paper first, we propose a heuristic for selecting CDS based on weighing factor which uses the trust value. Trust is based on reputation and reputation refers to the opinion of one node about another node. Hence only well behaving and good quality nodes are selected as a dominant node for CDS construction. Then we activate IDS on these selected node set. In our proposed work the task of all dominating nodes is to discover any attack and threat that can affect the normal behavior of sensor nodes by analyzing actual status of a node, packet sent and received by node and measurement made to the environment. The simulation results show that our TC-IDS model have high packet delivery ratio, high throughput and low delay than existing IDS Schemes such as Lightweight IDS.

Conflicts of Interest

The authors declare no conflicts of interest.

Cite this paper

Mohajer, A. , Hajimobini, M. , Mirzaei, A. and Noori, E. (2014) Trusted-CDS Based Intrusion Detection System in Wireless Sensor Network (TC-IDS). Open Access Library Journal, 1, 1-10. doi: 10.4236/oalib.1100848.

References

[1] Townsend, C. and Arms, S. (2002) Wireless Sensor Networks: Principles and Applications. Sensor Technology Handbook, 11, 575589.
[2] Pathan, A.-S.K., Lee, H.-W. and Hong, C.S. (2006) Security in Wireless Sensor Networks: Issues and Challenges. Proceedings of 8th IEEE ICACT 2006, Volume II, Seon Hong, 20-22 February 2006, 1043-1048.
[3] Bhatnagar, R. and Shankar, U. (2012) The Proposal of Hybrid Intrusion Detection for Defence of Sync Flood Attack in Wireless Sensor Network. International Journal of Computer Science & Engineering Survey, 3, 31-38.
http://dx.doi.org/10.5121/ijcses.2012.3204
[4] Wu, J. and Li, H. (1999) On Calculating Connected Dominating Set for Efficient Routing in Ad-hoc Wireless Networks. Proceedings of the 3rd International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communication (DIAL’M), Seattle, August 1999, 7-14.
[5] Haggar, B. (2009) Self-Stabilizing Clustering Algorithm for Ad-hoc Networks. Proceedings of the 5th International Conference on Wireless and Mobile Communications, ICWMC 2009, French Riviera, August 2009, 24-29.
[6] Theoleyre, F. and Valois, F. (2005) Virtual Structure Routing in Ad-hoc Networks. IEEE ICC’2005, Seoul, May 2005, 78-82.
[7] Ali, K., Sara, M., Belbachir, R., Maaza, Z.M. and Senouci, S.M. (2012) Self-Organization Framework for Mobile Ad-hoc Networks. Proceedings of 8th International conference on Wireless Communications and Mobile Computing, August 2012, 14-22.
[8] Krontiris, I., Benenson, Z., Giannetsos, T., Freiling, F. and Dimitriou, T. (2009) Cooperative Intrusion Detection in Wireless Sensor Networks. Wireless Sensor Networks, 5, 263-278.
http://dx.doi.org/10.1007/978-3-642-00224-3_17
[9] Stetsko, A., Folkman, L. and Matyas, V. (2010) Neighbor-Based Intrusion Detection for Wireless Sensor Networks. Proceedings of International Conference on Wireless and Mobile Communications, Los Alamitos, 420-425.
[10] Giannetsos, A. (2008) Intrusion Detection in Wireless Sensor Networks. Master’s Thesis, Carnegie Mellon University, Pittsburgh.
[11] nShield Project (2012) New Embedded Systems Architecture for Multi-Layer Dependable Solutions. Project No: 269317, Selex Elsag, SE Europe.
[12] Krontiris, I., Dimitriou, T. and Freiling, F.C. (2007) Towards Intrusion Detection in Wireless Sensor Networks. Proceedings of the 13th European Wireless Conference, Paris, April 2007, 166-173.
[13] Krontiris, I., Dimitriou, T., Giannetsos, T. and Mpasoukos, M. (2008) Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks. In: Algorithmic Aspects of Wireless Sensor Networks, Springer, Sophia Antipolis, 150-161.
[14] Gerrigagoitia, K., Uribeetxeberria, R., Zurutuza, U. and Arenaza, I. (2012) Reputation-Based Intrusion Detection System for Wireless Sensor Networks. Complexity in Engineering (COMPENG), Aachen, 11-13 June 2012, 1-5.
[15] Krontiris, I., Giantsos, T. and Dimitriou, T. (2008) LIDeA: A Distributed Lightweight Intrusion Detection Architecture for Sensor Networks. Proceedings of the 4th International Conference on Security and Privacy in Communication Networks, ACM, Istanbul, 22-25 September 2008, 1-10.
[16] Buchegger, S. and Boudec, J.Y.L. (2003) A Robust Reputation System for Mobile Ad-hoc Networks. Proceedings of P2PEcon, EPFL IC Technical Report IC/2003/50.
[17] Jsang, A. and Ismail, R. (2002) The Beta Reputation System. Proceedings of the 15th Bled Electronic Commerce Conference, Bled, 17-19 June 2002, 41-55.
[18] Ganeriwal, S., Balzano, L.K. and Srivastava, M.B. (2008) Reputation-Based Framework for High Integrity Sensor Networks. ACM Transactions on Sensor Networks (TOSN), 4, 1-7.
http://dx.doi.org/10.1145/1362542.1362546
[19] Bidgoly, A.J. and Ladani, B.T. (2013) Quantitative Verification of Beta Reputation System Using PRISM Probabilistic Model Checker. Proceedings of 10th International ISC Conference on Information Security and Cryptology (ISCISC), Yazd, 29-30 August 2013, 1-6.
[20] Roman, R., Zhou, J.Y. and Lopez, J. (2006) Applying Intrusion Detection Systems to Wireless Sensor Networks. 3rd IEEE Consumer Communications and Networking Conference, CCNC 2006, 1, 640-644.
[21] Patwardhan, A., Parker, J., Joshi, A., Iorga, M. and Karygiannis, T. (2005) Secure Routing and Intrusion Detection in Ad Hoc Networks. 3rd IEEE International Conference on Pervasive Computing and Communications, PerCom 2005, Kauai Island, 8-12 March 2005, 191-199.
[22] Network Simulator NS-2, 2002.
http://www.isi.edu/nsnam/ns/index.html
[23] Hai, T.H., Huh, E.N. and Jo, M. (2009) A Lightweight Intrusion Detection Framework for Wireless Sensor Networks. Wireless Communications and Mobile Computing, 10, 559-572.

  
comments powered by Disqus

Copyright © 2019 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.