Designing an Agent-Based Intrusion Detection System for Heterogeneous Wireless Sensor Networks: Robust, Fault Tolerant and Dynamic Reconfigurable
Hossein Jadidoleslamy
DOI: 10.4236/ijcns.2011.48064   PDF    HTML     5,990 Downloads   11,052 Views   Citations


Protecting networks against different types of attacks is one of most important posed issue into the network and information security domains. This problem on Wireless Sensor Networks (WSNs), in attention to their special properties, has more importance. Now, there are some of proposed solutions to protect Wireless Sensor Networks (WSNs) against different types of intrusions; but no one of them has a comprehensive view to this problem and they are usually designed in single-purpose; but, the proposed design in this paper has been a comprehensive view to this issue by presenting a complete architecture of Intrusion Detection System (IDS). The main contribution of this architecture is its modularity and flexibility; i.e. it is designed and applicable, in four steps on intrusion detection process, consistent to the application domain and its required security level. Focus of this paper is on the heterogeneous WSNs and network-based IDS, by designing and deploying the Wireless Sensor Network wide level Intrusion Detection System (WSNIDS) on the base station (sink). Finally, this paper has been designed a questionnaire to verify its idea, by using the acquired results from analyzing the questionnaires.

Share and Cite:

H. Jadidoleslamy, "Designing an Agent-Based Intrusion Detection System for Heterogeneous Wireless Sensor Networks: Robust, Fault Tolerant and Dynamic Reconfigurable," International Journal of Communications, Network and System Sciences, Vol. 4 No. 8, 2011, pp. 523-543. doi: 10.4236/ijcns.2011.48064.

Conflicts of Interest

The authors declare no conflicts of interest.


[1] S. Mohammadi, R. A. Ebrahimi and H. Jadidoleslamy, “A Comparison of Routing Attacks on Wireless Sensor Networks,” Journal of Information Assurance and Security, Vol. 6, No. 1554-1010, 2011, pp. 195-215.
[2] S. Mohammadi, R. A. Ebrahimi and H. Jadidoleslamy, “A Comparison of Link Layer Attacks on Wireless Sensor Networks,” Journal of Information Security, Vol. 2, No. 2, 2011, pp. 69-84. doi:10.4236/jis.2011.22007
[3] K. Sharma and M. K. Ghose, “Wireless Sensor Networks: An Overview on Its Security Threats,” International Journal of Computer Applications, Special Issue, 2010.
[4] T. A. Zia, “A Security Framework for Wireless Sensor Networks,” PhD Thesis, The School of Information Technologies, University of Sydney, Sydney, 2008.
[5] M. Saxena, “Security in Wireless Sensor Networks: A Layer-Based Classification,” Department of Computer Science, Purdue University, West Lafayette.
[6] Z. Li and G. Gong, “A Survey on Security in Wireless Sensor Networks,” Department of Electrical and Computer Engineering, University of Waterloo, Waterloo.
[7] A. Dimitrievski, V. Pejovska and D. Davcev, “Security Issues and Approaches in WSN,” Department of Computer Science, Faculty of Electrical Engineering and Information Technology, Republic of Macedonia, Skopje.
[8] J. Yick, B. Mukherjee and D. Ghosal, “Wireless Sensor Network Survey,” Elsevier’s Computer Networks Journal, Vol. 52, No. 12, 2008, pp. 2292-2330. doi:10.1016/j.comnet.2008.04.002
[9] C. Karlof and D. Wagner, “Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures,” Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, Berkeley, 11 May 2003, pp. 113-127. doi:10.1109/SNPA.2003.1203362
[10] A. Perrig, R. Szewczyk, V. Wen, D. Culler and D. Tygar, “SPINS: Security Protocols for Sensor Networks,” Wireless Networks, Vol. 8, No. 5, 2003.
[11] L. Krishnamachari, D. Estrin, and S. Wicker, “The Impact of Data Aggregation in Wireless Sensor Networks,” Proceedings of the 22nd International Conference on Distributed Computing Systems Workshops, 2002, pp. 575-578. doi:10.1109/ICDCSW.2002.1030829
[12] V. Handziski, A. K?pke, H. Karl, C. Frank and W. Drytkiewicz, “Improving the Energy Efficiency of Directed Diffusion Using Passive Clustering,” Proceedings of the 1st European Workshop on Wireless Sensor Networks, Berlin, 2004, pp. 172-187.
[13] K. Scarfone and P. Mell, “Guide to Intrusion Detection and Prevention Systems (IDPS),” National Institute of Standards and Technology, February 2007, pp. 800-894.
[14] G. Maselli, L. Deri and S. Suin, “Design and Implementation of an Anomaly Detection System: An Empirical Approach,” University of Pisa, Pisa, 2002.
[15] V. Chandala, A. Banerjee and V. Kumar, “Anomaly Detection: A Survey,” ACM Computing Surveys, University of Minnesota, Minnesota, September 2009.
[16] Ch. Krügel and Th. Toth, “A Survey on Intrusion Detection Systemsm,” Vienna University of Technology, Vienna, 2000.
[17] J. Molina, “Evaluating Attack Resiliency for Host Intrusion Detection Systems,” Doctoral Dissertation, University of Maryland, College Park.
[18] S. Selliah, “Mobile Agent-Based Attack Resistant Architecture for Distributed Intrusion Detection System,” MSc. Thesis, College of Engineering and Mineral Resources, West Virginia University, Morgantown, 2001.
[19] A. K. Jones and R. S. Sielken, “Computer System Intrusion Detection: A Survey,” University of Virginia, Charlottesville.
[20] S. Northcutt and J. Novak, “Network Intrusion Detection: An Analyst’s Handbook,” New Riders Publishing, Thousand Oaks, 2002.
[21] S. Zanero and S. M. Savaresi, “Unsupervised Learning Techniques for an Intrusion Detection System,” Proceedings of the 2004 ACM symposium on Applied computing, Nicosia, 14-17 March 2004, pp. 412-419.
[22] O. Depren, M. Topallar, E. Anarim and M. K. Ciliz, “An Intelligent Intrusion Detection System (IDS) for Anomaly and Misuse Detection in Computer Networks,” Expert Systems with Applications: An International Journal, Vol. 29, No. 4, 2005, pp. 713-722. doi:10.1016/j.eswa.2005.05.002
[23] R. A. Kemmerer and G. Vigna, “Intrusion Detection: A Brief History and Overview,” Computer Science Department, University of California, Santa Barbara, 2002.
[24] S. Mohammadi and H. Jadidoleslamy, “A Comparison of Physical Attacks on Wireless Sensor Networks,” International Journal of Peer to Peer Networks, Vol. 2, No. 2, 2011, pp. 24-42. doi:10.5121/ijp2p.2011.2203
[25] S. Mohammadi and H. Jadidoleslamy, “A Comparison of Transport and Application Layers Attacks on Wireless Sensor Networks,” International Journal of Information Assurance and Security, Vol. 6, 2011, pp. 331-345.

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.