An Instance-Learning-Based Intrusion-Detection System for Wireless Sensor Networks

被引:0
|
作者
Shuai Fu [1 ]
Xiaoyan Wang [2 ]
Jie Li [1 ]
机构
[1] Department of Computer Science, University of Tsukuba
[2] Information Systems Architecture Science Research Division, National Institute of Informatics
关键词
WSN; security; intrusion-detection system; instance learning; black hole;
D O I
暂无
中图分类号
TN929.5 [移动通信]; TP212.9 [传感器的应用];
学科分类号
080202 ; 080402 ; 080904 ; 0810 ; 081001 ;
摘要
This paper proposes an instance-learning-based intrusion-detection system(IL-IDS) for wireless sensor networks(WSNs). The goal of the proposed system is to detect routing attacks on a WSN. Taking an existing instance-learning algorithm for wired networks as our basis, we propose IL-IDS for handling routing security problems in a WSN. Attacks on a routing protocol for a WSN include black hole attack and sinkhole attack. The basic idea of our system is to differentiate the changes between secure instances and attack instances. Considering the limited resources of sensor nodes, the existing algorithm cannot be used directly in a WSN. Our system mainly comprises four parts: feature vector selection, threshold selection, instance data processing, and instance determination. We create a feature vector form composed of the attributes that changes obviously when an attack occurs within the network.For the data processing in resource-constrained sensor nodes, we propose a data-reduction scheme based on the clustering algorithm. For instance determination, we provide a threshold- selection scheme and describe the concrete- instance- determination mechanism of the system. Finally, we simulate and evaluate the proposed IL-IDS for different types of attacks.
引用
收藏
页码:7 / 11
页数:5
相关论文
共 50 条
  • [31] Cross -Layer Intrusion Detection System for Wireless Sensor Networks
    Sathya, D.
    Krishneswari, K.
    [J]. JOURNAL OF SCIENTIFIC & INDUSTRIAL RESEARCH, 2016, 75 (04): : 213 - 220
  • [32] Intrusion Detection System in Wireless Sensor Networks: A Comprehensive Review
    Duhan, Sonu
    Khandnor, Padmavati
    [J]. 2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 2707 - 2712
  • [33] A simple learning automata-based solution for intrusion detection in wireless sensor networks
    Misra, Sudip
    Krishna, P. Venkata
    Abraham, Kiran Isaac
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2011, 11 (03): : 426 - 441
  • [34] LAID: a learning automata-based scheme for intrusion detection in wireless sensor networks
    Misra, Sudip
    Abraham, Kiran Isaac
    Obaidat, Mohammad S.
    Krishna, P. Venkata
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2009, 2 (02) : 105 - 115
  • [35] A lightweight intrusion detection system based on RSSI for sybil attack detection in wireless sensor networks
    Sadeghizadeh, Mahdi
    [J]. INTERNATIONAL JOURNAL OF NONLINEAR ANALYSIS AND APPLICATIONS, 2022, 13 (01): : 305 - 320
  • [36] Neighbor-based intrusion detection for wireless sensor networks
    Faculty of Informatics, Masaryk University, Brno, Czech Republic
    [J]. Proc. - Int. Conf. Wirel. Mob. Commun., ICWMC, (420-425):
  • [37] Immunity-Based Intrusion Detection for Wireless Sensor Networks
    Liu, Yang
    Yu, Fengqi
    [J]. 2008 IEEE INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS, VOLS 1-8, 2008, : 439 - 444
  • [38] Trust-Based Intrusion Detection in Wireless Sensor Networks
    Bao, Fenye
    Chen, Ing-Ray
    Chang, MoonJeong
    Cho, Jin-Hee
    [J]. 2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
  • [39] Intrusion detection based security architecture for wireless sensor networks
    Xiao, DB
    Chen, C
    Chen, GL
    [J]. INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES 2005, VOLS 1 AND 2, PROCEEDINGS, 2005, : 1365 - 1368
  • [40] Ranger Intrusion Detection System for Wireless Sensor Networks with Sybil Attack Based on Ontology
    Chen, Rung-Ching
    Haung, Yung-Fa
    Hsieh, Chia-Fen
    [J]. NEW ASPECTS OF APPLIED INFORMATICS, BIOMEDICAL ELECTRONICS AND INFORMATICS AND COMMUNICATION, 2010, : 176 - +