Efficient monitoring for intrusion detection in wireless sensor networks

被引:11
|
作者
Abdellatif, Takoua [1 ]
Mosbah, Mohamed [2 ]
机构
[1] Polytech Sch Tunisia, SERCOM Lab, La Marsa 2078, Tunisia
[2] Univ Bordeaux, LaBRI Lab, Bordeaux, France
来源
关键词
intrusion detection; LEACH; trust-based clustering; wireless sensor networks; CLUSTERING-ALGORITHM; SYSTEM; SECURITY;
D O I
10.1002/cpe.4907
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In wireless sensor networks (WSN), Intrusion Detection through sensor monitoring enables the detection of intricate security attacks such as denial of service and routing attacks. However, the monitoring process, which observes sensor behaviour, can induce a large amount of energy and bandwidth overhead, thus reducing the system lifetime. Furthermore, monitors can be attacked and their observations corrupted, which breaks the system security. Therefore, our goal is the design of a reliable and energy-efficient monitoring system that resists internal security attacks. We present DAMS (Distributed and Adaptable Monitoring System) that extends LEACH protocol with a trust-based and energy-efficient clustering protocols for both cluster heads and monitors election. Compared to other LEACH extensions, the obtained topology reduces monitoring energy overhead, improves the system lifetime, and increases the packet delivery ratio.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] Adaptable Monitoring for Intrusion Detection in Wireless Sensor Networks
    Abdellatif, Takoua
    Rouis, Kais
    Mosbah, Mohamed
    [J]. 2017 IEEE 26TH INTERNATIONAL CONFERENCE ON ENABLING TECHNOLOGIES - INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES (WETICE), 2017, : 54 - 59
  • [2] An Efficient Intrusion Detection Scheme for Wireless Sensor Networks
    Rong, Chunming
    Eggen, Skjalg
    Cheng, Hongbing
    [J]. SECURE AND TRUST COMPUTING, DATA MANAGEMENT, AND APPLICATIONS, 2011, 187 : 116 - +
  • [3] Monitoring of Wireless Sensor Networks : Analysis of Intrusion Detection Systems
    Mekelleche, Fatiha
    Hafid
    OuldBouamam, Belkacem
    [J]. 2018 5TH INTERNATIONAL CONFERENCE ON CONTROL, DECISION AND INFORMATION TECHNOLOGIES (CODIT), 2018, : 421 - 426
  • [4] A survey on energy efficient intrusion detection in wireless sensor networks
    Ghosal, Amrita
    Halder, Subir
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND SMART ENVIRONMENTS, 2017, 9 (02) : 239 - 261
  • [5] Intrusion Detection in Wireless Sensor Networks
    Mettu, NaveenaReddy
    Sasikala, T.
    [J]. PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 84 - 89
  • [6] Efficient deployment quality analysis for intrusion detection in wireless sensor networks
    Noureddine Assad
    Brahim Elbhiri
    Moulay Ahmed Faqihi
    Mohamed Ouadou
    Driss Aboutajdine
    [J]. Wireless Networks, 2016, 22 : 991 - 1006
  • [7] Efficient deployment quality analysis for intrusion detection in wireless sensor networks
    Assad, Noureddine
    Elbhiri, Brahim
    Faqihi, Moulay Ahmed
    Ouadou, Mohamed
    Aboutajdine, Driss
    [J]. WIRELESS NETWORKS, 2016, 22 (03) : 991 - 1006
  • [8] Design and analysis of efficient neural intrusion detection for wireless sensor networks
    Batiha, Tarek
    Kromer, Pavel
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2021, 33 (23):
  • [9] Adaptive intrusion detection in wireless sensor networks
    Techateerawat, Piya
    Jennings, Andrew
    [J]. 2007 INTERNATIONAL CONFERENCE ON INTELLIGENT PERVASIVE COMPUTING, PROCEEDINGS, 2007, : 23 - 28
  • [10] An intrusion detection system for wireless sensor networks
    Onat, I
    Miri, A
    [J]. WIMOB 2005: IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS, VOL 3, PROCEEDINGS, 2005, : 253 - 259