Applying an Intrusion Detection Algorithm to Wireless Sensor Networks

被引:1
|
作者
Wang, Qi [1 ]
Wang, Shu [1 ]
Meng, Zhonglou [1 ]
机构
[1] Huazhong Univ Sci & Technol, Elect & Informat Engn Dept, Wuhan 430074, Peoples R China
关键词
Wireless sensor networks; intrusion detection algorithm; abnormal receive power; algorithm simulation;
D O I
10.1109/WKDD.2009.92
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Although static sensor nodes have low computation and communication capabilities, they have specific properties, and can acquire stable neighboring nodes' information, which can be used for detection of anomalies in networking and behaviors of the neighbor nodes, thus providing security for Wireless sensor networks. In many attacks against sensor networks, the first step for an attacker is to impersonate itself as a legitimate node within the network. To make a sensor node capable of detecting an intruder, a simple dynamic statistical model of the neighboring nodes is needed to build, together with a low-complexity detection algorithm to monitor received packet power levels. A detection algorithm based on security scheme for Wireless sensor networks is introduced in this paper.
引用
下载
收藏
页码:284 / 287
页数:4
相关论文
共 50 条
  • [1] Applying Intrusion Detection Systems to Wireless Sensor Networks
    Roman, Rodrigo
    Zhou, Jianying
    Lopez, Javier
    2006 3RD IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2006, : 640 - +
  • [2] An Intrusion Detection Algorithm for Wireless Sensor Networks
    Eissa, Alaa
    Zied, Samir
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2015, 15 (11): : 80 - 85
  • [3] Applying an Ontology to a Patrol Intrusion Detection System for Wireless Sensor Networks
    Hsieh, Chia-Fen
    Chen, Rung-Ching
    Huang, Yung-Fa
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2014,
  • [4] Applying General Sensing Mode to Intrusion Detection in Wireless Sensor Networks
    Liu, Tao
    Li, Zhishu
    Yin, Feng
    Yang, Jun
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 3314 - +
  • [5] Applying Data Mining Techniques to Intrusion Detection in Wireless Sensor Networks
    Coppolino, Luigi
    D'Antonio, Salvatore
    Garofalo, Alessia
    Romano, Luigi
    2013 EIGHTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC 2013), 2013, : 247 - 254
  • [6] Applying the mobile agent paradigm to distributed intrusion detection in wireless sensor networks
    Ketel, Mohammed
    PROCEEDINGS OF THE 40TH SOUTHEASTERN SYMPOSIUM ON SYSTEM THEORY, 2008, : 74 - 78
  • [7] Intrusion Detection in Wireless Sensor Networks
    Mettu, NaveenaReddy
    Sasikala, T.
    PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 84 - 89
  • [8] An intrusion detection system for wireless sensor networks
    Onat, I
    Miri, A
    WIMOB 2005: IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS, VOL 3, PROCEEDINGS, 2005, : 253 - 259
  • [9] Adaptive intrusion detection in wireless sensor networks
    Techateerawat, Piya
    Jennings, Andrew
    2007 INTERNATIONAL CONFERENCE ON INTELLIGENT PERVASIVE COMPUTING, PROCEEDINGS, 2007, : 23 - 28
  • [10] Anomaly intrusion detection in wireless sensor networks
    Bhuse, V
    Gupta, A
    JOURNAL OF HIGH SPEED NETWORKS, 2006, 15 (01) : 33 - 51