Applying an Intrusion Detection Algorithm to Wireless Sensor Networks

被引:1
|
作者
Wang, Qi [1 ]
Wang, Shu [1 ]
Meng, Zhonglou [1 ]
机构
[1] Huazhong Univ Sci & Technol, Elect & Informat Engn Dept, Wuhan 430074, Peoples R China
来源
WKDD: 2009 SECOND INTERNATIONAL WORKSHOP ON KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS | 2009年
关键词
Wireless sensor networks; intrusion detection algorithm; abnormal receive power; algorithm simulation;
D O I
10.1109/WKDD.2009.92
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Although static sensor nodes have low computation and communication capabilities, they have specific properties, and can acquire stable neighboring nodes' information, which can be used for detection of anomalies in networking and behaviors of the neighbor nodes, thus providing security for Wireless sensor networks. In many attacks against sensor networks, the first step for an attacker is to impersonate itself as a legitimate node within the network. To make a sensor node capable of detecting an intruder, a simple dynamic statistical model of the neighboring nodes is needed to build, together with a low-complexity detection algorithm to monitor received packet power levels. A detection algorithm based on security scheme for Wireless sensor networks is introduced in this paper.
引用
收藏
页码:284 / 287
页数:4
相关论文
共 50 条
  • [31] Intrusion Detection System for Wireless Nano Sensor Networks
    Rahim, Aneel
    Malone, Paul
    2013 8TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2013, : 327 - 330
  • [32] Improving Intrusion Detection Systems for Wireless Sensor Networks
    Stetsko, Andriy
    Smolka, Tobias
    Matyas, Vashek
    Stehlik, Martin
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2014, 2014, 8479 : 343 - 360
  • [33] Adaptable Monitoring for Intrusion Detection in Wireless Sensor Networks
    Abdellatif, Takoua
    Rouis, Kais
    Mosbah, Mohamed
    2017 IEEE 26TH INTERNATIONAL CONFERENCE ON ENABLING TECHNOLOGIES - INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES (WETICE), 2017, : 54 - 59
  • [34] Data Integrity And Intrusion Detection In Wireless Sensor Networks
    Acharya, Rathanakar
    Asha, K.
    PROCEEDINGS OF THE 2008 16TH INTERNATIONAL CONFERENCE ON NETWORKS, 2008, : 462 - +
  • [35] Intrusion Detection in Gaussian Distributed Wireless Sensor Networks
    Wang, Yun
    Fu, Weihuang
    Agrawal, Dharma P.
    2009 IEEE 6TH INTERNATIONAL CONFERENCE ON MOBILE ADHOC AND SENSOR SYSTEMS (MASS 2009), 2009, : 494 - 502
  • [36] Study on Intrusion Detection Policy for Wireless Sensor Networks
    Xu, Jiang
    Wang, Jin
    Xie, Shengdong
    Chen, Wenliang
    Kim, Jeong-Uk
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (01): : 1 - 6
  • [37] A novel intrusion detection framework for wireless sensor networks
    Farooqi, Ashfaq Hussain
    Khan, Farrukh Aslam
    Wang, Jin
    Lee, Sungyoung
    PERSONAL AND UBIQUITOUS COMPUTING, 2013, 17 (05) : 907 - 919
  • [38] Intrusion Detection System in Wireless Sensor Networks: A Review
    Ananthakumar, Anush
    Ganediwal, Tanmay
    Kunte, Ashwini
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2015, 6 (12) : 131 - 139
  • [39] Intrusion detection of sinkhole attacks in wireless sensor networks
    Krontiris, Ioannis
    Dimitriou, Tassos
    Giannetsos, Thanassis
    Mpasoukos, Marios
    ALGORITHMIC ASPECTS OF WIRELESS SENSOR NETWORKS, 2008, 4837 : 150 - 161
  • [40] Intrusion Detection in Wireless Sensor Networks for Destructive Intruders
    Yu, Qixiang
    Luo, Zhenxing
    Min, Paul
    2015 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA), 2015, : 68 - 75