Applying an Intrusion Detection Algorithm to Wireless Sensor Networks

被引:1
|
作者
Wang, Qi [1 ]
Wang, Shu [1 ]
Meng, Zhonglou [1 ]
机构
[1] Huazhong Univ Sci & Technol, Elect & Informat Engn Dept, Wuhan 430074, Peoples R China
关键词
Wireless sensor networks; intrusion detection algorithm; abnormal receive power; algorithm simulation;
D O I
10.1109/WKDD.2009.92
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Although static sensor nodes have low computation and communication capabilities, they have specific properties, and can acquire stable neighboring nodes' information, which can be used for detection of anomalies in networking and behaviors of the neighbor nodes, thus providing security for Wireless sensor networks. In many attacks against sensor networks, the first step for an attacker is to impersonate itself as a legitimate node within the network. To make a sensor node capable of detecting an intruder, a simple dynamic statistical model of the neighboring nodes is needed to build, together with a low-complexity detection algorithm to monitor received packet power levels. A detection algorithm based on security scheme for Wireless sensor networks is introduced in this paper.
引用
下载
收藏
页码:284 / 287
页数:4
相关论文
共 50 条
  • [31] Data Integrity And Intrusion Detection In Wireless Sensor Networks
    Acharya, Rathanakar
    Asha, K.
    PROCEEDINGS OF THE 2008 16TH INTERNATIONAL CONFERENCE ON NETWORKS, 2008, : 462 - +
  • [32] Study on Intrusion Detection Policy for Wireless Sensor Networks
    Xu, Jiang
    Wang, Jin
    Xie, Shengdong
    Chen, Wenliang
    Kim, Jeong-Uk
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (01): : 1 - 6
  • [33] Adaptable Monitoring for Intrusion Detection in Wireless Sensor Networks
    Abdellatif, Takoua
    Rouis, Kais
    Mosbah, Mohamed
    2017 IEEE 26TH INTERNATIONAL CONFERENCE ON ENABLING TECHNOLOGIES - INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES (WETICE), 2017, : 54 - 59
  • [34] Intrusion Detection System in Wireless Sensor Networks: A Review
    Ananthakumar, Anush
    Ganediwal, Tanmay
    Kunte, Ashwini
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2015, 6 (12) : 131 - 139
  • [35] Intrusion detection of sinkhole attacks in wireless sensor networks
    Krontiris, Ioannis
    Dimitriou, Tassos
    Giannetsos, Thanassis
    Mpasoukos, Marios
    ALGORITHMIC ASPECTS OF WIRELESS SENSOR NETWORKS, 2008, 4837 : 150 - 161
  • [36] A novel intrusion detection framework for wireless sensor networks
    Farooqi, Ashfaq Hussain
    Khan, Farrukh Aslam
    Wang, Jin
    Lee, Sungyoung
    PERSONAL AND UBIQUITOUS COMPUTING, 2013, 17 (05) : 907 - 919
  • [37] A survey of Intrusion Detection Systems for Wireless Sensor Networks
    Farooqi, Ashfaq Hussain
    Khan, Farrukh Aslam
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2012, 9 (02) : 69 - 83
  • [38] Intrusion detection in homogeneous and heterogeneous Wireless Sensor Networks
    Wang, Yun
    Wang, Xiaodong
    Xie, Bin
    Wang, Demin
    Agrawal, Dharma P.
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2008, 7 (06) : 698 - 711
  • [39] Minimizing the intrusion detection modules in wireless sensor networks
    Hai, Tran Hoang
    Huh, Eui-Nam
    INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCES AND ITS APPLICATIONS, PROCEEDINGS, 2008, : 184 - 189
  • [40] Intrusion Detection in Wireless Sensor Networks for Destructive Intruders
    Yu, Qixiang
    Luo, Zhenxing
    Min, Paul
    2015 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA), 2015, : 68 - 75