International Journal of Computer
Trends and Technology

Research Article | Open Access | Download PDF

Volume 40 | Number 1 | Year 2016 | Article Id. IJCTT-V40P121 | DOI : https://doi.org/10.14445/22312803/IJCTT-V40P121

A Brief survey on Intrusion Detection System for WSN


L.Sheeba, Dr.V.S.Meenakshi

Citation :

L.Sheeba, Dr.V.S.Meenakshi, "A Brief survey on Intrusion Detection System for WSN," International Journal of Computer Trends and Technology (IJCTT), vol. 40, no. 1, pp. 109-113, 2016. Crossref, https://doi.org/10.14445/22312803/ IJCTT-V40P121

Abstract

Wireless Sensor Networks (WSNs) are the collection of autonomous sensor nodes spread out in various hostile environments statically or dynamically depend upon the application to monitor temperature, sound, pressure, etc. The security is a major component in wireless sensor networks. It degrades the performance of the network. The intrusion detection system is the solution to detect different kinds of attacks occurring on sensor nodes.Wireless sensor networks (WSN) are a group of tiny devices. These tiny devices have few energy, computational power, transmission range and memory. The more modern networks are bidirectional, also enabling control of sensor activity. At the beginning wireless sensor networks was developed for military applications such as battlefield surveillance; nowadays such networks are mostly used in many industrial and consumer applications, such as industrial process monitoring and control, machine health monitoring, and so on. WSN has been used in many applications such habitat monitoring, building monitoring, smart grid and pipeline monitoring. Intrusion detection model takes advantage of cluster-based architecture to reduce energy consumption. This model uses anomaly detection based on support vector machine (SVM) algorithm and a set of signature rules to detect malicious behaviours and provide global lightweight IDS. Though a few restricted survey works on this topic have already been done but there is a great need of performing a detailed study on the vital aspects so that the IDS is analyzed in all the different angles. Three most intrusion detection techniques explored in this paper. Such as Anomaly detection, Misuse detection and Specification based detection. Here in this review paper various attacks on Wireless Sensor Networks and existing Intrusion detection techniques are discussed to detect the compromised node/s.

Keywords

IDS, DOS, Anomaly Detection.

References

[1]. Chris Karlof * , David Wagner, Secure routingin wireless sensor networks: attacks and countermeasures, Elsevier - Ad Hoc Networks 1 (2003) 293–315.
[2].HanZhijie, Ruchuang, Intrusion Detection for Wireless Sensor Network Based on Traffic Prediction Model, Elsevier -2012 International Conference on Solid State Devices and Materials Science, Physics Procedia 25 ( 2012 ) 2072 – 2080.
[3]. H.H. Soliman a , Noha A. Hikal b , Nehal A. Sakr b,*, A comparative performance evaluation of intrusion detection techniques for hierarchical wireless sensor networks, Egyptian Informatics Journal (2012) 13, 225–238.
[4]. Sumit More, Mary Matthews, Anupam Joshi, Tim Finin , A Knowledge-Based Approach To Intrusion Detection Modeling, IEEE Symposium on Security and Privacy Workshops 2012, 75 -81.
[5]. Karen A. Garc´ıa, Ra´ul Monroy, Luis A. Trejo, Carlos Mex-Perera, and Eduardo Aguirre, Analyzing Log Files for Postmortem Intrusion Detection, IEEE transactions on systems, man, and cybernetics—Part C: Applications and Reviews, Vol. 42, No. 6, November 2012, 1690-1704.
[6]. Abror Abduvaliyev, Al-Sakib Khan Pathan, Jianying Zhou, Rodrigo Roman, and Wai-Choong Wong, On the Vital Areas of Intrusion Detection Systems in Wireless Sensor Networks, IEEE Communications Surveys & Tutorials, Vol. 15, No. 3, Third Quarter 2013, 1223-1237.
[7]. Salvatore Pontarelli, Giuseppe Bianchi, and Simone Teofili, TrafficAware Design of a High-Speed FPGA Network Intrusion Detection System, IEEE Transactions On Computers, Vol. 62, No. 11, November 2013 , 2322- 2334.
[8]. Robert Mitchell and Ing-Ray Chen, Member, IEEE, Behavior-Rule Based Intrusion Detection Systems for Safety Critical Smart Grid Applications, IEEE Transactions On Smart Grid, Vol. 4, No. 3, September 2013, 1254- 1263.
[9]. Elhadi M. Shakshuki, Senior Member, IEEE, Nan Kang, and Tarek R. Sheltami, Member, IEEE, EAACK—A Secure Intrusion-DetectionSystem for Manets, IEEE Transactions On Industrial Electronics, VOL. 60, NO. 3, MARCH 2013, 1089- 1098.
[10].Emad Felemban, Advanced Border Intrusion Detection and Surveillance Using Wireless Sensor Network Technology, Int. J. Communications, Network and System Sciences, 2013, 6, 251-259.
[11]. Robert Mitchell and Ing-Ray Chen, Adaptive Intrusion Detection of Malicious Unmanned Air Vehicles Using Behavior Rule Specifications, IEEE Transactions On Systems, Man, And Cybernetics: Systems, Vol. 44, No. 5, May 2014, 593-04.
[12]. Ismail Butun, Salvatore D. Morgera, and Ravi Sankar, A Survey of Intrusion Detection Systems in Wireless Sensor Networks, IEEE Communications Surveys & Tutorials, Vol. 16, No. 1, First Quarter 2014,266-282.
[13]. Weiming Hu, Jun Gao, Yanguo Wang, Ou Wu, and Stephen Maybank, Online Adaboost-Based Parameterized Methods for Dynamic Distributed Network Intrusion Detection, IEEE Transactions On Cybernetics, Vol. 44, No. 1, January 2014 ,66-82.
[14]. Robert Mitchell, Ing-Ray Chen *, Review A survey of intrusion detection in wireless network applications, Elsevier Computer Communications 42 (2014) 1–23.
[15]. Omar Said1,3*† and Alaa Elnashar2,3†, Scaling of wireless sensor network intrusion detection probability: 3D sensors, 3D intruders, and 3D environments, EURASIP Journal on Wireless Communications and Networking (2015) ,1-12.
[16]. Hossein Jadidoleslamy, A Hierarchical Intrusion Detection Architecture For Wireless Sensor Networks, International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.5, Sep 2011, 131-154.
[17]. Sushma J. Gaurkar, Piyush K.Ingole, Access Control And Intrusion Detection For Security In Wireless Sensor Network, International Journal Of Scientific & Technology Research Volume 2, Issue 6, June 2013 ISSN 2277-8616,63-67.
[18]. Namita Singh,Uday Singh, Intrusion Detection And SelfRecovery System, Namita Singh et al , International Journal of Computer Science & Communication Networks,Vol 4(3),111-118 111 ISSN:2249-5789,111-118.
[19].Joseph Rish Simenthy CEng , AMIE, K. Vijayan, Advanced Intrusion Detection System for Wireless Sensor Networks, International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, An ISO 3297: 2007 Certified Organization Vol. 3, Special Issue 3, April 2014, 167- 172.
[20].Djallel Eddine Boubiche1 and Azeddine Bilami2 , Cross Layer Intrusion Detection System For Wireless Sensor Network, International Journal of Network Security & Its Applications (IJNSA), Vol.4, No.2, March 2012,35-52.
[21].Jasvinder Singh1 , Er. Vivek Thapar2 , Intrusion Detection System in Wireless Sensor Network, International Journal of Computer Science and Communication Engineering Volume 1 Issue 2 (December 2012 Issue), ISSN: 2319-7080, 76-80.
[22]. Md. Safiqul Islam *1, Syed AshiqurRahman*2, Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches, International Journal of Advanced Science and Technology Vol. 36, November, 2011,1-8.
[23]. Anush Ananthakumar, Tanmay Ganediwal, Dr. Ashwini Kunte, Intrusion Detection System in Wireless Sensor Networks: A Review, (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 6, No. 12, 2015, 131-139.
[24]. Hossein Jadidoleslamy, A High-Level Architecture for Intrusion Detection on Heterogeneous Wireless Sensor Networks: Hierarchical, Scalable and Dynamic Reconfigurable, scientific Research Wireless Sensor Network, 2011, 3, 241-261.
[25]. Miss R. khewale; Miss M. Ramteke; Miss D. Bawane;Miss S. Tathe, Miss T. padmagiriwar, A Survey on Hybrid Intrusion Detection of Cluster- Based Wireless Sensor Network, International Journal Of Research In Advent Technology Vol.3 No.2, February 2015,E-ISSN: 2321-9637,164-167.
[26]. S.Yamunarani, D.Sathya, A Survey on Intelligent Intrusion Detection System in Wireless Sensor Networks, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 4 Issue 1, January 2015,80-84.
[27]. Vijay Bhuse, Student Member, IEEE, Ajay Gupta, Senior Member, IEEE and Leszek Lilien, Senior Member, IEEE, Research challenges in lightweight intrusion detection for wireless sensor networks, Research challenges in lightweight intrusion detection for wireless sensor networks 1-6.
[28]. Tapolina Bhattasali 1 , Rituparna Chaki 2 , A Survey of Recent Intrusion Detection Systems for Wireless Sensor Network, 1-10.
[29]. Michael Krishnan, Intrusion Detection in Wireless Sensor Networks, 1-7.
[30]. Ana Paula R. da Silva Marcelo H.T. Martins Bruno P.S. Rocha Antonio A.F. Loureiro Linnyer B. Ruiz Hao Chi Wong, Decentralized Intrusion Detection in Wireless Sensor Networks, 2005, 16-23.
[31]. Mikhail Gordeev, Intrusion Detection: Techniques and Approaches
[32]. Swati Kasar, Trupti Wagh, A Survey on Intrusion Detection Techniques in Wireless Sensor Networks, International Journal of Computer Applications (0975 – 8887) National Conference on Emerging Trends in Advanced Communication Technologies (NCETACT-2015