Research Article | Open Access | Download PDF
Volume 40 | Number 1 | Year 2016 | Article Id. IJCTT-V40P121 | DOI : https://doi.org/10.14445/22312803/IJCTT-V40P121
A Brief survey on Intrusion Detection System for WSN
L.Sheeba, Dr.V.S.Meenakshi
Citation :
L.Sheeba, Dr.V.S.Meenakshi, "A Brief survey on Intrusion Detection System for WSN," International Journal of Computer Trends and Technology (IJCTT), vol. 40, no. 1, pp. 109-113, 2016. Crossref, https://doi.org/10.14445/22312803/ IJCTT-V40P121
Abstract
Wireless Sensor Networks (WSNs) are the collection of autonomous sensor nodes spread out in various hostile environments statically or dynamically depend upon the application to monitor temperature, sound, pressure, etc. The security is a major component in wireless sensor networks. It degrades the performance of the network. The intrusion detection system is the solution to detect different kinds of attacks occurring on sensor nodes.Wireless sensor networks (WSN) are a group of tiny devices. These tiny devices have few energy, computational power, transmission range and memory. The more modern networks are bidirectional, also enabling control of sensor activity. At the beginning wireless sensor networks was developed for military applications such as battlefield surveillance; nowadays such networks are mostly used in many industrial and consumer applications, such as industrial process monitoring and control, machine health monitoring, and so on. WSN has been used in many applications such habitat monitoring, building monitoring, smart grid and pipeline monitoring. Intrusion detection model takes advantage of cluster-based architecture to reduce energy consumption. This model uses anomaly detection based on support vector machine (SVM) algorithm and a set of signature rules to detect malicious behaviours and provide global lightweight IDS. Though a few restricted survey works on this topic have already been done but there is a great need of performing a detailed study on the vital aspects so that the IDS is analyzed in all the different angles. Three most intrusion detection techniques explored in this paper. Such as Anomaly detection, Misuse detection and Specification based detection. Here in this review paper various attacks on Wireless Sensor Networks and existing Intrusion detection techniques are discussed to detect the compromised node/s.
Keywords
IDS, DOS, Anomaly Detection.
References
[1]. Chris Karlof *
, David Wagner, Secure routingin wireless sensor
networks: attacks and countermeasures, Elsevier - Ad Hoc Networks 1
(2003) 293–315.
[2].HanZhijie, Ruchuang, Intrusion Detection for Wireless Sensor
Network Based on Traffic Prediction Model, Elsevier -2012
International Conference on Solid State Devices and Materials Science,
Physics Procedia 25 ( 2012 ) 2072 – 2080.
[3]. H.H. Soliman a
, Noha A. Hikal b
, Nehal A. Sakr b,*, A comparative
performance evaluation of intrusion detection techniques for
hierarchical wireless sensor networks, Egyptian Informatics Journal
(2012) 13, 225–238.
[4]. Sumit More, Mary Matthews, Anupam Joshi, Tim Finin , A
Knowledge-Based Approach To Intrusion Detection Modeling, IEEE
Symposium on Security and Privacy Workshops 2012, 75 -81.
[5]. Karen A. Garc´ıa, Ra´ul Monroy, Luis A. Trejo, Carlos Mex-Perera,
and Eduardo Aguirre, Analyzing Log Files for Postmortem Intrusion
Detection, IEEE transactions on systems, man, and cybernetics—Part C:
Applications and Reviews, Vol. 42, No. 6, November 2012, 1690-1704.
[6]. Abror Abduvaliyev, Al-Sakib Khan Pathan, Jianying Zhou, Rodrigo
Roman, and Wai-Choong Wong, On the Vital Areas of Intrusion
Detection
Systems in Wireless Sensor Networks, IEEE Communications Surveys
& Tutorials, Vol. 15, No. 3, Third Quarter 2013, 1223-1237.
[7]. Salvatore Pontarelli, Giuseppe Bianchi, and Simone Teofili, TrafficAware Design of a High-Speed FPGA Network Intrusion Detection
System, IEEE Transactions On Computers, Vol. 62, No. 11, November
2013 , 2322- 2334.
[8]. Robert Mitchell and Ing-Ray Chen, Member, IEEE, Behavior-Rule
Based Intrusion Detection Systems for Safety Critical Smart Grid
Applications, IEEE Transactions On Smart Grid, Vol. 4, No. 3,
September 2013, 1254- 1263.
[9]. Elhadi M. Shakshuki, Senior Member, IEEE, Nan Kang, and Tarek
R. Sheltami, Member, IEEE, EAACK—A Secure Intrusion-DetectionSystem for Manets, IEEE Transactions On Industrial Electronics, VOL.
60, NO. 3, MARCH 2013, 1089- 1098.
[10].Emad Felemban, Advanced Border Intrusion Detection and
Surveillance Using Wireless Sensor Network Technology, Int. J.
Communications, Network and System Sciences, 2013, 6, 251-259.
[11]. Robert Mitchell and Ing-Ray Chen, Adaptive Intrusion Detection
of Malicious Unmanned Air Vehicles Using Behavior Rule
Specifications, IEEE Transactions On Systems, Man, And Cybernetics:
Systems, Vol. 44, No. 5, May 2014, 593-04.
[12]. Ismail Butun, Salvatore D. Morgera, and Ravi Sankar, A Survey of
Intrusion Detection Systems in Wireless Sensor Networks, IEEE
Communications Surveys & Tutorials, Vol. 16, No. 1, First Quarter
2014,266-282.
[13]. Weiming Hu, Jun Gao, Yanguo Wang, Ou Wu, and Stephen
Maybank, Online Adaboost-Based Parameterized Methods for Dynamic
Distributed Network Intrusion Detection, IEEE Transactions On
Cybernetics, Vol. 44, No. 1, January 2014 ,66-82.
[14]. Robert Mitchell, Ing-Ray Chen *, Review A survey of intrusion
detection in wireless network applications, Elsevier Computer
Communications 42 (2014) 1–23.
[15]. Omar Said1,3*† and Alaa Elnashar2,3†, Scaling of wireless sensor
network intrusion detection probability: 3D sensors, 3D intruders, and
3D environments, EURASIP Journal on Wireless Communications and
Networking (2015) ,1-12.
[16]. Hossein Jadidoleslamy, A Hierarchical Intrusion Detection
Architecture For Wireless Sensor Networks, International Journal of
Network Security & Its Applications (IJNSA), Vol.3, No.5, Sep 2011,
131-154.
[17]. Sushma J. Gaurkar, Piyush K.Ingole, Access Control And
Intrusion Detection For Security In Wireless Sensor Network,
International Journal Of Scientific & Technology Research Volume 2,
Issue 6, June 2013 ISSN 2277-8616,63-67.
[18]. Namita Singh,Uday Singh, Intrusion Detection And SelfRecovery System, Namita Singh et al , International Journal of
Computer Science & Communication Networks,Vol 4(3),111-118 111
ISSN:2249-5789,111-118.
[19].Joseph Rish Simenthy CEng , AMIE, K. Vijayan, Advanced
Intrusion Detection System for Wireless Sensor Networks, International
Journal of Advanced Research in Electrical, Electronics and
Instrumentation Engineering, An ISO 3297: 2007 Certified
Organization Vol. 3, Special Issue 3, April 2014, 167- 172.
[20].Djallel Eddine Boubiche1
and Azeddine Bilami2
, Cross Layer
Intrusion Detection System For Wireless Sensor Network, International
Journal of Network Security & Its Applications (IJNSA), Vol.4, No.2,
March 2012,35-52.
[21].Jasvinder Singh1
, Er. Vivek Thapar2
, Intrusion Detection System in
Wireless Sensor Network, International Journal of Computer Science
and Communication Engineering Volume 1 Issue 2 (December 2012
Issue), ISSN: 2319-7080, 76-80.
[22]. Md. Safiqul Islam *1, Syed AshiqurRahman*2, Anomaly Intrusion
Detection System in Wireless Sensor Networks: Security Threats and
Existing Approaches, International Journal of Advanced Science and
Technology Vol. 36, November, 2011,1-8.
[23]. Anush Ananthakumar, Tanmay Ganediwal, Dr. Ashwini Kunte,
Intrusion Detection System in Wireless Sensor Networks: A Review,
(IJACSA) International Journal of Advanced Computer Science and
Applications, Vol. 6, No. 12, 2015, 131-139.
[24]. Hossein Jadidoleslamy, A High-Level Architecture for Intrusion
Detection on Heterogeneous Wireless Sensor Networks: Hierarchical,
Scalable and Dynamic Reconfigurable, scientific Research Wireless
Sensor Network, 2011, 3, 241-261.
[25]. Miss R. khewale; Miss M. Ramteke; Miss D. Bawane;Miss S.
Tathe, Miss T. padmagiriwar, A Survey on Hybrid Intrusion Detection
of Cluster- Based Wireless Sensor Network, International Journal Of
Research In Advent Technology Vol.3 No.2, February 2015,E-ISSN:
2321-9637,164-167.
[26]. S.Yamunarani, D.Sathya, A Survey on Intelligent Intrusion
Detection System in Wireless Sensor Networks, International Journal of
Advanced Research in Computer Engineering & Technology
(IJARCET) Volume 4 Issue 1, January 2015,80-84.
[27]. Vijay Bhuse, Student Member, IEEE, Ajay Gupta, Senior Member,
IEEE and Leszek Lilien, Senior Member, IEEE, Research challenges in
lightweight intrusion detection for wireless sensor networks, Research
challenges in lightweight intrusion detection for wireless sensor
networks 1-6.
[28]. Tapolina Bhattasali 1
, Rituparna Chaki 2
, A Survey of Recent
Intrusion Detection Systems for Wireless Sensor Network, 1-10.
[29]. Michael Krishnan, Intrusion Detection in Wireless Sensor
Networks, 1-7.
[30]. Ana Paula R. da Silva Marcelo H.T. Martins Bruno P.S. Rocha
Antonio A.F. Loureiro Linnyer B. Ruiz Hao Chi Wong, Decentralized
Intrusion Detection in Wireless Sensor Networks, 2005, 16-23.
[31]. Mikhail Gordeev, Intrusion Detection: Techniques and
Approaches
[32]. Swati Kasar, Trupti Wagh, A Survey on Intrusion Detection
Techniques in Wireless Sensor Networks, International Journal of
Computer Applications (0975 – 8887) National Conference on
Emerging Trends in Advanced Communication Technologies
(NCETACT-2015