A security architecture and modular intrusion detection system for WSNs

Wireless Sensor Networks (WSNs) are deployed in a wide range of application scenarios. These typically involve monitoring or surveillance of animals or humans, infrastructure, or territories. Since security as well as privacy play an increasingly important role in these contexts, sensor nodes and sensor networks need to be protected from spurious environmental effects and malicious attacks. In addition to attacks known from conventional wireless networks, the specific properties of WSNs lead to new kinds of attack. Moreover, countermeasures are subject to strict resource limitations of the motes and, therefore, have to be light-weight and effective at the same time. In this paper, we first present a comprehensive security architecture for WSNs, consisting of different attack types (including WSN-specific attacks) and countermeasures. Second, we propose a modular Intrusion Detection System (IDS) as a framework for this architecture. Finally, we give details on selected modules and discuss practical implementation issues.

[1]  Scott F. Midkiff,et al.  Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses , 2008, IEEE Pervasive Computing.

[2]  Antonio Alfredo Ferreira Loureiro,et al.  Decentralized intrusion detection in wireless sensor networks , 2005, Q2SWinet '05.

[3]  Huirong Fu,et al.  Intrusion Detection System for Wireless Sensor Networks , 2008, Security and Management.

[4]  Scott F. Midkiff,et al.  Effects of Denial-of-Sleep Attacks on Wireless Sensor Network MAC Protocols , 2009, IEEE Transactions on Vehicular Technology.

[5]  Elmar Gerhards-Padilla,et al.  Simulative Evaluation of Adaptive Jamming Detection in Wireless Multi-hop Networks , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems Workshops.

[6]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[7]  David E. Culler,et al.  Taming the underlying challenges of reliable multihop routing in sensor networks , 2003, SenSys '03.

[8]  Wenyuan Xu,et al.  The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.

[9]  Miao Xie,et al.  Anomaly Detection in Wireless Sensor Networks , 2013 .

[10]  John A. Stankovic,et al.  Security in wireless sensor networks , 2004, SASN '04.

[11]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[12]  Tassos Dimitriou,et al.  Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks , 2007, ALGOSENSORS.

[13]  Shivakant Mishra,et al.  Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[14]  David E. Culler,et al.  The dynamic behavior of a data dissemination protocol for network programming at scale , 2004, SenSys '04.

[15]  David E. Culler,et al.  System architecture directions for networked sensors , 2000, SIGP.

[16]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.