On the Vital Areas of Intrusion Detection Systems in Wireless Sensor Networks

This paper surveys recently proposed works on Intrusion Detection Systems (IDS) in WSNs, and presents a comprehensive classification of various IDS approaches according to their employed detection techniques. The three main categories explored in this paper are anomaly detection, misuse detection, and specification-based detection protocols. We give a description of existing security attacks in WSNs and the corresponding proposed IDS protocols to tackle those attacks. We analyze the works with respect to the network structure of WSNs. In addition, we highlight various critical shortcomings that IDSs currently have and define future research tracks for IDSs in wireless sensor networks. Though a few restricted survey works on this topic have already been done, we feel that there is a great need of performing a detailed and comprehensive study on the vital aspects so that the IDS in WSN could be analyzed from all the `need-to-know' angles. Thus, the paper's main aim is to include the most recent advancements in this area as well as to predict the future course of research so that the general as well as expert readers could be greatly benefited.

[1]  王淑卿,et al.  An Integrated Intrusion Detection System for Cluster-based Wireless Sensor Networks , 2011 .

[2]  Eui-nam Huh,et al.  Detecting Selective Forwarding Attacks in Wireless Sensor Networks Using Two-hops Neighbor Knowledge , 2008, 2008 Seventh IEEE International Symposium on Network Computing and Applications.

[3]  Magdy S. El-Soudani,et al.  Intrusion Detection for Wormhole Attacks in Ad hoc Networks: A Survey and a Proposed Decentralized Scheme , 2008, 2008 Third International Conference on Availability, Reliability and Security.

[4]  Sajal K. Das,et al.  Intrusion detection in sensor networks: a non-cooperative game approach , 2004, Third IEEE International Symposium on Network Computing and Applications, 2004. (NCA 2004). Proceedings..

[5]  S. Sitharama Iyengar,et al.  Optimized broadcast protocol for sensor networks , 2005, IEEE Transactions on Computers.

[6]  Raimir Holanda Filho,et al.  A New Collaborative Approach for Intrusion Detection System on Wireless Sensor Networks , 2008, TeNe.

[7]  Yenumula B. Reddy,et al.  A Game Theory Approach to Detect Malicious Nodes in Wireless Sensor Networks , 2009, 2009 Third International Conference on Sensor Technologies and Applications.

[8]  Michael Kaminsky,et al.  SybilGuard: defending against sybil attacks via social networks , 2006, SIGCOMM.

[9]  K. Q. Yan,et al.  A Hybrid Intrusion Detection System of Cluster-based Wireless Sensor Networks , 2009 .

[10]  Bharat K. Bhargava,et al.  Low-cost attacks against packet delivery, localization and time synchronization services in under-water sensor networks , 2005, WiSe '05.

[11]  D. P. Agrawal,et al.  Self-organized criticality and stochastic learning based intrusion detection system for wireless sensor networks , 2003, IEEE Military Communications Conference, 2003. MILCOM 2003..

[12]  Rung Ching Chen,et al.  A new method for intrusion detection on hierarchical wireless sensor networks , 2009, ICUIMC '09.

[13]  Geng Yang,et al.  Sybil Attack Detection Based on RSSI for Wireless Sensor Network , 2007, 2007 International Conference on Wireless Communications, Networking and Mobile Computing.

[14]  Marimuthu Palaniswami,et al.  Intrusion Detection for Routing Attacks in Sensor Networks , 2006, Int. J. Distributed Sens. Networks.

[15]  Rachid Beghdad,et al.  Securing Wireless Sensor Networks: A Survey , 2013, EDPACS.

[16]  Tingting Zhang,et al.  Detecting Anomaly Node Behavior in Wireless Sensor Networks , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).

[17]  Yih-Chun Hu,et al.  Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.

[18]  Adrian Perrig,et al.  Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[19]  Taekyoung Kwon,et al.  An Experimental Study of Hierarchical Intrusion Detection for Wireless Industrial Sensor Networks , 2010, IEEE Transactions on Industrial Informatics.

[20]  M. Krishnan Intrusion Detection in Wireless Sensor Networks , 2006 .

[21]  Alfredo Navarra,et al.  Distributed Intrusion Detection Systems for Enhancing Security in Mobile Wireless Sensor Networks* , 2008, Int. J. Distributed Sens. Networks.

[22]  Rodrigo Roman,et al.  A cross-layer approach for integrating security mechanisms in sensor networks architectures , 2011, Wirel. Commun. Mob. Comput..

[23]  Yenumula B. Reddy,et al.  Game theory model for selective forward attacks in wireless sensor networks , 2009, 2009 17th Mediterranean Conference on Control and Automation.

[24]  Rung Ching Chen,et al.  An Isolation Intrusion Detection System for Hierarchical Wireless Sensor Networks , 2010, J. Networks.

[25]  Cristina Alcaraz,et al.  Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks , 2009, FOSAD.

[26]  Jingsha He,et al.  Group-based intrusion detection system in wireless sensor networks , 2008, Comput. Commun..

[27]  Venkata M. Mulpuru,et al.  Detecting selective forwarding attacks in wireless sensor networks , 2008 .

[28]  Ali Miri,et al.  A real-time node-based traffic anomaly detection algorithm for wireless sensor networks , 2005, 2005 Systems Communications (ICW'05, ICHSN'05, ICMCS'05, SENET'05).

[29]  Y.A. Sekercioglu,et al.  Detecting Selective Forwarding Attacks in Wireless Sensor Networks using Support Vector Machines , 2007, 2007 3rd International Conference on Intelligent Sensors, Sensor Networks and Information.

[30]  Michael Kaminsky,et al.  SybilGuard: Defending Against Sybil Attacks via Social Networks , 2008, IEEE/ACM Transactions on Networking.

[31]  Safiqul Islam,et al.  Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches , 2011 .

[32]  Srdjan Capkun,et al.  Wormhole-Based Anti-Jamming Techniques in Sensor Networks , 2007 .

[33]  Ala I. Al-Fuqaha,et al.  Detection of Masquerade Attacks on Wireless Sensor Networks , 2007, 2007 IEEE International Conference on Communications.

[34]  Eui-Nam Huh,et al.  A lightweight intrusion detection framework for wireless sensor networks , 2010, CMC 2010.

[35]  Dharma P. Agrawal,et al.  Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks , 2008, IEEE Transactions on Mobile Computing.

[36]  S. Banerjee,et al.  Intrusion Detection on Sensor Networks Using Emotional Ants , 2005 .

[37]  Antonio Alfredo Ferreira Loureiro,et al.  Decentralized intrusion detection in wireless sensor networks , 2005, Q2SWinet '05.

[38]  Xiaodong Wang,et al.  DIDS: A dynamic model of intrusion detection system in wireless sensor networks , 2008, 2008 International Conference on Information and Automation.

[39]  Felix C. Freiling,et al.  Towards an Intrusion Detection System in Wireless Sensor Networks , 2007 .

[40]  Reihaneh Safavi-Naini,et al.  Distributed Detection of Wormhole Attacks in Wireless Sensor Networks , 2009, ADHOCNETS.

[41]  Jianying Zhou,et al.  Applying intrusion detection systems to wireless sensor networks , 2006, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006..

[42]  Peter J. Bentley,et al.  Danger Is Ubiquitous: Detecting Malicious Activities in Sensor Networks Using the Dendritic Cell Algorithm , 2006, ICARIS.

[43]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[44]  David E. Culler,et al.  TOSSIM: accurate and scalable simulation of entire TinyOS applications , 2003, SenSys '03.

[45]  Indranil Saha,et al.  Location Verification Based Defense Against Sybil Attack in Sensor Networks , 2006, ICDCN.

[46]  Michael R. Lyu,et al.  An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks , 2007, Comput. Commun..

[47]  Piya Techateerawat,et al.  Energy Efficiency of Intrusion Detection Systems in Wireless Sensor Networks , 2006, 2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops.

[48]  Song Jian-hua,et al.  Anomaly Detection Based on Data-Mining for Routing Attacks in Wireless Sensor Networks , 2007, 2007 Second International Conference on Communications and Networking in China.

[49]  Scott F. Midkiff,et al.  Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses , 2008, IEEE Pervasive Computing.

[50]  Felix C. Freiling,et al.  Cooperative Intrusion Detection in Wireless Sensor Networks , 2009, EWSN.

[51]  Hossein Jadidoleslamy,et al.  A High-level Architecture for Intrusion Detection on Heterogeneous Wireless Sensor Networks: Hierarchical, Scalable and Dynamic Reconfigurable , 2011, Wirel. Sens. Netw..

[52]  Michael Riecker Lightweight Intrusion Detection in Wireless Sensor Networks , 2015 .

[53]  M. P. Singh,et al.  Intrusion Detection Based Security Solution for Cluster-Based Wireless Sensor Networks , 2011 .

[54]  Yong Wang,et al.  A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.

[55]  P. Venkata Krishna,et al.  A simple learning automata-based solution for intrusion detection in wireless sensor networks , 2011, Wirel. Commun. Mob. Comput..

[56]  Robert H. Deng,et al.  Detecting node replication attacks in mobile sensor networks: theory and approaches , 2012, Secur. Commun. Networks.

[57]  P. Venkata Krishna,et al.  LAID: a learning automata-based scheme for intrusion detection in wireless sensor networks , 2009, Secur. Commun. Networks.

[58]  Nirvana Meratnia,et al.  Outlier Detection Techniques for Wireless Sensor Networks: A Survey , 2008, IEEE Communications Surveys & Tutorials.

[59]  Tassos Dimitriou,et al.  LIDeA: a distributed lightweight intrusion detection architecture for sensor networks , 2008, SecureComm.

[60]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[61]  Al-Sakib Khan Pathan Security of Self-Organizing Networks: MANET, WSN, WMN, VANET , 2010 .

[62]  Huirong Fu,et al.  Intrusion Detection System for Wireless Sensor Networks , 2008, Security and Management.

[63]  A. Perrig,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[64]  Fengqi Yu,et al.  Immunity-based intrusion detection for wireless sensor networks , 2008, 2008 IEEE International Joint Conference on Neural Networks (IEEE World Congress on Computational Intelligence).

[65]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[66]  Afrand Agah,et al.  Preventing DoS Attacks in Wireless Sensor Networks: A Repeated Game Theory Approach , 2007, Int. J. Netw. Secur..

[67]  Wenyuan Xu,et al.  The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.

[68]  Rituparna Chaki,et al.  A Survey of Recent Intrusion Detection Systems for Wireless Sensor Network , 2011, ArXiv.

[69]  Haiguang Chen,et al.  Lightweight Anomaly Intrusion Detection in Wireless Sensor Networks , 2007, PAISI.

[70]  Yizhong Ma,et al.  The intrusion detection method based on game theory in wireless sensor network , 2008, 2008 First IEEE International Conference on Ubi-Media Computing.

[71]  Sven Schaust,et al.  Misbehaviour Detection for Wireless Sensor Networks-Necessary or Not ? , 2007 .

[72]  Tzu Chiang Chiang,et al.  Intrusion Detection Mechanisms Based on Queuing Theory in Remote Distribution Sensor Networks , 2010 .

[73]  Marimuthu Palaniswami,et al.  Centered Hyperspherical and Hyperellipsoidal One-Class Support Vector Machines for Anomaly Detection in Sensor Networks , 2010, IEEE Transactions on Information Forensics and Security.

[74]  Felix C. Freiling,et al.  Intrusion Detection in Wireless Sensor Networks , 2009 .

[75]  Farrukh Aslam Khan,et al.  Intrusion Detection Systems for Wireless Sensor Networks: A Survey , 2009, FGIT-FGCN.

[76]  Elaine Shi,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[77]  Rong Zheng,et al.  ANDES: an Anomaly Detection System for Wireless Sensor Networks , 2007, 2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems.

[78]  Md. Abdul Hamid,et al.  Routing Security in Sensor Network : HELLO Flood Attack and Defense , 2005 .

[79]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[80]  Tassos Dimitriou,et al.  Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks , 2007, ALGOSENSORS.

[81]  Chun Tung Chou,et al.  Detecting Wormhole Attacks in Wireless Sensor Networks , 2006 .

[82]  WangQiang,et al.  Reprogramming wireless sensor networks , 2006 .

[83]  Javier López,et al.  An Asynchronous Node Replication Attack in Wireless Sensor Networks , 2008, SEC.

[84]  Eui-nam Huh,et al.  Hybrid Intrusion Detection System for Wireless Sensor Networks , 2007, ICCSA.

[85]  David Evans,et al.  Using Directional Antennas to Prevent Wormhole Attacks , 2004, NDSS.

[86]  Jeffrey J. P. Tsai,et al.  A Framework of Machine Learning Based Intrusion Detection for Wireless Sensor Networks , 2008, 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (sutc 2008).

[87]  José Manuel Moya,et al.  Distributed intrusion detection system for wireless sensor networks based on a reputation system coupled with kernel self-organizing maps , 2010, Integr. Comput. Aided Eng..

[88]  Murat Demirbas,et al.  An RSSI-based scheme for sybil attack detection in wireless sensor networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).

[89]  Suho Park Routing Security in Sensor Network: HELLO Flood Attack and Defense , 2005 .

[90]  Chia-Fen Hsieh,et al.  Ranger intrusion detection system for wireless sensor networks with Sybil attack based on ontology , 2010 .

[91]  Choong Seon Hong,et al.  Security in wireless sensor networks: issues and challenges , 2006, 2006 8th International Conference Advanced Communication Technology.

[92]  F. Freiling,et al.  Towards Intrusion Detection in Wireless Sensor Networks , 2007 .

[93]  Adrian Perrig,et al.  Refutation of "On the Difficulty of Software-Based Attestation o f Embedded Devices" , 2010 .

[94]  Stefanos Gritzalis,et al.  Situation awareness mechanisms for wireless sensor networks , 2008, IEEE Communications Magazine.

[95]  Christopher Leckie,et al.  New Variants of Wormhole Attacks for Sensor Networks , 2006 .

[96]  Sanjay Jha,et al.  The holes problem in wireless sensor networks: a survey , 2005, MOCO.

[97]  Artemis Moroni,et al.  Vision and Challenges for Realising the Internet of Things , 2010 .

[98]  Qiang Wang,et al.  Reprogramming wireless sensor networks: challenges and approaches , 2006, IEEE Network.

[99]  Syed Abdul Sattar,et al.  A Collaborative, Secure and Energy Efficient Intrusion Detection Method for Homogeneous WSN , 2011, ACC.

[100]  Rung Ching Chen,et al.  A Light-Weight Ranger Intrusion Detection System on Wireless Sensor Networks , 2011, 2011 Fifth International Conference on Genetic and Evolutionary Computing.