Wireless Sensor Network based: Design Principles & measuring performance of IDS

Wireless sensor networks have many potential applications for both civil and military tasks. However, sensor networks are susceptible to many types of attacks because, deployed in open and unprotected environment. For these cases, it is necessary to use some mechanism of intrusion detection. Besides preventing the intruder from causing damages to the network, the intrusion detection system (IDS) can acquire information related to the attack techniques, helping in the development of prevention systems. So it is necessary to use effective mechanisms to protect sensor networks against many types of attacks. Intrusion detection system is one of the major and efficient defensive method against attacks on wireless sensor network. Because of different characteristics of sensor networks, security solutions have to be designed with limited usage of computation and resources. In this paper different Intrusion detection systems are analyzed basis on design and performance in real time wireless sensor network environment.

[1]  Ajith Abraham,et al.  IDEAS: intrusion detection based on emotional ants for sensors , 2005, 5th International Conference on Intelligent Systems Design and Applications (ISDA'05).

[2]  Sheng-Tzong Cheng,et al.  Distributed Detection in Wireless Sensor Networks , 2008, Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008).

[3]  M. Palaniswami,et al.  Distributed Anomaly Detection in Wireless Sensor Networks , 2006, 2006 10th IEEE Singapore International Conference on Communication Systems.

[4]  Huirong Fu,et al.  Design and implementation of an intrusion detection system for wireless sensor networks , 2007, 2007 IEEE International Conference on Electro/Information Technology.

[5]  Marco Furini,et al.  International Journal of Computer and Applications , 2010 .

[6]  Qilian Liang,et al.  Secure media access control (MAC) in wireless sensor networks: intrusion detections and countermeasures , 2004, 2004 IEEE 15th International Symposium on Personal, Indoor and Mobile Radio Communications (IEEE Cat. No.04TH8754).

[7]  Jianying Zhou,et al.  Applying intrusion detection systems to wireless sensor networks , 2006, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006..

[8]  Peng Ning,et al.  LAD: Localization anomaly detection for wireless sensor networks , 2006, J. Parallel Distributed Comput..

[10]  Ioannis Chatzigiannakis,et al.  A decentralized intrusion detection system for increasing security of wireless sensor networks , 2007, 2007 IEEE Conference on Emerging Technologies and Factory Automation (EFTA 2007).

[11]  Ajay Gupta,et al.  Anomaly intrusion detection in wireless sensor networks , 2006, J. High Speed Networks.

[12]  A. Casaca,et al.  A Wireless Sensor Network Reliable Architecture for Intrusion Detection , 2008, 2008 Next Generation Internet Networks.

[13]  Peng Ning,et al.  LAD: localization anomaly detection for wireless sensor networks , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.

[14]  Heejo Lee,et al.  Trusting Anomaly and Intrusion Claims for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks , 2008, 2008 The 9th International Conference for Young Computer Scientists.

[15]  Tassos Dimitriou,et al.  LIDeA: a distributed lightweight intrusion detection architecture for sensor networks , 2008, SecureComm.

[16]  Qing Zhang,et al.  A Framework for Identifying Compromised Nodes in Wireless Sensor Networks , 2008, TSEC.