Distributed intrusion detection system for wireless sensor networks based on a reputation system coupled with kernel self-organizing maps

Security of sensor networks is a complicated task, mostly due to the limited resources of sensor units. The first line of defense, i.e. encryption and authentication, is useless if an attacker has entered the system, and it is also vulnerable to side-channel attacks. Thus, a second line of defense, known as Intrusion Detection, must be added in order to detect and eliminate attacks. In the recent past, various solutions for detecting intrusions have been proposed. Most of them are able to detect only a limited number of attacks. Further, the solutions that deploy machine learning techniques exhibit higher level of flexibility and adaptability. Yet, these techniques consume significant power and computational resources. In this work we propose a distributed intrusion detection system organized as a reputation system where the reputation of each node is assigned by self-organizing maps (SOM) trained for detecting intrusions. The response of the system consists in assigning low reputation values to the compromised nodes rendering them isolated from the rest of the network. Further, we propose the implementation of SOM algorithm using the energy-efficient SORU (Stream Oriented Reconfigurable Unit) co-processor developed by our research group. Our solution offers many benefits: scalable solution, fast response to adversarial activities, ability to detect unknown attacks, high adaptability and energy efficiency. The testing results demonstrate its high potential.

[1]  Yunghsiang Sam Han,et al.  A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.

[2]  Zorana Bankovic,et al.  Anomaly detection in wireless sensor networks using reconfigurable SORU processor and self organizing maps , 2009 .

[3]  Hujun Yin,et al.  On multidimensional scaling and the embedding of self-organising maps , 2008, Neural Networks.

[4]  Jeffrey J. P. Tsai,et al.  A Framework of Machine Learning Based Intrusion Detection for Wireless Sensor Networks , 2008, 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (sutc 2008).

[5]  Jianying Zhou,et al.  Applying intrusion detection systems to wireless sensor networks , 2006, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006..

[6]  Youngsong Mun,et al.  Secure Routing in Sensor Networks: Security Problem Analysis and Countermeasures , 2005, ICCSA.

[7]  Y.A. Sekercioglu,et al.  Detecting Selective Forwarding Attacks in Wireless Sensor Networks using Support Vector Machines , 2007, 2007 3rd International Conference on Intelligent Sensors, Sensor Networks and Information.

[8]  T. Heskes Energy functions for self-organizing maps , 1999 .

[9]  Mark H. Overmars,et al.  A Self-Organizing Neural Network for Robot Motion Planning , 1993 .

[10]  Konrad Rieck,et al.  Linear-Time Computation of Similarity Measures for Sequential Data , 2008, J. Mach. Learn. Res..

[11]  Mukesh Singhal,et al.  Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..

[12]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[13]  D. Signorini,et al.  Neural networks , 1995, The Lancet.

[14]  Colin Fyfe,et al.  The kernel self-organising map , 2000, KES'2000. Fourth International Conference on Knowledge-Based Intelligent Engineering Systems and Allied Technologies. Proceedings (Cat. No.00TH8516).

[15]  A. Perrig,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[16]  Hojjat Adeli,et al.  Improved spiking neural networks for EEG classification and epilepsy and seizure detection , 2007, Integr. Comput. Aided Eng..

[17]  François-Xavier Standaert,et al.  Introduction to Side-Channel Attacks , 2010, Secure Integrated Circuits and Systems.

[18]  Srdjan Capkun,et al.  Secure time synchronization service for sensor networks , 2005, WiSe '05.

[19]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2004, SASN '04.

[20]  David A. Wagner,et al.  Resilient aggregation in sensor networks , 2004, SASN '04.

[21]  A. Davies,et al.  Immune Systems , 1970, Nature.

[22]  Manuel Graña,et al.  Morphological neural networks and vision based simultaneous localization and mapping , 2007, Integr. Comput. Aided Eng..

[23]  Ashraf Saad,et al.  Hybrid intelligent systems for network security , 2006, ACM-SE 44.

[24]  Azzedine Boukerche,et al.  Corrigendum to "Trust-based security for wireless ad hoc and sensor networks" [Computer Communications 30 (2007) 2413-2427] , 2007, Comput. Commun..

[25]  Michael D. Smith,et al.  A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..

[26]  Shichao Zhang,et al.  Rule-based dependency models for security protocol analysis , 2008, Integr. Comput. Aided Eng..

[27]  Pedro Malagón,et al.  Improving Security for SCADA Sensor Networks with Reputation Systems and Self-Organizing Maps , 2009, Sensors.

[28]  Peter J. Bentley,et al.  Detecting interest cache poisoning in sensor networks using an artificial immune algorithm , 2010, Applied Intelligence.

[29]  M. Aupetit,et al.  Function Approximation with Continuous Self-Organizing Maps using . . , 2000 .

[30]  Azzedine Boukerche,et al.  Trust-based security for wireless ad hoc and sensor networks , 2007, Comput. Commun..

[31]  Alberto Muñoz,et al.  Self-organizing maps for outlier detection , 1998, Neurocomputing.

[32]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[33]  Tassos Dimitriou,et al.  LIDeA: a distributed lightweight intrusion detection architecture for sensor networks , 2008, SecureComm.

[34]  Antonio Alfredo Ferreira Loureiro,et al.  On the Security of Cluster-Based Communication Protocols for Wireless Sensor Networks , 2005, ICN.

[35]  Helge J. Ritter,et al.  Neural recognition of human pointing gestures in real images , 1996, Neural Processing Letters.