Designing Intrusion Detection to Detect Black Hole and Selective Forwarding Attack in WSN Based on Local Information

The wireless sensor networks (WSNs) are being deployed frequently in variety of environments such as military surveillance, forest fire monitoring, chemical leakage monitoring etc. Sensor nodes have limited communication capability and low computation resources so each node is weak entity that can be easily compromised by adversary by launching malicious software inside the network .Performance evaluation of wireless sensor network requires realistic modeling of Intrusion detection system since most of WSNs are application specific. In WSN, nodes have specific properties such as stable neighbors’ information that helps in detection of anomalies in network. Nodes monitor their neighborhood and collaborate with cluster head to detect malicious behavior. Even though nodes don’t have global view but they can still detect an intrusion with certain probability and report to cluster head. This paper introduces a specification based Intrusion Detection System for wireless sensor networks.

[1]  Huirong Fu,et al.  Intrusion Detection System for Wireless Sensor Networks , 2008, Security and Management.

[2]  Dharma P. Agrawal,et al.  Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks , 2008, IEEE Transactions on Mobile Computing.

[3]  Huirong Fu,et al.  Design and implementation of an intrusion detection system for wireless sensor networks , 2007, 2007 IEEE International Conference on Electro/Information Technology.

[4]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[5]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[6]  Felix C. Freiling,et al.  Towards an Intrusion Detection System in Wireless Sensor Networks , 2007 .

[7]  Shivakant Mishra,et al.  INSENS: Intrusion-Tolerant Routing in Wireless Sensor Networks , 2002 .

[8]  Younghwan Yoo,et al.  Impact of Node Density and Sensing Range on Intrusion Detection in Wireless Sensor Networks , 2006, Proceedings of 15th International Conference on Computer Communications and Networks.

[9]  F. Freiling,et al.  Towards Intrusion Detection in Wireless Sensor Networks , 2007 .

[10]  Quentin F. Stout,et al.  TREE ALGORITHMS FOR UNBIASED COIN TOSSING WITH A BIASED COIN , 1984 .