An Experimental Study of Hierarchical Intrusion Detection for Wireless Industrial Sensor Networks

Wireless industrial sensor networks are necessary for industrial applications, so that wireless sensor nodes sense around themselves and detect anomaly events in the harsh industrial environments. Due to the harshness, anomaly events such as adversarial intrusions may result in harmful and disastrous situations for industrial applications but it is difficult to detect them over wireless medium. Intrusion detection is an essential requirement for security, but as far as we know, there have not been such studies for wireless industrial sensor networks in the literature. The previous intrusion detection methods proposed for wireless sensor networks consider networks rather in general senses and restrict capabilities to specific attacks only. In this paper, we first study intrusion detection for wireless industrial sensor networks, through various experiments and design of a hierarchical framework. We classify and select better methodologies against various intrusions. Subsequently, we find novel results on the previous methodologies. We also propose a new hierarchical framework for intrusion detection as well as data processing. Throughout the experiments on the proposed framework, we stress the significance of one-hop clustering, which was neglected in the previous studies. Finally, we construct required logical protocols in the hierarchical framework; hierarchical intrusion detection and prevention protocols.

[1]  Youxian Sun,et al.  Wireless sensor networks for industrial applications , 2004, Fifth World Congress on Intelligent Control and Automation (IEEE Cat. No.04EX788).

[2]  Yookun Cho,et al.  EARQ: Energy Aware Routing for Real-Time and Reliable Communication in Wireless Industrial Sensor Networks , 2009, IEEE Transactions on Industrial Informatics.

[3]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[4]  Frank Mueller,et al.  Analyzing and modeling encryption overhead for sensor network nodes , 2003, WSNA '03.

[5]  Marimuthu Palaniswami,et al.  Intrusion Detection for Routing Attacks in Sensor Networks , 2006, Int. J. Distributed Sens. Networks.

[6]  Ossama Younis,et al.  Distributed clustering in ad-hoc sensor networks: a hybrid, energy-efficient approach , 2004, IEEE INFOCOM 2004.

[7]  Jean-Michel Friedt,et al.  IEEE 802.15.4 Performance on a Hierarchical Hybrid Sensor Network Platform , 2009, 2009 Fifth International Conference on Networking and Services.

[8]  Edward J. Coyle,et al.  An energy efficient hierarchical clustering algorithm for wireless sensor networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[9]  Lionel M. Ni,et al.  An Energy-Efficient K-Hop Clustering Framework for Wireless Sensor Networks , 2007, EWSN.

[10]  Yunghsiang Sam Han,et al.  A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.

[11]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[12]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[13]  Mark D. Yarvis,et al.  Design and deployment of industrial sensor networks: experiences from a semiconductor plant and the north sea , 2005, SenSys '05.

[14]  F. Freiling,et al.  Towards Intrusion Detection in Wireless Sensor Networks , 2007 .

[15]  Ted Taekyoung Kwon,et al.  Experimental Study on Wireless Sensor Network Security , 2006, ISI.

[16]  Thomas P. von Hoff,et al.  Security for Industrial Communication Systems , 2005, Proceedings of the IEEE.

[17]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[18]  Wenyuan Xu,et al.  Jamming sensor networks: attack and defense strategies , 2006, IEEE Network.

[19]  Peng Ning,et al.  Secure Distributed Cluster Formation in Wireless Sensor Networks , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).

[20]  M. Palaniswami,et al.  Distributed Anomaly Detection in Wireless Sensor Networks , 2006, 2006 10th IEEE Singapore International Conference on Communication Systems.

[21]  Wendi B. Heinzelman,et al.  Adaptive protocols for information dissemination in wireless sensor networks , 1999, MobiCom.

[22]  Meng Joo Er,et al.  Wireless Sensor Networks for Industrial Environments , 2005, International Conference on Computational Intelligence for Modelling, Control and Automation and International Conference on Intelligent Agents, Web Technologies and Internet Commerce (CIMCA-IAWTIC'06).

[23]  Andreas Willig,et al.  Recent and Emerging Topics in Wireless Industrial Communications: A Selection , 2008, IEEE Transactions on Industrial Informatics.

[24]  Jean-Pierre Thomesse The WORLDFIP Fieldbus , 2005, The Industrial Information Technology Handbook.

[25]  Carlo Fischione,et al.  System Level Design for Clustered Wireless Sensor Networks , 2007, IEEE Transactions on Industrial Informatics.

[26]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[27]  Jianying Zhou,et al.  Applying intrusion detection systems to wireless sensor networks , 2006, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006..

[28]  Yau-Hwang Kuo,et al.  The new intrusion prevention and detection approaches for clustering-based sensor networks [wireless sensor networks] , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[29]  Bruno Sinopoli,et al.  Distributed control applications within sensor networks , 2003, Proc. IEEE.

[30]  Gerd Scholl,et al.  Modular Wireless Real-Time Sensor/Actuator Network for Factory Automation Applications , 2007, IEEE Transactions on Industrial Informatics.

[31]  Huirong Fu,et al.  Intrusion Detection System for Wireless Sensor Networks , 2008, Security and Management.

[32]  Yunghsiang Sam Han,et al.  A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.

[33]  Calvin Ko,et al.  Challenges in intrusion detection for wireless ad-hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..

[34]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[35]  Ajay Gupta,et al.  Anomaly intrusion detection in wireless sensor networks , 2006, J. High Speed Networks.

[36]  Wendi Heinzelman,et al.  Energy-efficient communication protocol for wireless microsensor networks , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[37]  Yong Wang,et al.  A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.

[38]  Antonio Alfredo Ferreira Loureiro,et al.  Decentralized intrusion detection in wireless sensor networks , 2005, Q2SWinet '05.

[39]  Andreas Strikos A full approach for Intrusion Detection in Wireless Sensor Networks , 2007 .