Survey of Intrusion Detection Techniques and Architectures in Wireless Sensor Networks

Rakesh Sharma Research scholar, Department of Computer Science &Engg., I. K. Gujral Punjab Technical University, Jalandhar, Punjab, India Email: rakeshsharma3112@gmail.com Vijay Anant Athavale Professor, Department of Computer Science & Engg., Gulzar group of Institutes, Khanna, Punjab, India Email: vijay.athavale@gmail.com -------------------------------------------------------------------ABSTRACT----------------------------------------------------------------Advances in electronics and wireless communication technologies have enabled the development of large-scale wireless sensor networks (WSNs). However, WSNs practice from lots of constraints, with low computation capability, small memory, limited energy resources, vulnerability to physical capture, and the need of infrastructure, which enforce lonely security challenges mostly for the applications where confidentiality has key significance. There are diverse applications for wireless sensor networks, and security is very major issue for several of them. Before attackers can damage the WSN system (i.e., sensor nodes) and/or information destination (i.e., data sink or base station) in order to work WSNs in a secure way, any sort of intrusions should be detected.

[1]  Wenke Lee,et al.  Intrusion Detection Techniques for Mobile Wireless Networks , 2003, Wirel. Networks.

[2]  Ajith Abraham,et al.  IDEAS: intrusion detection based on emotional ants for sensors , 2005, 5th International Conference on Intelligent Systems Design and Applications (ISDA'05).

[3]  Satria Mandala,et al.  A survey on MANET intrusion detection , 2008 .

[4]  Guangjie Han,et al.  IDSEP: a novel intrusion detection scheme based on energy prediction in cluster-based wireless sensor networks , 2013, IET Inf. Secur..

[5]  Luci Pirmez,et al.  Intrusion Detection System for Wireless Sensor Networks Using Danger Theory Immune-Inspired Techniques , 2012, International Journal of Wireless Information Networks.

[6]  Francis Minhthang Bui,et al.  A Game-Theoretic Framework for Robust Optimal Intrusion Detection in Wireless Sensor Networks , 2014, IEEE Transactions on Information Forensics and Security.

[7]  Nor Badrul Anuar,et al.  An appraisal and design of a multi-agent system based cooperative wireless intrusion detection computational intelligence technique , 2013, Eng. Appl. Artif. Intell..

[8]  Matthias Hollick,et al.  Lightweight energy consumption-based intrusion detection system for wireless sensor networks , 2015, SAC '13.

[9]  Mohammed Feham,et al.  Novel hybrid intrusion detection system for clustered wireless sensor network , 2011, ArXiv.

[10]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[11]  Yassine Maleh,et al.  A Global Hybrid Intrusion Detection System for Wireless Sensor Networks , 2015, ANT/SEIT.

[12]  Hossein Jadidoleslamy,et al.  A HIERARCHICAL INTRUSION DETECTION ARCHITECTURE FOR WIRELESS SENSOR NETWORKS , 2011 .

[13]  Sungyoung Lee,et al.  A novel intrusion detection framework for wireless sensor networks , 2013, Personal and Ubiquitous Computing.

[14]  G. Sandhya,et al.  Intrusion detection in wireless sensor network using genetic K-means algorithm , 2014, 2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies.

[15]  Jie Wu,et al.  A Survey on Intrusion Detection in Mobile Ad Hoc Networks , 2007 .

[16]  Tarek S. Sobh Wired and wireless intrusion detection system: Classifications, good characteristics and state-of-the-art , 2006, Comput. Stand. Interfaces.

[17]  Yuanjie Li,et al.  Signaling game based strategy of intrusion detection in wireless sensor networks , 2011, Comput. Math. Appl..

[18]  Steven Furnell,et al.  D-FICCA: A density-based fuzzy imperialist competitive clustering algorithm for intrusion detection in wireless sensor networks , 2014 .

[19]  K. Q. Yan,et al.  A Hybrid Intrusion Detection System of Cluster-based Wireless Sensor Networks , 2009 .

[20]  Sofiène Tahar,et al.  Formal probabilistic analysis of detection properties in wireless sensor networks , 2014, Formal Aspects of Computing.

[21]  Ashok Kumar Das,et al.  An Efficient Hybrid Anomaly Detection Scheme Using K-Means Clustering for Wireless Sensor Networks , 2016, Wirel. Pers. Commun..

[22]  Abbas Javed,et al.  Random Neural Network Based Intelligent Intrusion Detection for Wireless Sensor Networks , 2016, ICCS.

[23]  Yun Wang,et al.  Intrusion detection in a K-Gaussian distributed wireless sensor network , 2011, J. Parallel Distributed Comput..

[24]  Felix C. Freiling,et al.  Cooperative Intrusion Detection in Wireless Sensor Networks , 2009, EWSN.

[25]  Driss Aboutajdine,et al.  Efficient deployment quality analysis for intrusion detection in wireless sensor networks , 2016, Wirel. Networks.

[26]  Razvan Tataroiu,et al.  Adaptive Trust Management Protocol based on intrusion detection for Wireless Sensor Networks , 2013, 2013 RoEduNet International Conference 12th Edition: Networking in Education and Research.

[27]  Christopher Leckie,et al.  An adaptive elliptical anomaly detection model for wireless sensor networks , 2014, Comput. Networks.

[28]  Shahaboddin Shamshirband,et al.  Co-FAIS: Cooperative fuzzy artificial immune system for detecting intrusion in wireless sensor networks , 2014, J. Netw. Comput. Appl..

[29]  Dharma P. Agrawal,et al.  Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks , 2008, IEEE Transactions on Mobile Computing.

[30]  D. K. Lobiyal,et al.  Probabilistic Intrusion Detection in Randomly Deployed Wireless Sensor Networks , 2015, Wirel. Pers. Commun..

[31]  Ricardo Staciarini Puttini,et al.  Security in Ad Hoc Networks: a General Intrusion Detection Architecture Enhancing Trust Based Approaches , 2002, Wireless Information Systems.

[32]  Marimuthu Palaniswami,et al.  Hyperspherical cluster based distributed anomaly detection in wireless sensor networks , 2014, J. Parallel Distributed Comput..