SpyMon: Hidden network monitoring for security in wireless sensor Networks

Network monitoring is a basic component for intrusion detection and also an energy-expensive task. However in the existing works the contradiction between energy efficiency and security of network monitoring isnpsilat well handled. In this paper, we propose SpyMon, a network monitoring mechanism for the sensor network. To achieve energy-efficiency and reliability, a subset of sensor nodes are randomly selected as monitors in the network and each sensor node is monitored by at least k nodes. For the resistance against the attacks, the monitors are protected from identity exposure to prevent them becoming the explicit targets of adversaries. A collective monitoring triggering scheme is also proposed to further improve the capability and reliability of monitoring. Our analysis shows that SpyMon is resilient against node compromise while attaining energy efficiency.

[1]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[2]  Antonio Alfredo Ferreira Loureiro,et al.  Decentralized intrusion detection in wireless sensor networks , 2005, Q2SWinet '05.

[3]  Yunghsiang Sam Han,et al.  A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.

[4]  Mingyan Liu,et al.  A distributed monitoring mechanism for wireless sensor networks , 2002, WiSE '02.

[5]  Yunghsiang Sam Han,et al.  A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.

[6]  Deborah Estrin,et al.  Highly-resilient, energy-efficient multipath routing in wireless sensor networks , 2001, MOCO.

[7]  Wenke Lee,et al.  A cooperative intrusion detection system for ad hoc networks , 2003, SASN '03.

[8]  Haiyun Luo,et al.  Statistical en-route filtering of injected false data in sensor networks , 2005, IEEE J. Sel. Areas Commun..

[9]  Sushil Jajodia,et al.  LEAP - efficient security mechanisms for large-scale distributed sensor networks , 2003, SenSys.

[10]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[11]  Srdjan Capkun,et al.  Secure positioning of wireless devices with application to sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[12]  Jie Wu,et al.  On Connected Multiple Point Coverage in Wireless Sensor Networks , 2006, Int. J. Wirel. Inf. Networks.

[13]  Fang Liu,et al.  Insider Attacker Detection in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.