LAID: a learning automata-based scheme for intrusion detection in wireless sensor networks

In this paper, we address the problem of intrusion detection in wireless sensor networks (WSNs) using a learning automata (LA)-based approach. We are not aware of any LA-based intrusion detection systems (IDSs) for WSN. Additionally, the S-model approach that we have taken to solve the problem, wherein the feedback of the environment to the automaton can not only be completely favorable or completely unfavorable, but also be any continuous value within these extremities, makes it one of the attractive solution approaches in LA. We have rigorously evaluated the performance of our proposed solution by performing a variety of experiments and have found our solution approach to be promising. Copyright © 2008 John Wiley & Sons, Ltd.

[1]  T. V. Lakshman,et al.  SRED: stabilized RED , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).

[2]  Sajal K. Das,et al.  A game theory based approach for security in wireless sensor networks , 2004, IEEE International Conference on Performance, Computing, and Communications, 2004.

[3]  Yaping Li,et al.  ARRIVE: Algorithm for Robust Routing in Volatile Environments , 2003 .

[4]  Anupam Joshi,et al.  Security for wireless sensor networks , 2004 .

[5]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[6]  Jianying Zhou,et al.  Applying intrusion detection systems to wireless sensor networks , 2006, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006..

[7]  S. Lakshmivarahan,et al.  Learning Algorithms Theory and Applications , 1981 .

[8]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[9]  B. John Oommen,et al.  Discretized learning automata solutions to the capacity assignment problem for prioritized networks , 2002, IEEE Trans. Syst. Man Cybern. Part B.

[10]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[11]  Mohammad S. Obaidat,et al.  Guest editorial learning automata: theory, paradigms, and applications , 2002, IEEE Trans. Syst. Man Cybern. Part B.

[12]  Eyal Kushilevitz,et al.  Learning Automata , 2008, Encyclopedia of Algorithms.

[13]  Mohammad S. Obaidat,et al.  A Secure and Energy-Efficient Scheme for Group-Based Routing in Heterogeneous Ad Hoc Sensor Networks and Its Simulation Analysis , 2008, Simul..

[14]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[15]  Marimuthu Palaniswami,et al.  Intrusion Detection for Routing Attacks in Sensor Networks , 2006, Int. J. Distributed Sens. Networks.

[16]  Dharma P. Agrawal,et al.  Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks , 2008, IEEE Transactions on Mobile Computing.

[17]  S. Banerjee,et al.  Intrusion Detection on Sensor Networks Using Emotional Ants , 2005 .

[18]  Richard Bellman,et al.  ON A ROUTING PROBLEM , 1958 .

[19]  Murali S. Kodialam,et al.  Detecting network intrusions via sampling: a game theoretic approach , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[20]  Frank Stajano,et al.  The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.

[21]  Mohammad S. Obaidat,et al.  FORK: A novel two-pronged strategy for an agent-based intrusion detection scheme in ad-hoc networks , 2008, Comput. Commun..

[22]  Edsger W. Dijkstra,et al.  A note on two problems in connexion with graphs , 1959, Numerische Mathematik.

[23]  Leonidas J. Guibas,et al.  Energy Efficient Intrusion Detection in Camera Sensor Networks , 2007, DCOSS.

[24]  Harald Vogt,et al.  Intrusion Detection and Failure Recovery in Sensor Nodes , 2005, GI Jahrestagung.

[25]  Shivakant Mishra,et al.  A Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks , 2003, IPSN.