Distributed T-Distribution-Based Intrusion Detection in Wireless Sensor Networks

Detecting malicious attackers is a critical problem for many sensor network applications. In this paper, a distributed t-distribution-based intrusion detection scheme was proposed. Considering the spatial correlation in the neighborhood activities, our intrusion detection algorithm established a robust model for multiple attributes of sensor nodes using t-distribution. The robust model with an approximate parameter algorithm was exploited to detect malicious attackers precisely. Experimental results show that our algorithm can achieve high detection accuracy and low false alarm rate even when a few sensor nodes are misbehaving, and perform quickly with a lower computational cost.

[1]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[2]  Felix C. Freiling,et al.  Cooperative Intrusion Detection in Wireless Sensor Networks , 2009, EWSN.

[3]  Sajal K. Das,et al.  Intrusion detection in sensor networks: a non-cooperative game approach , 2004, Third IEEE International Symposium on Network Computing and Applications, 2004. (NCA 2004). Proceedings..

[4]  Avinash C. Kak,et al.  A Novel Parameter Estimation Algorithm for the Multivariate t-Distribution and Its Application to Computer Vision , 2010, ECCV.

[5]  V. Yohai,et al.  Robust Statistics: Theory and Methods , 2006 .

[6]  Dharma P. Agrawal,et al.  Gaussian versus Uniform Distribution for Intrusion Detection in Wireless Sensor Networks , 2013, IEEE Transactions on Parallel and Distributed Systems.

[7]  Yau-Hwang Kuo,et al.  eHIP: An energy-efficient hybrid intrusion prohibition system for cluster-based wireless sensor networks , 2007, Comput. Networks.

[8]  Antonio Alfredo Ferreira Loureiro,et al.  Decentralized intrusion detection in wireless sensor networks , 2005, Q2SWinet '05.

[9]  Jingsha He,et al.  Group-based intrusion detection system in wireless sensor networks , 2008, Comput. Commun..

[10]  V. Yohai,et al.  High Breakdown-Point Estimates of Regression by Means of the Minimization of an Efficient Scale , 1988 .

[11]  Fang Liu,et al.  Insider Attacker Detection in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[12]  Fang Liu,et al.  WSN09-2: On the Performance of In-Situ Key Establishment Schemes for Wireless Sensor Networks , 2006, IEEE Globecom 2006.

[13]  Tao Chen,et al.  Robust probabilistic PCA with missing data and contribution analysis for outlier detection , 2009, Comput. Stat. Data Anal..