An Energy-Efficient Attack Detection Protocol for WSN

Traffic attack and false data aggregation attack are serious to wireless sensor networks. How to detect the two kinds of attack is a difficult problem. An energy-efficient attack detection protocol is proposed in this paper. The detection protocol uses linear prediction to establish easy ARMA(2,1) model for sensor nodes. In the detection protocol, different nodes play different roles, and use different monitor schemes. Virtual cluster head and monitor nodes are elected. Monitor nodes monitor cluster head, and member nodes are monitored by their cluster head. At the same time, secure data aggregation schemes are added to the protocol. Simulation shows that, the detection protocol can real-time predict traffic attacks, and insure correct data aggregation, but consume less energy.

[1]  Yau-Hwang Kuo,et al.  The new intrusion prevention and detection approaches for clustering-based sensor networks [wireless sensor networks] , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[2]  K. Basu,et al.  A non-cooperative game approach for intrusion detection in sensor networks , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.

[3]  Antonio Alfredo Ferreira Loureiro,et al.  Decentralized intrusion detection in wireless sensor networks , 2005, Q2SWinet '05.

[4]  Jianying Zhou,et al.  Applying intrusion detection systems to wireless sensor networks , 2006, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006..

[5]  Huirong Fu,et al.  Intrusion Detection System for Wireless Sensor Networks , 2008, Security and Management.

[6]  Sajal K. Das,et al.  Preventing DoS attack in sensor networks: a game theoretic approach , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.

[7]  Sajal K. Das,et al.  Intrusion detection in sensor networks: a non-cooperative game approach , 2004, Third IEEE International Symposium on Network Computing and Applications, 2004. (NCA 2004). Proceedings..

[8]  M. Palaniswami,et al.  Distributed Anomaly Detection in Wireless Sensor Networks , 2006, 2006 10th IEEE Singapore International Conference on Communication Systems.

[9]  Shivakant Mishra,et al.  Defending against path-based DoS attacks in wireless sensor networks , 2005, SASN '05.