Design of Security Schemes for Wireless Sensor Networks Based on Attack Behavior: Proactive Approach

Wireless sensor networks (WSNs) are one of the emerging network fields, with a tremendous prospect to research and contributing itself in a vast arena of applications. In any sort of network, the utmost priority is given to its security feature, since any means of communication demands the need of securing and safe guarding the sensitive data from the adversary. Even WSNs are also susceptible to any offenders attacks. In this paper, an attempt is made to design an perpetual proactive security scheme at the sink node using sniffing mechanism of intrusion detection system by studying the behavioral aspect of the sensor nodes due to attack and to monitor the system with an rescue mechanism.

[1]  Marimuthu Palaniswami,et al.  Anomaly detection in wireless sensor networks , 2008, IEEE Wireless Communications.

[2]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[3]  Stefanos Gritzalis,et al.  Situation awareness mechanisms for wireless sensor networks , 2008, IEEE Communications Magazine.

[4]  Jeff Rose,et al.  MANTIS: system support for multimodAl NeTworks of in-situ sensors , 2003, WSNA '03.

[5]  Sachin Shetty,et al.  Wireless Sensor Payload Design for Sounding Rocket , 2007, Computers and Their Applications.

[6]  Jie Wu,et al.  Energy-efficient coverage problems in wireless ad-hoc sensor networks , 2006, Comput. Commun..

[7]  Xiaojiang Du,et al.  Security in wireless sensor networks , 2008, IEEE Wireless Communications.

[8]  Xun Wang,et al.  Lifetime optimization of sensor networks under physical attacks , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.

[9]  Mani Srivastava,et al.  Overview of sensor networks , 2004 .

[10]  J. Feigenbaum,et al.  The KeyNote trust management system version2, IETF RFC 2704 , 1999 .

[11]  Christopher Krügel,et al.  Detecting kernel-level rootkits through binary analysis , 2004, 20th Annual Computer Security Applications Conference.

[12]  David A. Wagner,et al.  MOPS: an infrastructure for examining security properties of software , 2002, CCS '02.

[13]  Rahul Khanna,et al.  Control theoretic approach to intrusion detection using a distributed hidden Markov model , 2008, IEEE Wireless Communications.

[14]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[15]  Ratan K. Guha,et al.  Effective intrusion detection using multiple sensors in wireless ad hoc networks , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.

[16]  Lalan Kumar,et al.  A review on security issues in wireless sensor network , 2010 .

[17]  Somesh Jha,et al.  Static Analysis of Executables to Detect Malicious Patterns , 2003, USENIX Security Symposium.

[18]  Paul Resnick,et al.  Trust among strangers in internet transactions: Empirical analysis of eBay' s reputation system , 2002, The Economics of the Internet and E-commerce.

[19]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[20]  Radha Poovendran,et al.  A key management scheme in distributed sensor networks using attack probabilities , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..

[21]  Somesh Jha,et al.  Semantics-aware malware detection , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).