Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches

Intrusion detection system in wireless sensor network is one of the growing research areas in recent years. Wireless sensor networks (WSN) consist of tiny devices. These tiny devices have limited energy, computational power, transmission range and memory. However, wireless sensor networks are deployed mostly in open and unguarded environment. Therefore, intrusion detection is one of the important aspects for wireless sensor networks. There are two different kind of intrusion detection mechanism: anomaly based and signature based. In this paper, we mention several attacks on WSN and we primarily focus only on the anomaly based intrusion detection system. Finally, we discuss about several existing approaches to describe how they have identified security threats and implemented their intrusion detection system.

[1]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[2]  David A. Wagner,et al.  Security in wireless sensor networks , 2004, SASN '04.

[3]  Mukesh Singhal,et al.  Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..

[4]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[5]  Jingsha He,et al.  Group-based intrusion detection system in wireless sensor networks , 2008, Comput. Commun..

[6]  Choong Seon Hong,et al.  Security in wireless sensor networks: issues and challenges , 2006, 2006 8th International Conference Advanced Communication Technology.

[7]  F. Freiling,et al.  Towards Intrusion Detection in Wireless Sensor Networks , 2007 .

[8]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[9]  Ajay Gupta,et al.  Anomaly intrusion detection in wireless sensor networks , 2006, J. High Speed Networks.

[10]  Antonio Alfredo Ferreira Loureiro,et al.  Decentralized intrusion detection in wireless sensor networks , 2005, Q2SWinet '05.

[11]  S Dipura,et al.  Wireless and mobile computing , 2011 .

[12]  Wenke Lee,et al.  Intrusion Detection Techniques for Mobile Wireless Networks , 2003, Wirel. Networks.

[13]  Thomas F. La Porta,et al.  Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks , 2006, IEEE Transactions on Mobile Computing.

[14]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[15]  Thomas F. La Porta,et al.  Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks , 2007, IEEE Trans. Mob. Comput..