Fuzzy Based Advanced Hybrid Intrusion Detection System to Detect Malicious Nodes in Wireless Sensor Networks

In this paper, an Advanced Hybrid Intrusion Detection System (AHIDS) that automatically detects the WSNs attacks is proposed. AHIDS makes use of cluster-based architecture with enhanced LEACH protocol that intends to reduce the level of energy consumption by the sensor nodes. AHIDS uses anomaly detection and misuse detection based on fuzzy rule sets along with the Multilayer Perceptron Neural Network. The Feed Forward Neural Network along with the Backpropagation Neural Network are utilized to integrate the detection results and indicate the different types of attackers (i.e., Sybil attack, wormhole attack, and hello flood attack). For detection of Sybil attack, Advanced Sybil Attack Detection Algorithm is developed while the detection of wormhole attack is done by Wormhole Resistant Hybrid Technique. The detection of hello flood attack is done by using signal strength and distance. An experimental analysis is carried out in a set of nodes; 13.33% of the nodes are determined as misbehaving nodes, which classified attackers along with a detection rate of the true positive rate and false positive rate. Sybil attack is detected at a rate of 99,40%; hello flood attack has a detection rate of 98, 20%; and wormhole attack has a detection rate of 99, 20%.

[1]  Emin Anarim,et al.  An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks , 2005, Expert Syst. Appl..

[2]  Ricardo Dahab,et al.  SecLEACH - On the security of clustered sensor networks , 2007, Signal Process..

[3]  I. Mahgoub,et al.  A Secure Hierarchical Routing Protocol for Wireless Sensor Networks , 2006, 2006 10th IEEE Singapore International Conference on Communication Systems.

[4]  Francisco Herrera,et al.  Special issue on evolutionary fuzzy systems , 2011, Int. J. Comput. Intell. Syst..

[5]  Yskandar Hamam,et al.  Hidden Markov Model for Shortest Paths Testing to Detect a Wormhole Attack in a Localized Wireless Sensor Network , 2012, ANT/MobiWIS.

[6]  Liu Zhenhai,et al.  Hybrid Key Management Mechanism Based on Double Cluster Head Structure , 2012, 2012 Second International Conference on Instrumentation, Measurement, Computer, Communication and Control.

[7]  V. B. Vaghela,et al.  Detection and Prevention of Wormhole Attack in Wireless Sensor Network using AOMDV Protocol , 2016 .

[8]  Ricardo Dahab,et al.  SecLEACH - A Random Key Distribution Solution for Securing Clustered Sensor Networks , 2006, Fifth IEEE International Symposium on Network Computing and Applications (NCA'06).

[9]  Hoon-Jae Lee,et al.  Security analysis of secure data aggregation protocols in wireless sensor networks , 2014, 16th International Conference on Advanced Communication Technology.

[10]  Vishal Sharma,et al.  A survey on LEACH and other’s routing protocols in wireless sensor network , 2016 .

[11]  Antonio Alfredo Ferreira Loureiro,et al.  Malicious node detection in wireless sensor networks , 2004, 18th International Parallel and Distributed Processing Symposium, 2004. Proceedings..

[12]  Shahaboddin Shamshirband,et al.  Co-FAIS: Cooperative fuzzy artificial immune system for detecting intrusion in wireless sensor networks , 2014, J. Netw. Comput. Appl..

[13]  Marko Hölbl,et al.  A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion , 2014, Ad Hoc Networks.

[14]  Noorhaniza Wahid,et al.  A hybrid network intrusion detection system using simplified swarm optimization (SSO) , 2012, Appl. Soft Comput..

[15]  Krishan Kumar,et al.  Detection of HELLO flood attack on LEACH protocol , 2014, 2014 IEEE International Advance Computing Conference (IACC).

[16]  K.Q. Yan,et al.  Hybrid Intrusion Detection System for enhancing the security of a cluster-based Wireless Sensor Network , 2010, 2010 3rd International Conference on Computer Science and Information Technology.

[17]  Yunho Lee,et al.  A New Efficient Key Management Protocol for Wireless Sensor and Actor Networks , 2009, ArXiv.

[18]  Anastasios A. Economides,et al.  Detecting Sybil attacks in wireless sensor networks using UWB ranging-based information , 2015, Expert Syst. Appl..

[19]  Lotfi A. Zadeh,et al.  Fuzzy sets and information granularity , 1996 .

[20]  Chirag Gohel,et al.  Securing VANET by Preventing Attacker Node Using Watchdog and Bayesian Network Theory , 2016 .

[21]  Yassine Maleh,et al.  A Global Hybrid Intrusion Detection System for Wireless Sensor Networks , 2015, ANT/SEIT.

[22]  Dianhui Wang,et al.  A probabilistic learning algorithm for robust modeling using neural networks with random weights , 2015, Inf. Sci..

[23]  Cong Wang,et al.  A Secure Routing Protocol for Cluster-Based Wireless Sensor Networks Using Group Key Management , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.

[24]  Virendra Pal Singh,et al.  Signal Strength based Hello Flood Attack Detection and Prevention in Wireless Sensor Networks , 2013 .

[25]  Mansi Gupta,et al.  Detection of Malicious Cluster Head causing Hello Flood Attack in LEACH Protocol in Wireless Sensor Networks , 2014 .

[26]  P. Rathee,et al.  Preventing Sybil Attack in Wireless Sensor Networks , 2015 .