A Hybrid Intrusion Detection System of Cluster-based Wireless Sensor Networks

Recent advances in Wireless Sensor Networks (WSNs) have made them extremely useful in various applications. WSNs are susceptible to attack, because they are cheap, small devices and are deployed in open and unprotected environments. In this paper, we propose an Intrusion Detection System (IDS) created in Cluster-based Wireless Sensor Networks (CWSNs). According to the capability of Cluster Head (CH) is better than other Sensor Nodes (SNs) in CWSN. Therefore, a Hybrid Intrusion Detection System (HIDS) is designed in this research. The CH is used to detect intruders that not only decreases the consumption of energy, but also efficiently reduces the amount of information in the entire network. However, the lifetime of network can be prolonged by the proposed HIDS.

[1]  Wendi B. Heinzelman,et al.  Adaptive protocols for information dissemination in wireless sensor networks , 1999, MobiCom.

[2]  A. Manjeshwar,et al.  TEEN: a routing protocol for enhanced efficiency in wireless sensor networks , 2001, Proceedings 15th International Parallel and Distributed Processing Symposium. IPDPS 2001.

[3]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[4]  D.P. Agrawal,et al.  APTEEN: a hybrid protocol for efficient routing and comprehensive information retrieval in wireless , 2002, Proceedings 16th International Parallel and Distributed Processing Symposium.

[5]  Yan Qiao,et al.  A Network IDS with low false positive rate , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).

[6]  Cauligi S. Raghavendra,et al.  PEGASIS: Power-efficient gathering in sensor information systems , 2002, Proceedings, IEEE Aerospace Conference.

[7]  Giovanni Vigna,et al.  Intrusion detection: a brief history and overview , 2002 .

[8]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[9]  Elena Marchiori,et al.  Feature selection in proteomic pattern data with support vector machines , 2004, 2004 Symposium on Computational Intelligence in Bioinformatics and Computational Biology.

[10]  Emin Anarim,et al.  An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks , 2005, Expert Syst. Appl..

[11]  Xiaojiang Du,et al.  Improving routing in sensor networks with heterogeneous sensor nodes , 2005, 2005 IEEE 61st Vehicular Technology Conference.

[12]  A. Murali,et al.  A Survey on Intrusion Detection Approaches , 2005, 2005 International Conference on Information and Communication Technologies.

[13]  Yong Wang,et al.  A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.

[14]  Yau-Hwang Kuo,et al.  eHIP: An energy-efficient hybrid intrusion prohibition system for cluster-based wireless sensor networks , 2007, Comput. Networks.