A Lightweight Intrusion Detection Method Based on Fuzzy Clustering Algorithm for Wireless Sensor Networks

For resource-constrained wireless sensor networks (WSNs), designing a lightweight intrusion detection technology has been a hot and difficult issue. In this paper, we proposed a lightweight intrusion detection method that was able to directly map the network status into sensor monitoring data received by base station, so that base station can sense the abnormal changes in the network. Our method is highlighted by the fusion of fuzzy c-means algorithm, one-class SVM, and sliding window procedure to effectively differentiate network attacks from abnormal data. Finally, the proposed method was tested on the wireless sensor network simulation software EXata and in real applications. The results showed that the intrusion detection method in this paper could effectively identify whether the abnormal data came from a network attack or just a noise. In addition, extra energy consumption can be avoided in all sensor monitoring nodes of the sensor network where our method has been deployed.

[1]  Raimir Holanda Filho,et al.  A New Collaborative Approach for Intrusion Detection System on Wireless Sensor Networks , 2008, TeNe.

[2]  Jingwen Tian,et al.  Wireless sensor network for community intrusion detection system based on classify support vector machine , 2009, 2009 International Conference on Information and Automation.

[3]  Chee-Yee Chong,et al.  Sensor networks: evolution, opportunities, and challenges , 2003, Proc. IEEE.

[4]  Yau-Hwang Kuo,et al.  The new intrusion prevention and detection approaches for clustering-based sensor networks [wireless sensor networks] , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[5]  Marimuthu Palaniswami,et al.  Labelled data collection for anomaly detection in wireless sensor networks , 2010, 2010 Sixth International Conference on Intelligent Sensors, Sensor Networks and Information Processing.

[6]  Rabie A. Ramadan,et al.  Smart outlier detection of wireless sensor network , 2015 .

[7]  Taekyoung Kwon,et al.  An Experimental Study of Hierarchical Intrusion Detection for Wireless Industrial Sensor Networks , 2010, IEEE Transactions on Industrial Informatics.

[8]  Mahdi Abadi,et al.  A PCA-based distributed approach for intrusion detection in wireless sensor networks , 2011, 2011 International Symposium on Computer Networks and Distributed Systems (CNDS).

[9]  Giovanni Vigna,et al.  Intrusion detection: a brief history and overview , 2002 .

[10]  Jie Wu,et al.  A Survey on Intrusion Detection in Mobile Ad Hoc Networks , 2007 .

[11]  John A. Stankovic,et al.  Security in wireless sensor networks , 2004, SASN '04.

[12]  Syed Abdul Sattar,et al.  A Collaborative, Secure and Energy Efficient Intrusion Detection Method for Homogeneous WSN , 2011, ACC.

[13]  Alfredo Navarra,et al.  Distributed Intrusion Detection Systems for Enhancing Security in Mobile Wireless Sensor Networks* , 2008, Int. J. Distributed Sens. Networks.

[14]  Yu-Fang Chung,et al.  Shielding wireless sensor network using Markovian intrusion detection system with attack pattern mining , 2013, Inf. Sci..

[15]  Bernhard Schölkopf,et al.  Support Vector Method for Novelty Detection , 1999, NIPS.

[16]  Ing-Ray Chen,et al.  Behavior Rule Specification-Based Intrusion Detection for Safety Critical Medical Cyber Physical Systems , 2015, IEEE Transactions on Dependable and Secure Computing.

[17]  Jingsha He,et al.  Group-based intrusion detection system in wireless sensor networks , 2008, Comput. Commun..

[18]  Karl N. Levitt,et al.  A specification-based intrusion detection system for AODV , 2003, SASN '03.

[19]  D. P. Agrawal,et al.  Self-organized criticality and stochastic learning based intrusion detection system for wireless sensor networks , 2003, IEEE Military Communications Conference, 2003. MILCOM 2003..

[20]  Jonathan Loo,et al.  A Specification-Based IDS for Detecting Attacks on RPL-Based Network Topology , 2016, Inf..

[21]  M. Palaniswami,et al.  Distributed Anomaly Detection in Wireless Sensor Networks , 2006, 2006 10th IEEE Singapore International Conference on Communication Systems.

[22]  Sean Hughes,et al.  Clustering by Fast Search and Find of Density Peaks , 2016 .

[23]  Li-Yong Ren,et al.  Using data mining to discover signatures in network-based intrusion detection , 2002, Proceedings. International Conference on Machine Learning and Cybernetics.

[24]  Ala I. Al-Fuqaha,et al.  Detection of Masquerade Attacks on Wireless Sensor Networks , 2007, 2007 IEEE International Conference on Communications.

[25]  Jon Davis,et al.  A Survey of Cyber Ranges and Testbeds , 2013 .

[26]  Ing-Ray Chen,et al.  A survey of intrusion detection techniques for cyber-physical systems , 2014, ACM Comput. Surv..

[27]  Yang Xiao,et al.  Intrusion detection techniques in mobile ad hoc and wireless sensor networks , 2007, IEEE Wireless Communications.

[28]  Wenke Lee,et al.  Intrusion detection in wireless ad-hoc networks , 2000, MobiCom '00.

[29]  Ravi Sankar,et al.  A Survey of Intrusion Detection Systems in Wireless Sensor Networks , 2014, IEEE Communications Surveys & Tutorials.

[30]  L. Lo,et al.  Robin sequence: review of treatment modalities for airway obstruction in 110 cases. , 2002, International journal of pediatric otorhinolaryngology.

[31]  Tarek S. Sobh Wired and wireless intrusion detection system: Classifications, good characteristics and state-of-the-art , 2006, Comput. Stand. Interfaces.

[32]  J. Bezdek,et al.  FCM: The fuzzy c-means clustering algorithm , 1984 .

[33]  Shahaboddin Shamshirband,et al.  Cooperative game theoretic approach using fuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks , 2014, Eng. Appl. Artif. Intell..

[34]  Guangjie Han,et al.  Policy and network-based intrusion detection system for IPv6-enabled wireless sensor networks , 2014, 2014 IEEE International Conference on Communications (ICC).

[35]  Alessandro Laio,et al.  Clustering by fast search and find of density peaks , 2014, Science.

[36]  Dharma P. Agrawal,et al.  Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks , 2008, IEEE Transactions on Mobile Computing.

[37]  Antonio Alfredo Ferreira Loureiro,et al.  Decentralized intrusion detection in wireless sensor networks , 2005, Q2SWinet '05.