WSN-DS: A Dataset for Intrusion Detection Systems in Wireless Sensor Networks

Wireless Sensor Networks (WSN) have become increasingly one of the hottest research areas in computer science due to their wide range of applications including critical military and civilian applications. Such applications have created various security threats, especially in unattended environments. To ensure the security and dependability of WSN services, an Intrusion Detection System (IDS) should be in place. This IDS has to be compatible with the characteristics of WSNs and capable of detecting the largest possible number of security threats. In this paper a specialized dataset for WSN is developed to help better detect and classify four types of Denial of Service (DoS) attacks: Blackhole, Grayhole, Flooding, and Scheduling attacks. This paper considers the use of LEACH protocol which is one of the most popular hierarchical routing protocols in WSNs. A scheme has been defined to collect data from Network Simulator 2 (NS-2) and then processed to produce 23 features. The collected dataset is called WSN-DS. Artificial Neural Network (ANN) has been trained on the dataset to detect and classify different DoS attacks. The results show that WSN-DS improved the ability of IDS to achieve higher classification accuracy rate. WEKA toolbox was used with holdout and 10-Fold Cross Validation methods. The best results were achieved with 10-Fold Cross Validation with one hidden layer. The classification accuracies of attacks were 92.8%, 99.4%, 92.2%, 75.6%, and 99.8% for Blackhole, Flooding, Scheduling, and Grayhole attacks, in addition to the normal case (without attacks), respectively.

[1]  Chor Ping Low,et al.  Energy Neutral Clustering for energy harvesting wireless sensors networks , 2013, ICON.

[2]  Jeong-Uk Kim,et al.  Study on Intrusion Detection Policy for Wireless Sensor Networks , 2013 .

[3]  Gang Hu,et al.  Research and Improve on Secure Routing Protocols in Wireless Sensor Networks , 2008, 2008 4th IEEE International Conference on Circuits and Systems for Communications.

[4]  Iman Almomani,et al.  Performance analysis of LEACH protocol under Denial of Service attacks , 2015, 2015 6th International Conference on Information and Communication Systems (ICICS).

[5]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[6]  Biming Tian,et al.  Anomaly detection in wireless sensor networks: A survey , 2011, J. Netw. Comput. Appl..

[7]  Wendi Heinzelman,et al.  Energy-efficient communication protocol for wireless microsensor networks , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[8]  Anazida Zainal,et al.  A Survey of Intrusion Detection Schemes in Wireless Sensor Networks , 2012 .

[9]  Ian H. Witten,et al.  The WEKA data mining software: an update , 2009, SKDD.

[10]  Jalel Ben-Othman,et al.  Detecting DoS attacks in WSN based on clustering technique , 2013, 2013 IEEE Wireless Communications and Networking Conference (WCNC).

[11]  Hoon Oh,et al.  An Encryption Based Black Hole Detection Mechanism in Mobile Ad Hoc Networks , 2013 .

[12]  Neeraj Kumar,et al.  A systematic review on clustering and routing techniques based upon LEACH protocol for wireless sensor networks , 2013, J. Netw. Comput. Appl..

[13]  G. Padmavathi,et al.  A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks , 2009, ArXiv.

[14]  Abdulaziz Omar Alsadhan,et al.  A Proposed Optimized and Efficient Intrusion Detection System for Wireless Sensor Network , 2013 .

[15]  Kok-Keong Loo,et al.  Real-Time Cross-Layer Design: Real-time cross-layer design for a large-scale flood detection and attack trace-back mechanism in IEEE 802.11 wireless mesh networks , 2009 .

[16]  Anush Ananthakumar,et al.  Intrusion Detection System in Wireless Sensor Networks: A Review , 2015 .

[17]  Jaydip Sen,et al.  Security in Wireless Sensor Networks , 2013, ArXiv.

[18]  Rosli Salleh,et al.  Overview of Security Issues in Wireless Sensor Networks , 2011, 2011 Third International Conference on Computational Intelligence, Modelling & Simulation.

[19]  N. Marriwala,et al.  An approach to increase the wireless sensor network lifetime , 2012, 2012 World Congress on Information and Communication Technologies.

[20]  Valerio Formicola,et al.  Enhancing Intrusion Detection in Wireless Sensor Networks through Decision Trees , 2013, EWDC.

[21]  Azeddine Bilami,et al.  Hierarchical energy efficient intrusion detection system for black hole attacks in WSNs , 2013, 2013 World Congress on Computer and Information Technology (WCCIT).

[22]  Anantha P. Chandrakasan,et al.  An application-specific protocol architecture for wireless microsensor networks , 2002, IEEE Trans. Wirel. Commun..

[23]  Marco Zennaro,et al.  Successful deployment of a Wireless Sensor Network for precision agriculture in Malawi , 2012, NESEA.

[24]  Shafiullah Khan,et al.  Intrusion Detection Systems in Wireless Sensor Networks: A Review , 2013, Int. J. Distributed Sens. Networks.

[25]  Huafeng Liu,et al.  Cluster Number Variability Problem in LEACH , 2006, UIC.

[26]  Vijay Laxmi,et al.  Comparing the Impact of Black Hole and Gray Hole Attack on LEACH in WSN , 2013, ANT/SEIT.

[27]  Jian Ma,et al.  A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering , 2010, Expert Syst. Appl..

[28]  王淑卿,et al.  An Integrated Intrusion Detection System for Cluster-based Wireless Sensor Networks , 2011 .

[29]  Dilip Kumar,et al.  Performance analysis of energy efficient clustering protocols for maximising lifetime of wireless sensor networks , 2013, IET Wirel. Sens. Syst..

[30]  Ian H. Witten,et al.  WEKA - Experiences with a Java Open-Source Project , 2010, J. Mach. Learn. Res..

[31]  A. P. Renold,et al.  Performance analysis of LEACH with gray hole attack in Wireless Sensor Networks , 2012, 2012 International Conference on Computer Communication and Informatics.

[32]  Gerhard P. Hancke,et al.  Opportunities and Challenges of Wireless Sensor Networks in Smart Grid , 2010, IEEE Transactions on Industrial Electronics.

[33]  Ravi Sankar,et al.  A Survey of Intrusion Detection Systems in Wireless Sensor Networks , 2014, IEEE Communications Surveys & Tutorials.

[34]  Yiming Miao,et al.  Cluster-Head Election Algorithm for Wireless Sensor Networks Based on LEACH Protocol , 2015 .

[35]  Sandeep Waraich,et al.  A Comparative Study on LEACH Routing Protocol and Its Variants in Wireless Sensor Networks: A Survey , 2014 .

[36]  Aikaterini Mitrokotsa,et al.  Intrusion Detection Techniques in Sensor Networks , 2008 .

[37]  Krishan Kumar,et al.  Detection of HELLO flood attack on LEACH protocol , 2014, 2014 IEEE International Advance Computing Conference (IACC).

[38]  Hossein Jadidoleslamy,et al.  A High-level Architecture for Intrusion Detection on Heterogeneous Wireless Sensor Networks: Hierarchical, Scalable and Dynamic Reconfigurable , 2011, Wirel. Sens. Netw..

[39]  Ahmed Toumanari,et al.  Intrusion Detection Techniques in Wireless Sensor Network using Data Mining Algorithms: Comparative Evaluation Based on Attacks Detection , 2015 .

[40]  Said Ben Alla,et al.  Hierarchical Adaptive Balanced Routing Protocol for Energy Efficiency in Heterogeneous Wireless Sensor Networks , 2012 .

[41]  Peter Mell,et al.  NIST Special Publication on Intrusion Detection Systems , 2001 .