A PCA-based distributed approach for intrusion detection in wireless sensor networks

Wireless sensor networks (WSNs) are applied to various applications, ranging from military to civilian fields. Due to the critical nature of such applications, security issues are of significant importance. WSNs are vulnerable to different types of attacks since they are often deployed in hostile and unprotected environments. In this paper, we present a novel distributed intrusion detection approach, called PCADID, for detecting routing attacks in WSNs. In the approach, we partition a WSN into groups of sensor nodes. In each group, some nodes are selected as monitor nodes, which cooperate with each other to compose a global normal profile. Every monitor node establishes a subprofile of its own normal network traffic using principal component analysis (PCA) and sends it to other monitor nodes. Every monitor node composes the global normal profile based upon all received subprofiles and uses it to detect anomalies in its own network traffic. As the normal network behavior changes over time, the global normal profile is updated. We demonstrate that PCADID achieves a high detection rate with a low false alarm rate, while minimizes the communication overhead and energy consumption in the network.

[1]  Mahdi Abadi,et al.  Distributed PCA-based anomaly detection in wireless sensor networks , 2010, 2010 International Conference for Internet Technology and Secured Transactions.

[2]  Jingsha He,et al.  Group-based intrusion detection system in wireless sensor networks , 2008, Comput. Commun..

[3]  Mahdi Abadi,et al.  An energy-efficient anomaly detection approach for wireless sensor networks , 2010, 2010 5th International Symposium on Telecommunications.

[4]  Anupam Joshi,et al.  Security in Sensor Networks , 2020, Texts in Computer Science.

[5]  Nei Kato,et al.  A Dynamic Anomaly Detection Scheme for AODV-Based Mobile Ad Hoc Networks , 2009, IEEE Transactions on Vehicular Technology.

[6]  Gene H. Golub,et al.  Matrix computations , 1983 .

[7]  Chee-Yee Chong,et al.  Sensor networks: evolution, opportunities, and challenges , 2003, Proc. IEEE.

[8]  Ian T. Downard,et al.  Simulating Sensor Networks in NS-2 , 2004 .

[9]  Marimuthu Palaniswami,et al.  Intrusion Detection for Routing Attacks in Sensor Networks , 2006, Int. J. Distributed Sens. Networks.

[10]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[11]  Yau-Hwang Kuo,et al.  eHIP: An energy-efficient hybrid intrusion prohibition system for cluster-based wireless sensor networks , 2007, Comput. Networks.

[12]  Gene H. Golub,et al.  Matrix Computations, Third Edition , 1996 .

[13]  Chunhui Zhao,et al.  A Detection Method for Routing Attacks of Wireless Sensor Network Based on Fuzzy C-means Clustering , 2009, 2009 Sixth International Conference on Fuzzy Systems and Knowledge Discovery.

[14]  Ian T. Jolliffe,et al.  Principal Component Analysis , 2002, International Encyclopedia of Statistical Science.

[15]  Martina Zitterbart,et al.  Security in Sensor Networks , 2010, it Inf. Technol..

[16]  Rekha Jain,et al.  Wireless Sensor Network -A Survey , 2013 .