FOR WIRELESS SENSOR NETWORK

The wireless sensor networks (WSN) are particularly vulnerable to various attacks at different layers of the protocol stack. Many intrusion detection system (IDS) have been proposed to secure WSNs. But all these systems operate in a single layer of the OSI model, or do not consider the interaction and collaboration between these layers. Consequently these systems are mostly inefficient and would drain out the WSN. In this paper we propose a new intrusion detection system based on cross layer interaction between the network, Mac and physical layers. Indeed we have addressed the problem of intrusion detection in a different way in which the concept of cross layer is widely used leading to the birth of a new type of IDS. We have experimentally evaluated our system using the NS simulator to demonstrate its effectiveness in detecting different types of attacks at multiple layers of the OSI model.

[1]  Huirong Fu,et al.  Intrusion Detection System for Wireless Sensor Networks , 2008, Security and Management.

[2]  Tassos Dimitriou,et al.  Wormholes No More? Localized Wormhole Detection and Prevention in Wireless Networks , 2010, DCOSS.

[3]  Ayman Khalil,et al.  Cross-Layer Resource Allocation Scheme Under Heterogeneous Constraints for Next Generation High Rate WPAN , 2010, ArXiv.

[4]  Felix C. Freiling,et al.  Cooperative Intrusion Detection in Wireless Sensor Networks , 2009, EWSN.

[5]  Jeffrey J. P. Tsai,et al.  A Framework of Machine Learning Based Intrusion Detection for Wireless Sensor Networks , 2008, 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (sutc 2008).

[6]  Luigi Coppolino,et al.  Open Issues in IDS Design for Wireless Biomedical Sensor Networks , 2010 .

[7]  Tassos Dimitriou,et al.  Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks , 2007, ALGOSENSORS.

[8]  J. Meigs,et al.  WHO Technical Report , 1954, The Yale Journal of Biology and Medicine.

[9]  Marc Dacier,et al.  Intrusion detection , 1999, Comput. Networks.

[10]  Eui-nam Huh,et al.  A lightweight intrusion detection framework for wireless sensor networks , 2010, Wirel. Commun. Mob. Comput..

[11]  Yau-Hwang Kuo,et al.  The new intrusion prevention and detection approaches for clustering-based sensor networks [wireless sensor networks] , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[12]  Fang Liu,et al.  Insider Attacker Detection in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[13]  Deborah Estrin,et al.  An energy-efficient MAC protocol for wireless sensor networks , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.

[14]  Michael R. Lyu,et al.  On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Communications.

[15]  Jun Zheng,et al.  Wireless Sensor Networks: A Networking Perspective , 2009 .

[16]  J. Giedt,et al.  Rensselaer Polytechnic Institute , 1960, Nature.

[17]  Azeddine Bilami,et al.  HEEP (Hybrid Energy Efficiency Protocol) based on chain clustering , 2011, Int. J. Sens. Networks.

[18]  Mingbo Xiao,et al.  Cross-Layer Design for the Security of Wireless Sensor Networks , 2006, 2006 6th World Congress on Intelligent Control and Automation.

[19]  Yau-Hwang Kuo,et al.  eHIP: An energy-efficient hybrid intrusion prohibition system for cluster-based wireless sensor networks , 2007, Comput. Networks.

[20]  A. Field Communications , 1963, The Journal of Asian Studies.

[21]  Antonio Alfredo Ferreira Loureiro,et al.  Decentralized intrusion detection in wireless sensor networks , 2005, Q2SWinet '05.

[22]  Yoram Singer,et al.  A simple, fast, and effective rule learner , 1999, AAAI 1999.

[23]  Ajay Gupta,et al.  Anomaly intrusion detection in wireless sensor networks , 2006, J. High Speed Networks.

[24]  Yunghsiang Sam Han,et al.  A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.

[25]  F. Freiling,et al.  Towards Intrusion Detection in Wireless Sensor Networks , 2007 .

[26]  Srdjan Capkun,et al.  Secure time synchronization service for sensor networks , 2005, WiSe '05.

[27]  Felix C. Freiling,et al.  Towards an Intrusion Detection System in Wireless Sensor Networks , 2007 .

[28]  Deborah Estrin,et al.  Medium access control with coordinated adaptive sleeping for wireless sensor networks , 2004, IEEE/ACM Transactions on Networking.

[29]  Marimuthu Palaniswami,et al.  Intrusion Detection for Routing Attacks in Sensor Networks , 2006, Int. J. Distributed Sens. Networks.

[30]  Tassos Dimitriou,et al.  Secure In-Network Processing in Sensor Networks , 2005 .