Immunity-based intrusion detection for wireless sensor networks

Wireless sensor networks (WSNs) are vulnerable to various attacks since they are distributed in unattended environments and have limited energy, storage and computation abilities. Preventive approaches can be applied to protect WSNs from some kinds of attacks. However, preventive methods are not efficient on specific attacks. So it is necessary to develop some mechanisms for intrusion detection. Intrusion detection system (IDS) not only prevents adversaries from attacking the network, but also provides attackspsila features for improving the preventive algorithms. The traditional intrusion detection algorithms canpsilat be applied directly to WSNs due to their constraints of resources. According to the problems in the current intrusion detection systems, based on immunology, we propose a novel IDS which is distributed, robust, and adaptive. The simulation results indicate that the proposed IDS has high accuracy in attack detections.

[1]  Jianying Zhou,et al.  Applying intrusion detection systems to wireless sensor networks , 2006, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006..

[2]  Fabio A. González,et al.  An immunity-based technique to characterize intrusions in computer networks , 2002, IEEE Trans. Evol. Comput..

[3]  Yu-Chee Tseng,et al.  Wireless sensor networks , 2008 .

[4]  Stephanie Forrest,et al.  An immunological model of distributed detection and its application to computer security , 1999 .

[5]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[6]  Peter J. Bentley,et al.  The Human Immune System and Network Intrusion Detection , 1999 .

[7]  Yih-Chun Hu Packet Leashes : A Defense against Wormhole Attacks in Wireless Ad Hoc Networks , 2001 .

[8]  Stephanie Forrest,et al.  Coverage and Generalization in an Artificial Immune System , 2002, GECCO.

[9]  Alan F. Murray,et al.  International Joint Conference on Neural Networks , 1993 .

[10]  David E. Culler,et al.  TOSSIM: accurate and scalable simulation of entire TinyOS applications , 2003, SenSys '03.

[11]  Alan S. Perelson,et al.  Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.

[12]  Matt Welsh,et al.  Simulating the power consumption of large-scale sensor network applications , 2004, SenSys '04.

[13]  Antonio Alfredo Ferreira Loureiro,et al.  Decentralized intrusion detection in wireless sensor networks , 2005, Q2SWinet '05.

[14]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[15]  Paul Helman,et al.  An immunological approach to change detection: algorithms, analysis and implications , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[16]  Huirong Fu,et al.  Intrusion Detection System for Wireless Sensor Networks , 2008, Security and Management.