Evaluation of Intrusion Detection Schemes in Wireless Sensor Network (original) (raw)

A Review of Intrusion Detection System Schemes in Wireless. Sensor Network

2013

Wireless Sensor Network (WSN) comprises of several tiny devices, low-cost, low-power and sensor nodes. This node has distinctive nature unlike from other networks. It includes a huge amount of small sensing devices with some limitation in energy, computation, and communication capabilities. These sensing devices are designed for specific applications, and they interact directly with their physical environments. The applications of WSNs are abundant; many of them are even security critical such as military or security applications. However, strong security practice should be deployed to secure the network from various attacks. The prevention-based approach such as key cryptographic and authentication has been implemented to secure the network from malicious activities. Yet, these techniques will not secure the computer or network system from insider attacks which leads to extract some sensitive information. As the result, intrusion detection turns into a crucial second layer to protect and keep the network secure from any malicious attack. The aim of this paper to provide a detailed review about the characteristics and vulnerabilities of WSN. Alongside, we highlighted the use of IDS framework to protect the network security

Intrusion Detection Systems in Wireless Sensor Networks: A Review

International Journal of Distributed Sensor Networks, 2013

Wireless Sensor Networks (WSNs) consist of sensor nodes deployed in a manner to collect information about surrounding environment. Their distributed nature, multihop data forwarding, and open wireless medium are the factors that make WSNs highly vulnerable to security attacks at various levels. Intrusion Detection Systems (IDSs) can play an important role in detecting and preventing security attacks. This paper presents current Intrusion Detection Systems and some open research problems related to WSN security.

A survey of intrusion detection systems in wireless sensor networks

Wireless Sensor Networking is one of the most promising technologies that have applications ranging from health care to tactical military. Although Wireless Sensor Networks (WSNs) have appealing features (e.g., low installation cost, unattended network operation), due to the lack of a physical line of defense (i.e., there are no gateways or switches to monitor the information flow), the security of such networks is a big concern, especially for the applications where confidentiality has prime importance. Therefore, in order to operate WSNs in a secure way, any kind of intrusions should be detected before attackers can harm the network (i.e., sensor nodes) and/or information destination (i.e., data sink or base station). In this article, a survey of the state-of-the-art in Intrusion Detection Systems (IDSs) that are proposed for WSNs is presented. Firstly, detailed information about IDSs is provided. Secondly, a brief survey of IDSs proposed for Mobile Ad-Hoc Networks (MANETs) is presented and applicability of those systems to WSNs are discussed. Thirdly, IDSs proposed for WSNs are presented. This is followed by the analysis and comparison of each scheme along with their advantages and disadvantages. Finally, guidelines on IDSs that are potentially applicable to WSNs are provided. Our survey is concluded by highlighting open research issues in the field.

Comparison of Various Intrusion Detection Systems in Wireless Sensor Network

Wireless Sensor Network is one of the most important part in the field of Communication Technology because it costs less installation charges and has simple network operation. In present days, WSN is used widely in each of the important sector which requires confidentiality and security, hence WSN requires very advance security system. Basically Wireless Sensor Network system suffers from two types of attacks one is active and another is passive. When confidentiality is the most important aspect of any secured network, then it is better to detect intruder before it really harms the network. Therefore for operating a WSN in secure manner, many intrusion detection systems (IDS) were proposed. In this paper we are conducting the comparative study on IDS for wireless sensor networks with their advantages and disadvantages. We are also describing the future research issues and challenges along with their complexity.

A Survey on Intrusion Detection System in Wireless Sensor Networks

International Journal of Wireless Communications and Network Technologies

As wireless sensor networks continue to attract more attention, new ideas for applications are continually being developed, many of which involve consistent coverage of a given surveillance area. These networks are gaining importance in various applications like detecting temperature, pressure etc. but these systems are constrained by limited computational, memory and energy recourses. Security is one of the basic QoS requirements of wireless sensor networks, yet this problem has not been sufficiently explored. WSN are also vulnerable to various malicious attacks like sleep deprivation or battery drainage attack, cloning, jamming etc, when deployed in hostile terrain. So, security becomes an important factor when designing infrastructure and protocol of networks. Intrusion Detection is one of the methods of defending against these attacks. This paper presents a survey on various issues and security threats on WSN. This paper also discusses the recent trends in Intrusion Detection Systems along with implementation of IDS in WSN and comparative analysis of these schemes.

A Review on Intrusion Detection Schemes in Wireless Sensor Network

Modern wireless sensor networks require specific and high degree of security due to their limitation and versatility tasks. Their limited computational ability and battery resources restrictions make them vulnerable to many kinds of attacks. Little real-world data is available about the insider threat. This ―insider threat‖ has received considerable attention, and is cited as one of the most serious security problems. The goal of this paper is to provide a detailed review about different techniques available for detecting an intrusion along with their characteristics and advantages.

An Efficient Intrusion Detection Approach for Wireless Sensor Networks

American Journal of Electrical and Computer Engineering

Wireless Sensor Networks (WSNs) are vulnerable to various kinds of security attacks that can compromise many nodes and therefore the performance of the network may be degraded. Failures to prevent intrusions could also decrease the credibility of security services, e.g., data confidentiality, integrity, and availability. Traditional Intrusion Detection Systems (IDS) suffer from many issues in performance and increased overhead which are considered the main challenge in WSNs. The common architecture of WSN is that nodes are organized into a set of clusters; each one contains a set of nodes with a specialized node called Cluster Head (CH) node which is responsible for managing activities through the cluster and communicating with other nodes and a Base Station (BS). The CH plays a critical role in the case attacking WSN in the two cases; signature-based and anomaly-based. This paper proposes an efficient hybrid IDS to analyze and secure WSN in multiple phases because it combines the best features of two different approaches to achieve better performance. In the proposed approach, BS evaluates and updates attacks information for the entire network which is the main advantage where BS doesn't suffer from any limitations in sensor nodes. Moreover, BS selects CH among other nodes based on power capabilities and computational resources. The efficiency and adaptability of the proposed method have been tested by simulation experiments deployed on JiST/Swans simulation. The experimental results show that the proposed system is efficient with acceptable performance in comparison with other hybrid IDSs. The experimental evaluation also expresses that the proposed technique reduces the communication costs on the cluster head (CH) which improves the lifetime of the entire WSN.

Intrusion Detection and Security Mechanisms for Wireless Sensor Networks

International Journal of Distributed Sensor Networks, 2014

Wireless sensor networks are multihop, self-organizing, selfhealing, and distributed in nature. One of their main features is their energy consumptions, so many efforts are focused on power saving techniques. Wireless sensor networks are gaining significant interest from academia and industry and the number of real deployments of wireless sensor networks (WSN) is increasing considerably in the last years. Their intrinsic characteristics make them very vulnerable to external intrusion. Thus, the security has become one of the main issues to study in WSNs. Their ad hoc network nature also increases their vulnerability and exposes sensor nodes to various kinds of security attacks. There is a clear need for new security techniques to guarantee the information transmitted through the WSN. Last research tendencies are focused on including security in the routing protocol, providing security for communication inside groups of nodes and when exchanging data between groups. One of the most efficient techniques to detect an intruder in the network is the use of traffic analysis for detecting anomalies and finding correlated events. Advanced security mechanisms and intrusion detection systems (IDSs) can play an important role in detecting and preventing security attacks in WSNs.

A Review of Security Attacks and Intrusion Detection Schemes in Wireless Sensor Network

International Journal of Wireless & Mobile Networks, 2013

Wireless sensor networks are currently the greatest innovation in the field of telecommunications. WSNs have a wide range of potential applications, including security and surveillance, control, actuation and maintenance of complex systems and fine-grain monitoring of indoor and outdoor environments. However security is one of the major aspects of Wireless sensor networks due to the resource limitations of sensor nodes. Those networks are facing several threats that affect their functioning and their life. In this paper we present security attacks in wireless sensor networks, and we focus on comparison and analysis of recent Intrusion Detection schemes in WSNs.