Skip to main content

An Efficient Intrusion Detection Scheme for Wireless Sensor Networks

  • Conference paper
Secure and Trust Computing, Data Management, and Applications (STA 2011)

Abstract

As a hot issue, wireless sensor network have gained widely attention. WSNs in general and in nature are unattended and physically reachable from the outside world, they could be vulnerable to physical attacks in the form of node capture or node destruction. These forms of attacks are hard to protect against and require intelligent prevention methods. It is necessary for WSNs to have security measures in place as to prevent an intruder from inserting compromised nodes in order to decimate or disturb the network performance. In this paper we present an intrusion detection algorithm for wireless sensor networks which does not require prior knowledge of network behavior or a learning period in order to establish this knowledge. We have taken a more practical approach and constructed this algorithm with small to middle-size networks in mind, like home or office networks. The proposed algorithm is also dynamic in nature as to cope with new and unknown attack types. This algorithm is intended to protect the network and ensure reliable and accurate aggregated sensor readings. Theoretical simulation results in three different scenarios indicate that compromised nodes can be detected with high accuracy and low false alarm probability.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Maronna, R.A., Martin, R.D., Yohai, V.J.: Robust Statistics: Theory and Methods, vol. ch. 6.9.1, pp. 205–208. Wiley Publisher, Chichester (2006)

    Book  MATH  Google Scholar 

  2. Hussain, S., Mohamed, M.A., Holder, R., Almasri, A., Shukur, G.: Performance evaluation based on the robust mahluationbis distance and multilevel modelling using two new strategies (February 2008)

    Google Scholar 

  3. Filzmoser, P.: A multiivariate outlier detection method

    Google Scholar 

  4. Alberts, P., Kuhn, M.: Security in ad hoc networks: A general intrusion detection architecture enhancing trust based approaches. In: First International Workshop on Wireless Information Systems, 4th International Conference on Enterprise Information Systems (2002)

    Google Scholar 

  5. Liu, F., Cheng, X., Chen, D.: Insider Attacker Detection in Wirelss Sensor Networks. In: IEEE Proceedings INFOCOM 2007 (2007)

    Google Scholar 

  6. Alqallaf, F.A., Konis, K.P., Douglas Martin, R., Zamar, R.H.: Scalable robust covariance and correlation estimates for data mining. In: ACM SIGKDD 2002, Edmonton, Alberta, Canada, pp. 14–23 (2002)

    Google Scholar 

  7. Ngai E.C.H.: Intrusion Detection for Wireless Sensor Networks. Ph.D. – Term 2 Paper (2005)

    Google Scholar 

  8. Sarma, H.K.D., Manipal, S., Kar, A.: Security Threats in Wireless Sensor Networks (2006)

    Google Scholar 

  9. Newsome, J., Shi, E., Song, D., Perrig, A.: The Sybil Attack in Sensor Networks: Analysis & Defenses (2004)

    Google Scholar 

  10. Staniford-Chen, S., Cheng, S., Crawford, R., Dilger, M.: GRIDS – A Graph Based Intrusion Detection System for Large Networks. In: The 19th National Information Systems Security Conference (1996)

    Google Scholar 

  11. Brutch, P., Ko, C.: Challenges in intrusion detection for wireless sensor networks. In: Proceedings 2003 Symposium on Applications and the Internet Workshops, pp. 368–373 (2003)

    Google Scholar 

  12. Lancaster, H.O.: The chi-squared distribution. Wiley, Chichester (1969)

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Rong, C., Eggen, S., Cheng, H. (2011). An Efficient Intrusion Detection Scheme for Wireless Sensor Networks. In: Lee, C., Seigneur, JM., Park, J.J., Wagner, R.R. (eds) Secure and Trust Computing, Data Management, and Applications. STA 2011. Communications in Computer and Information Science, vol 187. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22365-5_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22365-5_15

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22364-8

  • Online ISBN: 978-3-642-22365-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics