A Study of Intrusion Detection System in Wireless Sensor Network

  • Atul AgarwalEmail author
  • Narottam Chand Kaushal
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1122)


Wireless Sensor Networks are most widely used in networking because of their large application domain. These networks due to their nature and appealing features, like multihop wireless communication, deployment in a hostile unprotected environment, low installation cost, auto-configurable etc, are very prone to security. Sensors are small devices deployed in the unprotected region and are vulnerable to attacks. To collect information from the surroundings sensor node senses information and follows multi-hop communication and the data reaches to sink. In these networks, there is no monitoring of information flow, hence security is a big concern. To provide security in Wireless Sensor Network operations, all kinds of intrusions should be detected and appropriate action must be taken against them in order to ensure that there is no harm done to the sensor network. This paper presents a review of Intrusion Detection Systems in Wireless Sensor Networks. Out of several detection techniques, this paper focuses on signature-based, anomaly-based and hybrid-based techniques. Various detection models are examined based on certain parameters. This paper summarizes various Intrusion Detection algorithms with their features which are used in Wireless Sensor Networks.


Wireless sensor network Intrusion detection system Misuse-based Anomaly-based Hybrid-based 


  1. 1.
    Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Comput. Netw. 38(4), 393–422 (2002)CrossRefGoogle Scholar
  2. 2.
    Ping, Y., Xinghao, J., Yue, W., Ning, L.: Distributed intrusion detection for mobile ad hoc networks. J. Syst. Eng. Electron. 19(4), 851–859 (2008)CrossRefGoogle Scholar
  3. 3.
    Padmavathi, G., Shanmugapriya, M., et al.: A survey of attacks, security mechanisms and challenges in wireless sensor networks. arXiv preprint arXiv:0909.0576 (2009)
  4. 4.
    Fuchsberger, A.: Intrusion detection systems and intrusion prevention systems. Inf. Secur. Tech. Rep. 10(3), 134–139 (2005)CrossRefGoogle Scholar
  5. 5.
    Khan, S., Loo, J., Ud Din, Z.: Framework for intrusion detection in IEEE 802.11 wireless mesh networks. Int. Arab J. Inf. Technol. 7(4), 435–440 (2010)Google Scholar
  6. 6.
    Jha, S., Hassan, M.: Building agents for rule-based intrusion detection system. Comput. Commun. 25(15), 1366–1373 (2002)CrossRefGoogle Scholar
  7. 7.
    Xie, M., Han, S., Tian, B., Parvin, S.: Anomaly detection in wireless sensor networks: a survey. J. Netw. Comput. Appl. 34(4), 1302–1325 (2011)CrossRefGoogle Scholar
  8. 8.
    Sedjelmaci, H., Feham, M.: Novel hybrid intrusion detection system for clustered wireless sensor network. arXiv preprint arXiv:1108.2656 (2011)
  9. 9.
    Mehmood, A., Khanan, A., Umar, M.M., Abdullah, S., Ariffin, K.A.Z., Song, H.: Secure knowledge and cluster-based intrusion detection mechanism for smart wireless sensor networks. IEEE Access 6, 5688–5694 (2018)CrossRefGoogle Scholar
  10. 10.
    Yan, K.Q., Wang, S.C., Liu, C.W.: A hybrid intrusion detection system of cluster-based wireless sensor networks. In: Proceedings of the International MultiConference of Engineers and Computer Scientists, vol. 1, pp. 18–20 (2009)Google Scholar
  11. 11.
    Wang, S.-S., Yan, K.-Q., Wang, S.-C., Liu, C.-W.: An integrated intrusion detection system for cluster-based wireless sensor networks. Exp. Syst. Appl. 38(12), 15234–15243 (2011)CrossRefGoogle Scholar
  12. 12.
    Saeed, A., Ahmadinia, A., Javed, A., Larijani, H.: Random neural network based intelligent intrusion detection for wireless sensor networks. Procedia Comput. Sci. 80, 2372–2376 (2016)CrossRefGoogle Scholar
  13. 13.
    Jinhui, X., Yang, T., Feiyue, Y., Leina, P., Juan, X., Yao, H.: Intrusion detection system for hybrid dos attacks using energy trust in wireless sensor networks. Procedia Comput. Sci. 131, 1188–1195 (2018)CrossRefGoogle Scholar
  14. 14.
    Kalnoor, G., Agarkhed, J.: Detection of intruder using kmp pattern matching technique in wireless sensor networks. Procedia Comput. Sci. 125, 187–193 (2018)CrossRefGoogle Scholar
  15. 15.
    Jianjian, D., Yang, T., Feiyue, Y.: A novel intrusion detection system based on IABRBFSVM for wireless sensor networks. Procedia Comput. Sci. 131, 1113–1121 (2018)CrossRefGoogle Scholar
  16. 16.
    Jin, X., Liang, J., Tong, W., Lei, L., Li, Z.: Multi-agent trust-based intrusion detection scheme for wireless sensor networks. Comput. Electr. Eng. 59, 262–273 (2017)CrossRefGoogle Scholar
  17. 17.
    Eik Loo, C., Yong Ng, M., Leckie, C., Palaniswami, M.: Intrusion detection for routing attacks in sensor networks. Int. J. Distrib. Sens. Netw. 2(4), 313–332 (2006)CrossRefGoogle Scholar
  18. 18.
    Sedjelmaci, H., Senouci, S.M., Feham, M.: An efficient intrusion detection framework in cluster-based wireless sensor networks. Secur. Commun. Netw. 6(10), 1211–1224 (2013)Google Scholar
  19. 19.
    Meng, W., Li, W., Kwok, L.-F.: EFM: enhancing the performance of signature-based network intrusion detection systems using enhanced filter mechanism. Comput. Secur. 43, 189–204 (2014)CrossRefGoogle Scholar
  20. 20.
    Gowrison, G., Ramar, K., Muneeswaran, K., Revathi, T.: Minimal complexity attack classification intrusion detection system. Appl. Soft Comput. 13(2), 921–927 (2013)CrossRefGoogle Scholar

Copyright information

© The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.National Institute of Technology, HamirpurHamirpurIndia

Personalised recommendations