Abstract
Wireless sensor networks come with some very challenging demands for security – they often call for protection against active attackers trying to disrupt a network operation, but also against passive attackers looking for (potentially) sensitive information about the location of a certain node or about the movement of a tracked object. Selective forwarding is a basic yet powerful active attack. It can be detected using several existing techniques if enough information is available to an intrusion detection system. Yet when the system lacks the information due to a location privacy measure, selective forwarding detection becomes complicated. In this paper, we propose a method for detecting selective forwarding attacks and packet modification attacks concurrently with supporting location privacy. The resulting system counters a global eavesdropper capable of some active actions, such as dropping and modification of packets. We also evaluate detection accuracy of the proposed method on a small scale real-world sensor network.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
da Silva, A.P.R., Martins, M.H.T., Rocha, B.P.S., Loureiro, A.A.F., Ruiz, L.B., Wong, H.C.: Decentralized intrusion detection in wireless sensor networks. In: Proceedings of the 1st ACM International Workshop on Quality of Service & Security in Wireless and Mobile Networks, Q2SWinet 2005, pp. 16–23. ACM, New York (2005)
Deng, J., Han, R., Mishra, S.: INSENS: Intrusion-tolerant routing for wireless sensor networks. Computer Communications 29(2), 216–230 (2006)
Hai, T.H., Huh, E.-N.: Detecting selective forwarding attacks in wireless sensor networks using two-hops neighbor knowledge. In: Proceedings of the Seventh IEEE International Symposium on Network Computing and Applications, NCA 2008, pp. 325–331 (2008)
Kaplantzis, S., Shilton, A., Mani, N., Sekercioglu, Y.A.: Detecting selective forwarding attacks in wireless sensor networks using support vector machines. In: Proceedings of the 3rd International Conference on Intelligent Sensors, Sensor Networks and Information, ISSNIP 2007, pp. 335–340 (2007)
Khan, W.Z., Xiang, Y., Aalsalem, M.Y., Arshad, Q.: Comprehensive study of selective forwarding attack in wireless sensor networks. IJCNIS 3(1), 1–10 (2011)
Krontiris, I., Dimitriou, T., Freiling, F.C.: Towards intrusion detection in wireless sensor networks. In: Proceedings of the 13th European Wireless Conference (2007)
Kůr, J., Matyáš, V., Stetsko, A., Švenda, P.: Attack detection vs. privacy – how to find the link or how to hide it? In: Christianson, B., Crispo, B., Malcolm, J., Stajano, F. (eds.) Security Protocols 2011. LNCS, vol. 7114, pp. 189–199. Springer, Heidelberg (2011)
Mehta, K., Liu, D., Wright, M.: Location privacy in sensor networks against a global eavesdropper. In: IEEE International Conference on Network Protocols, ICNP 2007, pp. 314–323 (October 2007)
Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: SPINS: Security protocols for sensor networks. Wireless networks 8(5), 521–534 (2002)
Polastre, J., Szewczyk, R., Culler, D.: Telos: Enabling ultra-low power wireless research. In: Fourth International Symposium on Information Processing in Sensor Networks, IPSN 2005, pp. 364–369 (2005)
Roman, R., Zhou, J., Lopez, J.: Applying intrusion detection systems to wireless sensor networks. In: Proceedings of the 3rd IEEE Consumer Communications and Networking Conference, CCNC 2006, vol. 1, pp. 640–644 (2006)
Stetsko, A., Folkman, L., Matyáš, V.: Neighbor-based intrusion detection for wireless sensor networks. In: Proceedings of the 6th International Conference on Wireless and Mobile Communications, ICWMC 2010, pp. 420–425 (2010)
Wang, G., Zhang, W., Kim, J., Feng, T., Wang, C.: Catching packet droppers and modifiers in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems 23(5), 835–843 (2012)
Yu, B., Xiao, B.: Detecting selective forwarding attacks in wireless sensor networks. In: Proceedings of the 20th International Parallel and Distributed Processing Symposium, IPDPS 2006, pp. 1–8 (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Kůr, J., Matyáš, V. (2014). A Protocol for Intrusion Detection in Location Privacy-Aware Wireless Sensor Networks. In: Eckert, C., Katsikas, S.K., Pernul, G. (eds) Trust, Privacy, and Security in Digital Business. TrustBus 2014. Lecture Notes in Computer Science, vol 8647. Springer, Cham. https://doi.org/10.1007/978-3-319-09770-1_16
Download citation
DOI: https://doi.org/10.1007/978-3-319-09770-1_16
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-09769-5
Online ISBN: 978-3-319-09770-1
eBook Packages: Computer ScienceComputer Science (R0)