Skip to main content

Intrusion Detection Systems for Wireless Sensor Networks: A Survey

  • Conference paper

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 56))

Abstract

Wireless sensor networks (WSNs) are vulnerable to different types of security threats that can degrade the performance of the whole network; that might result in fatal problems like denial of service (DoS) attacks, routing attacks, Sybil attack etc. Key management protocols, authentication protocols and secure routing cannot provide security to WSNs for these types of attacks. Intrusion detection system (IDS) is a solution to this problem. It analyzes the network by collecting sufficient amount of data and detects abnormal behavior of sensor node(s). IDS based security mechanisms proposed for other network paradigms such as ad hoc networks, cannot directly be used in WSNs. Researchers have proposed various intrusion detection systems for wireless sensor networks during the last few years. We classify these approaches into three categories i.e. purely distributed, purely centralized and distributed-centralized. In this paper, we present a survey of these mechanisms. These schemes are further differentiated in the way they perform intrusion detection.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Akyildiz, I.F., Su, W., Sankarsubramaniam, Y., Cayirci, E.: A Survey on Sensor Networks. IEEE Communication Magazine, 102–114 (2002)

    Google Scholar 

  2. Roosta, T., Shieh, S.P., Sastry, S.: Taxonomy of Security Attacks in Sensor Networks and Countermeasures. In: Proc. of 1st IEEE Int. Conf. on System Integration and Reliability Improvements (2006)

    Google Scholar 

  3. Rajasegarar, S., Leckie, C., Palaniswami, M.: Anomaly Detection in WSNs. In: IEEE Wireless Comm., Security in Ad hoc and Sensor Networks, pp. 34–40 (2008)

    Google Scholar 

  4. Roman, R., Zhou, J., Lopez, J.: Applying Intrusion Detection Systems to WSNs. In: IEEE Consumer Communications and Networking Conference, vol. 1, pp. 640–644 (2006)

    Google Scholar 

  5. Krontiris, I., Dimitriou, T.: Towards Intrusion Detection in Wireless Sensor Networks. In: Proc. of 13th European Wireless Conference, Paris, France (2007)

    Google Scholar 

  6. Krontiris, I., Dimitriou, T., Giannetsos, T., Mpasoukos, M.: Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks. In: Kutyłowski, M., Cichoń, J., Kubiak, P. (eds.) ALGOSENSORS 2007. LNCS, vol. 4837, pp. 150–161. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  7. Loo, C.E., Ng, M.Y., Leckie, C., Palaniswami, M.: Intrusion Detection for Routing Attacks in Sensor Networks. International Journal of Distributed Sensor Networks 2(4), 313–332 (2006)

    Article  Google Scholar 

  8. Drozda, M., Schaust, S., Szczerbicka, H.: Is AIS Based Misbehavior Detection Suitable for Wireless Sensor Networks? In: Proc. of IEEE Wireless Communications and Networking Conference, Hong Kong, pp. 3130–3135 (2007)

    Google Scholar 

  9. Shaikh, R.A., Jameel, H., Auriol, B.J., Lee, S., Song, Y.J.: Trusting Anomaly and Intrusion Claims for Cooperative Distributed Intrusion Detection Schemes of WSNs. In: Proc. of International Symposium on Trust Computing, China, pp. 2038–2043 (2008)

    Google Scholar 

  10. Ahmed, K.R., Ahmed, K., Munir, S., Asad, A.: Abnormal Node Detection in WSN by Pair Based Approach using IDS Secure Routing Methodology. International Journal of Computer Science and Network Security 8(12), 339–342 (2008)

    Google Scholar 

  11. Gupta, S., Zheng, R., Cheng, A.M.K.: An Anomaly Detection System for Wireless Sensor Networks. In: Proc. of IEEE International Conference on Mobile Ad hoc and Sensor Systems, pp. 1–9 (2007)

    Google Scholar 

  12. Zhang, Q., Yu, T., Ning, P.: A Framework for Identifying Compromised Nodes in WSNs. ACM Transaction Information System Security 11(12) (2008)

    Google Scholar 

  13. Da Silva, A.P.R., Martins, M.H.T., Rocha, B.P.S., Loureiro, A.A.F., Ruiz, L.B., Wong, H.C.: Decentralized Intrusion Detection in WSNs. In: Proc. of the 1st ACM Int. workshop on Quality of service & security in wireless networks, Canada, pp. 16–23 (2005)

    Google Scholar 

  14. Phuong, T.V., Hung, L.X., Cho, S.J., Lee, Y.K., Lee, S.: An Anomaly Detection Algorithm for Detecting Attacks in WSNs. In: Mehrotra, S., Zeng, D.D., Chen, H., Thuraisingham, B., Wang, F.-Y. (eds.) ISI 2006. LNCS, vol. 3975, pp. 735–736. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Farooqi, A.H., Khan, F.A. (2009). Intrusion Detection Systems for Wireless Sensor Networks: A Survey. In: Ślęzak, D., Kim, Th., Chang, A.CC., Vasilakos, T., Li, M., Sakurai, K. (eds) Communication and Networking. FGCN 2009. Communications in Computer and Information Science, vol 56. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-10844-0_29

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-10844-0_29

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-10843-3

  • Online ISBN: 978-3-642-10844-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics