Abstract
Wireless Sensor Network (WSN) is usually deployed in hostile and uncontrollable environment. The WSN is vulnerable to security threats due to its hostile nature. There are several static security techniques in order to make WSN secure. These techniques are encryption keys, VPN, firewalls etc. All these techniques provide security from external threats. Additionally, these techniques do not provide strong security mechanism because of limited energy resources of WSN. There is a need of dynamic, real time and energy-efficient security mechanism for WSN. The existing real time security mechanisms are energy and time consuming. We have proposed a dynamic, real time and energy efficient Intrusion Detection System (IDS). Our proposed approach minimizes the security control messages and eliminates the need to update the signatures manually.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Kalantzis, S.: Security Models for Wireless Sensor Networks (2006)
Alemdar, A., Ibnkahla, M.: Wireless Sensor Networks: Applications and Chalenges. IEEE, Los Alamitos (2007)
Sun, B., Osborne, L.: Intrusion Detection Techniques In Mobile Ad Hoc And Wireless Sensor networks, The University of Alabama Sghaier Guizani, University of Quebec at Trois-Rivieres
Chen, R.-C., Hsieh, C.-F., Huang, Y.-F.: A New Method for Intrusion Detection on Hierarchical Wireless Sensor Networks. ACM, New York (2009)
Huai-bin, W., Zheng, Y., Chun-dong, W.: International Conference on Communications and Mobile Computing Intrusion Detection for Wireless Sensor Networks Based on Multi-Agent and Refined Clustering. In: IEEE International Conference on Communications and Mobile Computing (2009)
Ngai, E., Liu, J., Lyu, M.: On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks. In: IEEE International Conference on Communications, ICC 2006 (2006)
Ioannis, K., Dimitriou, T., Freiling, F.: Towards Intrusion Detection in Wireless Sensor Networks. In: 13th European Wireless Conference (2007)
Ren, Q., Liang, Q.: Secure Media Access Control (MAC) in wireless sensor networks: intrusion Detections and Countermeasures. In: 15th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (2004)
Lewis, F., Cook, D.J., Das, S.K., John, W.: Wireless Sensor Networks Smart Environments Technologies (2004)
Wei, Y., Paul, L., Havinga, J.M.: How to Secure a Wireless Sensor Network. In: ISSNIP. IEEE, Los Alamitos (2005)
Yu, Z.: A Framework of Machine Learning Based Intrusion Detection for Wireless Sensor Networks. In: International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing. IEEE, Los Alamitos (2008)
Kuldeep, K., Sharma Ghose, M.K.: Wireless Sensor Networks Security: A New Approach, Computer Science and Engineering Department, Sikkim Manipal Institute of Technology, India
Hai, T.H., Huh, E.-N.: Minimizing the Intrusion Detection Modules in Wireless Sensor Networks. IEEE, Los Alamitos (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Khanum, S., Usman, M., Hussain, K., Zafar, R., Sher, M. (2010). Energy-Efficient Intrusion Detection System for Wireless Sensor Network Based on MUSK Architecture. In: Zhang, W., Chen, Z., Douglas, C.C., Tong, W. (eds) High Performance Computing and Applications. Lecture Notes in Computer Science, vol 5938. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-11842-5_28
Download citation
DOI: https://doi.org/10.1007/978-3-642-11842-5_28
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-11841-8
Online ISBN: 978-3-642-11842-5
eBook Packages: Computer ScienceComputer Science (R0)