Abstract
Security of Wireless sensor network (WSN) becomes a very important issue with the rapid development of WSN that is vulnerable to a wide range of attacks due to deployment in the hostile environment and having limited resources.Intrusion detection system is one of the major and efficient defensive methods against attacks in WSN. A particularly devastating attack is the sleep deprivation attack, where a malicious node forces legitimate nodes to waste their energy by resisting the sensor nodes from going into low power sleep mode. The goal of this attack is to maximize the power consumption of the target node, thereby decreasing its battery life. Existing works on sleep deprivation attack have mainly focused on mitigation using MAC based protocols, such as S-MAC, T-MAC, B-MAC, etc. In this article, a brief review of some of the recent intrusion detection systems in wireless sensor network environment is presented. Finally, we propose a framework of cluster based layered countermeasure that can efficiently mitigate sleep deprivation attack in WSN. Simulation results on MATLAB exhibit the effectiveness of the proposed model in detecting sleep-deprivation attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Mao, Y.: A Semantic-based Intrusion Detection Framework for Wireless Sensor Network. In: 6th International Conference on Networked Computing (INC), Gyeongju, Korea, South (2010)
Misra, S., Venkata Krishna, P., Abraham, K.I.: Energy Efficient Learning Solution for Intrusion Detection in Wireless Sensor Networks. In: Proceedings of the 2nd international conference on Communication systems and Networks COMSNETS 2010 (2010)
Crosby, G.V., Hester, L., Pissinou, N.: Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks. International Journal of Network Security 12(2), 107–117 (2011)
Chen, R.-C., Hsieh, C.-F., Huang, Y.-F.: An Isolation Intrusion Detection System for Hierarchical Wireless Sensor Network. Journal of Networks 5(3) (March 2010)
Chen, R.-C., Huang, Y.-F., Hsieh, C.-F.: Ranger Intrusion Detection System for Wireless Sensor Networks with Sybil Attack Based on Ontology. New Aspects of Applied Informatics, Biomedical Electronics and Informatics and Communications (2010)
Mamun, M.S.I., Sultanul Kabir, A.F.M.: Hierarchical Design Based Intrusion Detection System For Wireless Ad Hoc Sensor Network. International Journal of Network Security & Its Applications (IJNSA)Â 2(3) (July 2010)
Yan, K.Q., Wang, S.C., Liu, C.W.: A Hybrid Intrusion Detection System of Cluster-based Wireless Sensor Networks. In: Proceedings of the International MultiConference of Engineers and Computer Scientists, IMECS 2009, Hong Kong, March 18 - 20, vol. I (2009)
Atakli, I.M., Hu, H., Chen, Y., Ku, W.-S., Su, Z.: Malicious Node Detection in Wireless Sensor Networks using Weighted Trust Evaluation. In: The Symposium on Simulation of Systems Security (SSSS 2008), Ottawa, Canada, April 14 –17 (2008)
Huo, G., Wang, X.: DIDS: A Dynamic Model of Intrusion Detection System in Wireless Sensor Networks. In: IEEE, International Conference on Information and Automation, Zhangjiajie, China, June 20 –23 (2008)
Techateerawat, P., Jennings, A.: Energy Efficiency of Intrusion Detection Systems in Wireless Sensor Networks. In: IEEE WIC 2006 (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bhattasali, T., Chaki, R. (2011). A Survey of Recent Intrusion Detection Systems for Wireless Sensor Network. In: Wyld, D.C., Wozniak, M., Chaki, N., Meghanathan, N., Nagamalai, D. (eds) Advances in Network Security and Applications. CNSA 2011. Communications in Computer and Information Science, vol 196. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22540-6_27
Download citation
DOI: https://doi.org/10.1007/978-3-642-22540-6_27
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22539-0
Online ISBN: 978-3-642-22540-6
eBook Packages: Computer ScienceComputer Science (R0)