Abstract
Wireless Sensor Networks (WSNs) require an efficient intrusion detection scheme to identify malicious attackers. Traditional detection schemes are not well suited for WSNs due to their higher false detection rate. In this paper, we propose a novel intrusion detection scheme based on the energy prediction in cluster-based WSNs (EPIDS). The main contribution of EPIDS is to detect attackers by comparing the energy consumptions of sensor nodes. The sensor nodes with abnormal energy consumptions are identified as malicious attackers. Furthermore, EPIDS is designed to distinguish the types of denial of service (DoS) attack according to the energy consumption rate of the malicious nodes. The primary simulation experiments prove that EPIDS can detect and recognize malicious attacks effectively.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Wang, X., Vasilakos, A., Chen, M., Liu, Y., Kwon, T.: A Survey of Green Mobile Networks: Opportunities and Challenges. ACM/Springer Mobile Networks and Applications (2011)
Chen, M., Leung, V., Mao, S., Xiao, Y., Chlamtac, I.: Hybrid Geographical Routing for Flexible Energy-Delay Trade-Offs. IEEE Transactions on Vehicular Technology 58(9), 4976–4988 (2009)
Ssu, K.F., Wang, W.T., Chang, W.C.: Detecting Sybil attacks in Wireless Sensor Networks using neighboring information. Computer Networks 53, 3042–3056 (2009)
Mohi, M., Movaghar, A., Zadeh, P.M.: A Bayesian Game Approach for Preventing DoS Attacks in Wireless Sensor Networks. In: WRI International Conference on Communications and Mobile Computing, CMC 2009, vol. 3, pp. 507–511 (2009)
Krauß, C., Schneider, M., Eckert, C.: On handling insider attacks in wireless sensor networks. Information Security Technical Report 13(3), 165–172 (2008)
Wang, Y., Wang, X., Xie, B., Wang, D., Agrawal, D.P.: Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks. IEEE Trans. Mobile Computing 7, 698–711 (2008)
Khanum, S., Usman, M., Hussain, K., Zafar, R., Sher, M.: Energy-Efficient Intrusion Detection System for Wireless Sensor Network Based on MUSK Architecture. In: Zhang, W., Chen, Z., Douglas, C.C., Tong, W. (eds.) HPCA 2009. LNCS, vol. 5938, pp. 212–217. Springer, Heidelberg (2010)
Li, G., He, J.A., Fu, Y.G.: Group-based intrusion detection system in wireless sensor networks. Computer Communications 31(18), 4324–4332 (2008)
Su, W.T., Chang, K.M., Kuo, Y.H.: eHIP: An energy-efficient hybrid intrusion prohibition system for cluster-based wireless sensor networks. Computer Networks 51(4), 1151–1168 (2007)
Vullers, R.J.M., Schaijk, R.V., Visser, H.J., Penders, J.H.: Energy Harvesting for Autonomous Wireless Sensor Networks. IEEE Solid-State Circuits Magazine 2(2), 29–38 (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Shen, W., Han, G., Shu, L., Rodrigues, J.J.P.C., Chilamkurti, N. (2012). A New Energy Prediction Approach for Intrusion Detection in Cluster-Based Wireless Sensor Networks. In: Rodrigues, J.J.P.C., Zhou, L., Chen, M., Kailas, A. (eds) Green Communications and Networking. GreeNets 2011. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 51. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33368-2_1
Download citation
DOI: https://doi.org/10.1007/978-3-642-33368-2_1
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-33367-5
Online ISBN: 978-3-642-33368-2
eBook Packages: Computer ScienceComputer Science (R0)