Skip to main content

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 258))

Abstract

Wireless sensor networks (WSNs) are one of the emerging network fields, with a tremendous prospect to research and contributing itself in a vast arena of applications. In any sort of network, the utmost priority is given to its security feature, since any means of communication demands the need of securing and safe guarding the sensitive data from the adversary. Even WSNs are also susceptible to any offenders attacks. In this paper, an attempt is made to design an perpetual proactive security scheme at the sink node using sniffing mechanism of intrusion detection system by studying the behavioral aspect of the sensor nodes due to attack and to monitor the system with an rescue mechanism.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Shetty S, Song, M, Ancel RAE, Bone K (2007) Wireless sensor payload design for sounding rocket. In: 22nd international conference on computers and their applications, March 2007

    Google Scholar 

  2. Culler D, Estrin D, Srivastava M (2004) Overview of sensor networks. IEEE Computer Society, Washington DC

    Google Scholar 

  3. Akylidiz I, Su, W, Sankarasubramaniam Y, Cayrici E (2002) A survey on sensor networks. IEEE Commun Mag 40(8):102–114

    Google Scholar 

  4. Singh R, Singh DK, Kumar L (2010) A review on security issues in wireless sensor network. J Inf Syst Commun 1(1):01–07

    Google Scholar 

  5. Ramen R, Lopez J, Gritzalis S (2008) Situation awareness mechanisms for wireless sensor networks. IEEE Commun Mag 46(4):102–107

    Article  Google Scholar 

  6. Khanna R, Lin H (2008) Control theoretic approach to intrusion detection using distributed hidden Markov model. IEEE Wirel Commun 15(4):24–33

    Article  Google Scholar 

  7. Kachirski O, Guha RK (2003) Effective intrusion detection using multiple sensors in wireless ad hoc networks. In: Proceeding of the 36th annual Hawaii international conference on system sciences, Hawaii, USA, Jan 2003, pp 57–64

    Google Scholar 

  8. Chan SP, Poovendran R, Sun MT (2005) A key Management Scheme in: Distributed Sensor Networks Using Attack Probabilities. Proc IEEE GLOBECOM 2:1007–1011

    Google Scholar 

  9. Rajasegarar S, Leckie C, Palansiwami M (2008) Anomaly detection in wireless sensor networks. IEEE Wirel Commun 15(4):34–40

    Article  Google Scholar 

  10. Kakasageri MS, Manvi SS, Sorgavi GD (2006) Agent-based information access in wireless sensor networks. WSEAS Trans Commun 3(7):1369–1374

    Google Scholar 

  11. Cardei M, Wu J (2006) Energy-efficient coverage problems in wireless Ad-Hoc sensor networks. Comput Commun 29(4):413–420

    Article  Google Scholar 

  12. Du X, Chen H-H (2008) Security in wireless sensor networks. IEEE Wirel Commun 15(4):60–66

    Article  MathSciNet  Google Scholar 

  13. Wang X, Gu W, Schosek K, Chellappan S, Xuan D (2005) Lifetime optimization of sensor networks under physical attacks. In: Proceedings of IEEE international conference on communications (ICC), May 2005, pp 32953301

    Google Scholar 

  14. Abrach H, Bhatti S, et.al (2003) MANTIS: System support for multimodal networks of in-situ sensors. In: 2nd ACM international workshop on wireless sensor networks and applications, pp 50–59

    Google Scholar 

  15. Blaze M, Feigenbaum J, Ioannidis J, Keromytis AD (1999) The key note trust management system version 2. Internet RFC 2704, Sept 1999

    Google Scholar 

  16. Christodorescu M, Jha S, Seshia S, Song D, Bryant R (2005) Semantics aware malware detection. In Proceedings of IEEE symposium on security and privacy, Oakland, May 2005

    Google Scholar 

  17. Christodorescu M, Jha S (2003) Static analysis of executables to detect malicious patterns. In: Proceedings of the 12th USENIX security symposium (Security 03), USENIX Association, Aug 2003, pp 169–186

    Google Scholar 

  18. Kruegel C, Robertson W, Vigna G (2004) Detecting kernel level root kits though binary analysis. In: Proceedings of the 20th annual computer security applications conference (ACSAC 04), Tucson, AZ, Dec 2004

    Google Scholar 

  19. Resnick P, Zeckhauser R (2000) Trust among strangers in internet transactions: empirical analysis of eBays reputation system. In: Proceedings of NBER workshop on empirical studies of electronic commerce, 2000

    Google Scholar 

  20. Chen H, Wagner D (2002) MOPS: an infrastructure for examining security properties of software. In: Proceedings of the 9th ACM conference on computer and communications security, Nov 2002, pp 235–244

    Google Scholar 

  21. Michiardi JP, Molva R (2002) Core: a collaborative reputation mechanism to enforce node cooperation in mobile Ad Hoc networks. In: IFIP communication and multimedia security conference

    Google Scholar 

  22. Marti S, Giuli TJ, Lai K, Baker M (2000) Mitigating routing misbehavior in mobile ad hoc networks. In: 6th ACM international conference on mobile computing and networking, Aug 2000, pp 255–265

    Google Scholar 

Download references

Acknowledgments

The authors wish to thank Visvesvaraya Technological University (VTU), Karnataka, India, for funding the part of the project under VTU Research Scheme (Grant No.VTU/Aca./2011-12/A-9/753, Dated: May 5, 2012.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Anusha Anigol .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer India

About this paper

Cite this paper

Anigol, A., Ahmed, R., Biradar, R.C. (2013). Design of Security Schemes for Wireless Sensor Networks Based on Attack Behavior: Proactive Approach. In: Chakravarthi, V., Shirur, Y., Prasad, R. (eds) Proceedings of International Conference on VLSI, Communication, Advanced Devices, Signals & Systems and Networking (VCASAN-2013). Lecture Notes in Electrical Engineering, vol 258. Springer, India. https://doi.org/10.1007/978-81-322-1524-0_50

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-1524-0_50

  • Published:

  • Publisher Name: Springer, India

  • Print ISBN: 978-81-322-1523-3

  • Online ISBN: 978-81-322-1524-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics