Abstract
Wireless sensor networks (WSNs) are one of the emerging network fields, with a tremendous prospect to research and contributing itself in a vast arena of applications. In any sort of network, the utmost priority is given to its security feature, since any means of communication demands the need of securing and safe guarding the sensitive data from the adversary. Even WSNs are also susceptible to any offenders attacks. In this paper, an attempt is made to design an perpetual proactive security scheme at the sink node using sniffing mechanism of intrusion detection system by studying the behavioral aspect of the sensor nodes due to attack and to monitor the system with an rescue mechanism.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Shetty S, Song, M, Ancel RAE, Bone K (2007) Wireless sensor payload design for sounding rocket. In: 22nd international conference on computers and their applications, March 2007
Culler D, Estrin D, Srivastava M (2004) Overview of sensor networks. IEEE Computer Society, Washington DC
Akylidiz I, Su, W, Sankarasubramaniam Y, Cayrici E (2002) A survey on sensor networks. IEEE Commun Mag 40(8):102–114
Singh R, Singh DK, Kumar L (2010) A review on security issues in wireless sensor network. J Inf Syst Commun 1(1):01–07
Ramen R, Lopez J, Gritzalis S (2008) Situation awareness mechanisms for wireless sensor networks. IEEE Commun Mag 46(4):102–107
Khanna R, Lin H (2008) Control theoretic approach to intrusion detection using distributed hidden Markov model. IEEE Wirel Commun 15(4):24–33
Kachirski O, Guha RK (2003) Effective intrusion detection using multiple sensors in wireless ad hoc networks. In: Proceeding of the 36th annual Hawaii international conference on system sciences, Hawaii, USA, Jan 2003, pp 57–64
Chan SP, Poovendran R, Sun MT (2005) A key Management Scheme in: Distributed Sensor Networks Using Attack Probabilities. Proc IEEE GLOBECOM 2:1007–1011
Rajasegarar S, Leckie C, Palansiwami M (2008) Anomaly detection in wireless sensor networks. IEEE Wirel Commun 15(4):34–40
Kakasageri MS, Manvi SS, Sorgavi GD (2006) Agent-based information access in wireless sensor networks. WSEAS Trans Commun 3(7):1369–1374
Cardei M, Wu J (2006) Energy-efficient coverage problems in wireless Ad-Hoc sensor networks. Comput Commun 29(4):413–420
Du X, Chen H-H (2008) Security in wireless sensor networks. IEEE Wirel Commun 15(4):60–66
Wang X, Gu W, Schosek K, Chellappan S, Xuan D (2005) Lifetime optimization of sensor networks under physical attacks. In: Proceedings of IEEE international conference on communications (ICC), May 2005, pp 32953301
Abrach H, Bhatti S, et.al (2003) MANTIS: System support for multimodal networks of in-situ sensors. In: 2nd ACM international workshop on wireless sensor networks and applications, pp 50–59
Blaze M, Feigenbaum J, Ioannidis J, Keromytis AD (1999) The key note trust management system version 2. Internet RFC 2704, Sept 1999
Christodorescu M, Jha S, Seshia S, Song D, Bryant R (2005) Semantics aware malware detection. In Proceedings of IEEE symposium on security and privacy, Oakland, May 2005
Christodorescu M, Jha S (2003) Static analysis of executables to detect malicious patterns. In: Proceedings of the 12th USENIX security symposium (Security 03), USENIX Association, Aug 2003, pp 169–186
Kruegel C, Robertson W, Vigna G (2004) Detecting kernel level root kits though binary analysis. In: Proceedings of the 20th annual computer security applications conference (ACSAC 04), Tucson, AZ, Dec 2004
Resnick P, Zeckhauser R (2000) Trust among strangers in internet transactions: empirical analysis of eBays reputation system. In: Proceedings of NBER workshop on empirical studies of electronic commerce, 2000
Chen H, Wagner D (2002) MOPS: an infrastructure for examining security properties of software. In: Proceedings of the 9th ACM conference on computer and communications security, Nov 2002, pp 235–244
Michiardi JP, Molva R (2002) Core: a collaborative reputation mechanism to enforce node cooperation in mobile Ad Hoc networks. In: IFIP communication and multimedia security conference
Marti S, Giuli TJ, Lai K, Baker M (2000) Mitigating routing misbehavior in mobile ad hoc networks. In: 6th ACM international conference on mobile computing and networking, Aug 2000, pp 255–265
Acknowledgments
The authors wish to thank Visvesvaraya Technological University (VTU), Karnataka, India, for funding the part of the project under VTU Research Scheme (Grant No.VTU/Aca./2011-12/A-9/753, Dated: May 5, 2012.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer India
About this paper
Cite this paper
Anigol, A., Ahmed, R., Biradar, R.C. (2013). Design of Security Schemes for Wireless Sensor Networks Based on Attack Behavior: Proactive Approach. In: Chakravarthi, V., Shirur, Y., Prasad, R. (eds) Proceedings of International Conference on VLSI, Communication, Advanced Devices, Signals & Systems and Networking (VCASAN-2013). Lecture Notes in Electrical Engineering, vol 258. Springer, India. https://doi.org/10.1007/978-81-322-1524-0_50
Download citation
DOI: https://doi.org/10.1007/978-81-322-1524-0_50
Published:
Publisher Name: Springer, India
Print ISBN: 978-81-322-1523-3
Online ISBN: 978-81-322-1524-0
eBook Packages: EngineeringEngineering (R0)