Skip to main content

A New Collaborative Approach for Intrusion Detection System on Wireless Sensor Networks

  • Conference paper
  • First Online:
Novel Algorithms and Techniques in Telecommunications and Networking

Abstract

Due to its characteristics, the Wireless Sensor Networks (WSN) are useful in a variety of applications such as environmental monitoring, surveillance, tracking, among others. Given the nature of such applications, where many are mission critical, the WSN become targets of possible attackers interested in harming the network. Among the defense mechanisms, the intrusion detection systems play important role in detecting attacks that can overcome the preventing techniques. This paper proposes a new collaborative and decentralized approach for intrusion detection system. Special nodes, called monitors, will be responsible for monitoring the behavior of neighbor nodes. The malicious activities evidences discovered by each monitor will be shared and correlated with the purpose of increasing the accuracy in detection of intruders. Experiment conducted by simulation show that our solution is effective in reducing the false positives.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. H. Alzaid, E. Foo and J. G. Nieto, “Secure Data Aggregation in Wireless Sensor Network: a survey, “ In 6th Australasian Information Security Conference, ACSC2008, Wollongong, Australia, January 2008.

    Google Scholar 

  2. B. Parno, E. Gaustad, M. Luk and A. Perrig, “Secure Sensor Network Routing: A Clean-Slate Approach,” CoNEXT 2006, Lisboa, Portugal.

    Google Scholar 

  3. A. P. R. Silva, M. H. T. Martins, B. P. S. Rocha, A. A. F. Loureiro, L. B. Ruiz and H. C. Wong, “Decentralized Intrusion Detection in Wireless Sensor Networks,“ In Q2Swinet’05. Montreal, Quebec, Canada, 2005.

    Google Scholar 

  4. R. Shorey, A. Ananda, M. C. Chan, and W. T. Ooi, Mobile, Wireless and Sensor Networks: technology, applications, and future directions. John Wiley & Sons. Hoboken, New Jersey. 2006

    Google Scholar 

  5. I. Balepin, S. Maltsev, J. Rowe, and K. Levitt, “Using specification-based intrusion detection for automated response,” In Proceeding of 6 th International Symposium, Pittsburgh, PA, September 2003. RAID 2003, Recent Advances in Intrusion Detection.

    Google Scholar 

  6. S. Marti, T. Giuli, K. Lai, and M. Baker, “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks,” In 6th ACM/IEEE Internacional Conference on Mobile Computing and Networking MobiCom’ 00, Agosto 2000.

    Google Scholar 

  7. R. Roman, J. Zhou and J. Lopez, “Applying Intrusion Detection Systems to Wireless Sensor Networks,” in Consumer Communications and Networking Conference, 2006. CCNC 2006. 3rd IEEE

    Google Scholar 

  8. W. R. Pires Jr., T. H. P. Figueiredo, H. C. Wong and A. A. F. Loureiro. “Malicious node detection in wireless sensor networks,” In Proceedings of the 8th International Parallel & Distributed Processing Symposium (IPDPS’04), Santa Fe, NM, USA. ISBN 0-7695-2132-0.

    Google Scholar 

  9. Guorui Li, Jingsha He, Yingfang Fu, “A Distributed Intrusion Detection Scheme for Wireless Sensor Networks,” Distributed Computing Systems Workshops, International Conference on, vol. 0, no.0, pp. 309–314, 2008 The 28th International Conference on Distributed Computing Systems Workshops, 2008.

    Google Scholar 

  10. C. V. Z. Zhou, S. Karunasekera and C. Leckie, “A peer-to-peer Collaborative Intrusion Detection System”, Networks, 2005. Jointly held with the 2005, IEEE 7th Malaysia International Conference on Communication.

    Google Scholar 

  11. A. Perrig, R. Szewczyk, V. Wen, D. Culler and J. D. Tygar, “SPINS: Security Protocols for Sensor Networks,” In Mobile Computing and Networking 2001, Rome, Italy.

    Google Scholar 

  12. K. Holger and W. Andreas, Protocols and Architectures for Wireless Sensor Networks. Jonh Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex. England. 2008.

    Google Scholar 

  13. I. Stoica, R. Morris, D. Karger, M. F. Kaashoek and H. Balakrishnan, “Chord: A scalable peer-to-peer lookup service for internet applications”, Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications. San Diego, California, United States. pp. 149 – 160. 2001.

    Google Scholar 

  14. D. Karger, E. Lehman, T. Leighton, M. Levine, D. Lewin, R. Panigrahy, “Consistent hashing and random trees: Distributed caching protocols for relieving hot spots on the World Wide Web,” Proc. 29th Annu. ACM Symp.,May 1997, pp. 654–663.

    Google Scholar 

  15. Sinalgo. http://dcg.ethz.ch/projects/sinalgo/

  16. NS2. http://nsnam.isi.edu/nsnam/index.php/Main_Page

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Marcus Vinícius de Sousa Lemos .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer Science+Business Media B.V.

About this paper

Cite this paper

de Sousa Lemos, M.V., Leal, L.B., Filho, R.H. (2010). A New Collaborative Approach for Intrusion Detection System on Wireless Sensor Networks. In: Sobh, T., Elleithy, K., Mahmood, A. (eds) Novel Algorithms and Techniques in Telecommunications and Networking. Springer, Dordrecht. https://doi.org/10.1007/978-90-481-3662-9_41

Download citation

  • DOI: https://doi.org/10.1007/978-90-481-3662-9_41

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-90-481-3661-2

  • Online ISBN: 978-90-481-3662-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics