Abstract
Due to its characteristics, the Wireless Sensor Networks (WSN) are useful in a variety of applications such as environmental monitoring, surveillance, tracking, among others. Given the nature of such applications, where many are mission critical, the WSN become targets of possible attackers interested in harming the network. Among the defense mechanisms, the intrusion detection systems play important role in detecting attacks that can overcome the preventing techniques. This paper proposes a new collaborative and decentralized approach for intrusion detection system. Special nodes, called monitors, will be responsible for monitoring the behavior of neighbor nodes. The malicious activities evidences discovered by each monitor will be shared and correlated with the purpose of increasing the accuracy in detection of intruders. Experiment conducted by simulation show that our solution is effective in reducing the false positives.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
H. Alzaid, E. Foo and J. G. Nieto, “Secure Data Aggregation in Wireless Sensor Network: a survey, “ In 6th Australasian Information Security Conference, ACSC2008, Wollongong, Australia, January 2008.
B. Parno, E. Gaustad, M. Luk and A. Perrig, “Secure Sensor Network Routing: A Clean-Slate Approach,” CoNEXT 2006, Lisboa, Portugal.
A. P. R. Silva, M. H. T. Martins, B. P. S. Rocha, A. A. F. Loureiro, L. B. Ruiz and H. C. Wong, “Decentralized Intrusion Detection in Wireless Sensor Networks,“ In Q2Swinet’05. Montreal, Quebec, Canada, 2005.
R. Shorey, A. Ananda, M. C. Chan, and W. T. Ooi, Mobile, Wireless and Sensor Networks: technology, applications, and future directions. John Wiley & Sons. Hoboken, New Jersey. 2006
I. Balepin, S. Maltsev, J. Rowe, and K. Levitt, “Using specification-based intrusion detection for automated response,” In Proceeding of 6 th International Symposium, Pittsburgh, PA, September 2003. RAID 2003, Recent Advances in Intrusion Detection.
S. Marti, T. Giuli, K. Lai, and M. Baker, “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks,” In 6th ACM/IEEE Internacional Conference on Mobile Computing and Networking MobiCom’ 00, Agosto 2000.
R. Roman, J. Zhou and J. Lopez, “Applying Intrusion Detection Systems to Wireless Sensor Networks,” in Consumer Communications and Networking Conference, 2006. CCNC 2006. 3rd IEEE
W. R. Pires Jr., T. H. P. Figueiredo, H. C. Wong and A. A. F. Loureiro. “Malicious node detection in wireless sensor networks,” In Proceedings of the 8th International Parallel & Distributed Processing Symposium (IPDPS’04), Santa Fe, NM, USA. ISBN 0-7695-2132-0.
Guorui Li, Jingsha He, Yingfang Fu, “A Distributed Intrusion Detection Scheme for Wireless Sensor Networks,” Distributed Computing Systems Workshops, International Conference on, vol. 0, no.0, pp. 309–314, 2008 The 28th International Conference on Distributed Computing Systems Workshops, 2008.
C. V. Z. Zhou, S. Karunasekera and C. Leckie, “A peer-to-peer Collaborative Intrusion Detection System”, Networks, 2005. Jointly held with the 2005, IEEE 7th Malaysia International Conference on Communication.
A. Perrig, R. Szewczyk, V. Wen, D. Culler and J. D. Tygar, “SPINS: Security Protocols for Sensor Networks,” In Mobile Computing and Networking 2001, Rome, Italy.
K. Holger and W. Andreas, Protocols and Architectures for Wireless Sensor Networks. Jonh Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex. England. 2008.
I. Stoica, R. Morris, D. Karger, M. F. Kaashoek and H. Balakrishnan, “Chord: A scalable peer-to-peer lookup service for internet applications”, Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications. San Diego, California, United States. pp. 149 – 160. 2001.
D. Karger, E. Lehman, T. Leighton, M. Levine, D. Lewin, R. Panigrahy, “Consistent hashing and random trees: Distributed caching protocols for relieving hot spots on the World Wide Web,” Proc. 29th Annu. ACM Symp.,May 1997, pp. 654–663.
Sinalgo. http://dcg.ethz.ch/projects/sinalgo/
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer Science+Business Media B.V.
About this paper
Cite this paper
de Sousa Lemos, M.V., Leal, L.B., Filho, R.H. (2010). A New Collaborative Approach for Intrusion Detection System on Wireless Sensor Networks. In: Sobh, T., Elleithy, K., Mahmood, A. (eds) Novel Algorithms and Techniques in Telecommunications and Networking. Springer, Dordrecht. https://doi.org/10.1007/978-90-481-3662-9_41
Download citation
DOI: https://doi.org/10.1007/978-90-481-3662-9_41
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-90-481-3661-2
Online ISBN: 978-90-481-3662-9
eBook Packages: EngineeringEngineering (R0)