| Literature DB >> 22454568 |
Riaz Ahmed Shaikh1, Hassan Jameel, Brian J d'Auriol, Heejo Lee, Sungyoung Lee, Young-Jae Song.
Abstract
Existing anomaly and intrusion detection schemes of wireless sensor networks have mainly focused on the detection of intrusions. Once the intrusion is detected, an alerts or claims will be generated. However, any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to the other nodes. Verifying the validity of such claims is a critical and challenging issue that is not considered in the existing cooperative-based distributed anomaly and intrusion detection schemes of wireless sensor networks. In this paper, we propose a validation algorithm that addresses this problem. This algorithm utilizes the concept of intrusion-aware reliability that helps to provide adequate reliability at a modest communication cost. In this paper, we also provide a security resiliency analysis of the proposed intrusion-aware alert validation algorithm.Entities:
Keywords: alerts; anomalies; intrusions; trust management; wireless sensor networks
Year: 2009 PMID: 22454568 PMCID: PMC3312426 DOI: 10.3390/s90805989
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1.Taxonomy of intrusion detection schemes.
Summarization of proposed Anomalies and IDS schemes of WSNs
| [ | [ | [ | [ | [ | [ | ||
|---|---|---|---|---|---|---|---|
| Classification | Technique | Signature-based | Statistical-based | Statistical-based | Statistical-based | Statistical-based | Statistical-based |
| Architecture | Distributed & cooperative | Distributed & cooperative | Distributed & uncooperative | Hybrid | Distributed & uncooperative | Distributed & cooperative | |
| Specifications | Installation of IDS | Each sensor node | Each sensor node | Each sensor node | Each primary node of a group | Special monitor nodes in network | Each sensor node |
| IDS Scope | Multilayer (Appl., Net., MAC & Phy.) | Application layer | Network layer | Application layer | Multilayer (Appl., Net., MAC & Phy.) | Network layer | |
| Attacks detects | Masquerade attack, and forged packets attacks | Localization anomalies | Routing attacks e.g., Periodic error route attack, active & passive sinkhole attack | Correlated anomalies / attacks (invalid data insertion) | Worm hole, data alteration, selective forwarding, black hole, & jamming | Routing attacks e.g., packet dropping etc. | |
| Network | Sensor node | Static / Mobile | Static | Static / Mobile | Static / Mobile | Static | Static |
| Topology | Any | Any | Any | Cluster-based | Tree-based | Any | |
Figure 2.Intrusion-aware reliability mode concept.
Figure 3.Intrusion-aware validation algorithm at sender end.
Figure 4.Intrusion-aware validation algorithm at the receiver end.
Communication overhead of reliability modes.
| Cost | |
|---|---|
| Low | 2 |
| Medium | |
| High | 2 |
| Intrusion-aware | 2 |
Figure 5.Average communication overhead of validation algorithm after 1000 simulation runs in which different levels of intrusions occurs randomly.
Figure 6.Effect of false alarm tolerance factor on communication.
Figure 7.Probability of reaching at consensus and no consensus state.
Phase 1: Consensus Phase
| 1: Received Claim Packet ( |
| 2: |
| 3: |
| 4: |
| 5: |
| 6: |
| 7: |
| 8: |
| 9: Send conf_req_pkt( |
| 10: |
| 11: |
| 12: Send conf_req_pkt( |
| 13: |
| 14: |
| 15: |
| 16: Send conf_req_pkt( |
| 17: |
| 18: |
| 19: |
| 20: |
| 21: Update Record; |
| 22: |