| Literature DB >> 23529146 |
Ilkyu Kim1, Doohwan Oh, Myung Kuk Yoon, Kyueun Yi, Won Woo Ro.
Abstract
Sensor nodes in wireless sensor networks are easily exposed to open and unprotected regions. A security solution is strongly recommended to prevent networks against malicious attacks. Although many intrusion detection systems have been developed, most systems are difficult to implement for the sensor nodes owing to limited computation resources. To address this problem, we develop a novel distributed network intrusion detection system based on the Wu-Manber algorithm. In the proposed system, the algorithm is divided into two steps; the first step is dedicated to a sensor node, and the second step is assigned to a base station. In addition, the first step is modified to achieve efficient performance under limited computation resources. We conduct evaluations with random string sets and actual intrusion signatures to show the performance improvement of the proposed method. The proposed method achieves a speedup factor of 25.96 and reduces 43.94% of packet transmissions to the base station compared with the previously proposed method. The system achieves efficient utilization of the sensor nodes and provides a structural basis of cooperative systems among the sensors.Entities:
Year: 2013 PMID: 23529146 PMCID: PMC3673066 DOI: 10.3390/s130403998
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1.Shifting examples using the WM algorithm. (a) The shifting processes; (b) The two tables of WM.
Figure 2.The system model of the networked sensor platform.
Figure 3.The division of processes of the distributedWM algorithm.
Figure 4.The packet format for the wireless sensor network.
Figure 5.The packet messages between sensor nodes and a base station.
Figure 6.An intrusion emulation on the proposed sensor network.
Required resources to examine a single packet.
|
| |||||
|---|---|---|---|---|---|
| 0 | 0.204 | 1.51 | 39.533 | 128.08 | 193.79 |
| 5 | 0.417 | 3.08 | 39.547 | 128.13 | 94.84 |
| 10 | 1.106 | 8.16 | 39.436 | 127.77 | 35.66 |
| 15 | 1.248 | 9.21 | 39.562 | 128.18 | 31.70 |
| 20 | 1.408 | 10.39 | 39.550 | 128.14 | 25.96 |
Figure 7.The non-zero probability and required memory occupation for the patterns.
Figure 8.The average throughput of the two pattern sets in the base station.
The number of alerted patterns that require actual matching.
| Patterns | 50 | 100 | 500 | 1000 | 5000 | 10,000 | 50,000 | 100,000 | 500,000 | 1,000,000 |
|---|---|---|---|---|---|---|---|---|---|---|
| MinWM | ||||||||||
|
| ||||||||||
| Average Counts | 1.16 | 2.69 | 12.93 | 24.70 | 124.43 | 253.43 | 1275.40 | 2527.52 | 12680.77 | 25375.59 |
| Rates (%) | 2.3200 | 2.6900 | 2.5860 | 2.4700 | 2.4886 | 2.5343 | 2.5508 | 2.5275 | 2.5362 | 2.5376 |
|
| ||||||||||
| RIDES | ||||||||||
|
| ||||||||||
| Average Counts | 2.64 | 5.16 | 25.63 | 50.33 | 251.27 | 506.09 | 2513.65 | 5040.52 | 25194.83 | 50345.80 |
| Rates (%) | 5.2800 | 5.1600 | 5.1260 | 5.0330 | 5.0254 | 5.0609 | 5.0273 | 5.0405 | 5.0390 | 5.0346 |