Browse > Article
http://dx.doi.org/10.9708/jksci.2013.18.12.027

Analysis of the Connectivity of Monitoring Nodes and the Coverage of Normal Nodes for Behavior-based Attack Detection in Wireless Sensor Networks  

Chong, Kyun-Rak (Dept. of Computer Engineering, HongIk University)
Abstract
In wireless sensor networks, sensors need to communicate with each other to send their sensing data to the administration node and so they are susceptible to many attacks like garbage packet injection that cannot be prevented by using traditional cryptographic approaches. A behavior-based detection is used to defend against such attacks in which some specialized monitoring nodes overhear the communications of their neighbors to detect bad packets. As monitoring nodes use more energy, it is desirable to use the minimal number of monitoring nodes to cover the whole or maximal part of the network. The monitoring nodes can either be selected among the deployed normal nodes or differ in type from normal nodes. In this study, we have developed an algorithm for selecting the predefined number of monitoring nodes needed to cover the maximum number of normal nodes when the different types of normal nodes and monitoring nodes are deployed. We also have investigated experimentally how the number of monitoring nodes and their transmission range affect the connection ratio of the monitoring nodes and the coverage of the normal nodes.
Keywords
behavior-based attack detection; wireless sensor network; sensor deployment;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 A. Stetsko, L. Folkman and V. Matyas, "Neighbor-based Intrusion Detection for Wireless Sensor Networks," Proceedings of 6th International Conference on Wiress and mobile Communications, pp.420-425, 2010
2 D. Sheela, C. Naveenkumar and G. Mahadevan, "A noncryptographic method of sinkhole attack detection in wireless sensor networks," IEEE Intl. conference on recent trends in Information Technology(ICRTIT 2011), pp. 527-532, 2011
3 W. T. Zhu, "Node replication attacks in wireless sensor networks : bypassing the neighbor-based detection scheme," Intl. Conference on Network Computing and Information Security, pp. 156-160, 2011
4 Y. Liu and K. Han, "Behavior-based Attack Detection and Reporting in Wireless Sensor Networks," Proceedings of the third International Symposiums on Electronic Commerce and Security, pp. 209-212, 2010
5 K. Chong, "An Improved Algorithm using Shortest Path Tree for Behavior-based Attack Detection and Reporting Prblem in Wireless Sensor Networks," Journal of KIISE : Information Netwoking, vol. 39, no. 4, pp.365-370, August 2012
6 D.-H. Shin and S. Bagchi, "Optimal monitoring in multi-channel multi-radio wireless mesh network," Proceedings of the tenth ACM international symposium on Mobile ad hoc networking and computing(Mobihoc), pp. 229-238, 2009
7 D. Subhadrabandhu, S. Sarkar, and F. Anjum,"A framework for misuse detection in adhoc networks-part I," IEEE Journal on Selected Areas in Communications, Special Issue on Security in Wireless Ad Hoc Networks, Vol.24, No.2, pp.274-289, 2006
8 D. Subhadrabandhu, S. Sarkar, and F. Anjum,"A framework for misuse detection in adhoc networks-part II," IEEE Journal on Selected Areas in Communications, Special Issue on Security in Wireles Ad Hoc Networks, Vol.24, No.2, pp.290-304, 2006
9 U. Wang, M. Wilkerson, and X. Yu, "Hybrid Sensor Deployment for Surveillance and Target Detection in Wireless Sensor Networks," IEEE , 2011
10 Y. Wang and Z lun, "Impact of Deployment Point Arrangement on Intrusion Detection in Wireless Sensor Networks," 18th Annual IEEE/ACM Intl. Symp. on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, pp. 421-423, 2010
11 Xue Wang and Sheng Wang, "Hierarchical Deployment optimization for Wireless Sensor Networks," IEEE Transactions on Mobile Computing, vol. 10, no. 7, pp. 1028-1041, July, 2011   DOI   ScienceOn
12 G. Yang and D. Quio, "Multi-Round Sensor Deployment for Guaranteed Barrier Coverage," IEEE INFOCOM, 2010