Browse > Article
http://dx.doi.org/10.9708/jksci.2016.21.1.073

Selection of Monitoring Nodes to Maximize Sensing Area in Behavior-based Attack Detection  

Chong, Kyun-Rak (Dept. of Computer Engineering, Hongik University)
Abstract
In wireless sensor networks, sensors have capabilities of sensing and wireless communication, computing power and collect data such as sound, movement, vibration. Sensors need to communicate wirelessly to send their sensing data to other sensors or the base station and so they are vulnerable to many attacks like garbage packet injection that cannot be prevented by using traditional cryptographic mechanisms. To defend against such attacks, a behavior-based attack detection is used in which some specialized monitoring nodes overhear the communications of their neighbors(normal nodes) to detect illegitimate behaviors. It is desirable that the total sensing area of normal nodes covered by monitoring nodes is as large as possible. The previous researches have focused on selecting the monitoring nodes so as to maximize the number of normal nodes(node coverage), which does not guarantee that the area sensed by the selected normal nodes is maximized. In this study, we have developed an algorithm for selecting the monitoring nodes needed to cover the maximum sensing area. We also have compared experimentally the covered sensing areas computed by our algorithm and the node coverage algorithm.
Keywords
Behavior-based attack detection; Wireless sensor network; Sensing area; Node coverage;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 A. Stetsko, L. Folkman and V. Matyas, "Neighbor-based Intrusion Detection for Wireless Sensor Networks," Proceedings of 6th International Conference on Wiress and mobile Communications, pp.420-425, 2010
2 D. Subhadrabandhu, S. Sarkar, and F. Anjum,"A framework for misuse detection in adhoc networks-part I," IEEE Journal on Selected Areas in Communications, Special Issue on Security in Wireless Ad Hoc Networks, Vol.24, No.2, pp.274-289, 2006
3 Y. Liu and K. Han, "Behavior-based Attack Detection and Reporting in Wireless Sensor Networks," Proceedings of the third International Symposiums on Electronic Commerce and Security, pp. 209-212, 2010
4 K. Chong, "An Improved Algorithm using Shortest Path Tree for Behavior-based Attack Detection and Reporting Problem in Wireless Sensor Networks," Journal of KIISE : Information Networking, vol. 39, no. 4, pp.365-370, August 2012
5 K. Chong, "Analysis of the Connectivity of Monitoring Nodes annd the Coverage of Normal Nodes for Behavior-based Attack Detection in Wireless Sensor Networks," Journal of KSCI, vol. 18, no.12, pp. 27-34, 2013
6 D. Subhadrabandhu, S. Sarkar, and F. Anjum,"A framework for misuse detection in adhoc networks-part II," IEEE Journal on Selected Areas in Communications, Special Issue on Security in Wireles Ad Hoc Networks, Vol.24, No.2, pp.290-304, 2006
7 D.-H. Shin and S. Bagchi, "Optimal monitoring in multi-channel multi-radio wireless mesh network," Proceedings of the tenth ACM international symposium on Mobile ad hoc networking and computing(Mobihoc), pp. 229-238, 2009
8 V. Gupta, K. Kapoor and D. S. Renuga, "Wireless Sensor Node Selection Strategies for Effective Surveillance," IEEE International Advanced Computing Conference, pp. 924-929, 2015
9 R. Asgarnezhad and J. A. Torkestani, "A Survey on Backbone Formation Algorithms for Wireless Sensor Networks," Australian Telecommunication Network and Applications pp. 1-4, 2011
10 U. Wang, M. Wilkerson, and X. Yu, "Hybrid Sensor Deployment for Surveillance and Target Detection in Wireless Sensor Networks," IEEE , 2011
11 Y. Wang and Z lun, "Impact of Deployment Point Arrangement on Intrusion Detection in Wireless Sensor Networks," 18th Annual IEEE/ACM Intl. Symp. on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, pp. 421-423, 2010