Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2009.16-C.2.151

Energy Efficient Distributed Intrusion Detection Architecture using mHEED on Sensor Networks  

Kim, Mi-Hui (미국 North Carolina State University 컴퓨터공학과)
Kim, Ji-Sun (이화여자대학교 컴퓨터공학과)
Chae, Ki-Joon (이화여자대학교 컴퓨터학과)
Abstract
The importance of sensor networks as a base of ubiquitous computing realization is being highlighted, and espicially the security is recognized as an important research isuue, because of their characteristics.Several efforts are underway to provide security services in sensor networks, but most of them are preventive approaches based on cryptography. However, sensor nodes are extremely vulnerable to capture or key compromise. To ensure the security of the network, it is critical to develop security Intrusion Detection System (IDS) that can survive malicious attacks from "insiders" who have access to keying materials or the full control of some nodes, taking their charateristics into consideration. In this perper, we design a distributed and adaptive IDS architecture on sensor networks, respecting both of energy efficiency and IDS efficiency. Utilizing a modified HEED algorithm, a clustering algorithm, distributed IDS nodes (dIDS) are selected according to node's residual energy and degree. Then the monitoring results of dIDSswith detection codes are transferred to dIDSs in next round, in order to perform consecutive and integrated IDS process and urgent report are sent through high priority messages. With the simulation we show that the superiorities of our architecture in the the efficiency, overhead, and detection capability view, in comparison with a recent existent research, adaptive IDS.
Keywords
Sensor Network; Distributed Intrusion Detection Architecture; Energy Efficiency;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 S. Doumit and D.P. Agrawal, 'Self-organized criticality & stochastic learning based intrusion detection system for wireless sensor network,' MILCOM 2003-IEEE Military Communications Conference, Vol.22, No.1, pp.609-614, 2003   DOI
2 D. Raymond et al., 'Effects of Denial of Sleep Attacks on Wireless Sensor Network MAC Protocols,' Proc. 7th Ann. IEEE Systems, Man, and Cybernetics (SMC) Information Assurance Workshop (IAW), IEEE Press, pp.297-304, 2006
3 B. Parno, A. Perrig, and V. Gligor, 'Distributed detection of node replication attacks in sensor networks,' Proc. of IEEE Symposium on Security and Privacy, May, 2005   DOI
4 최경진, 윤명준, 심인보, 이재용, '무선 센서 네트워크에서의 에너지 효율적인 클러스터 헤드 선출 알고리즘', 한국통신학회논문지, Vol.32, No.6, 2007   과학기술학회마을
5 A. Agah, S. Das, K. Basu, and M. Asadi, 'Intrusion detection in sensor networks: A non-cooperative game approach,' 3rd IEEE International Symposium on Network Computing and Applications (NCA 2004), pp.343-346, August, 2004   DOI
6 A. da Silva, M. Martins, B. Rocha, A. Loureiro, L. Ruiz, and H. Wong, 'Decentralized intrusion detection in wireless sensor networks,' Proc. of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks, 2005
7 Ketel, M., 'Applying the Mobile Agent Paradigm to Distributed Intrusion Detection in Wireless Sensor networks,' 40th Southeastern Symposium on System Theory (SSST 2008), pp.74-78, March, 2008
8 P. Techateerawat and A. Jennings, 'Adaptive Intrusion Detection in Wireless Sensor Networks,' International Conference on Intelligent Pervasive Computing, 2007
9 Youtao Zhang, Jun Yang, Weijia Li. 'Towards Energy-Efficient Code Dissemination in Wireless. Sensor Networks,' International Conference on Information Processing in Sensor Networks (IPSN 2008), April, 2008
10 J. Deng, R. Han, and S. Mishra. 'Countermeasuers against traffic analysis in wireless sensor networks,' Technical Report CU-CS-987-04, University of Colorado at Boulder, 2004
11 H. Chan and A. Perrig, 'Security and privacy in sensor networks,' IEEE Computer Magazine, pp.103-105, 2003
12 O. Younis and S. Fahmy, 'HEED: A Hybrid, Energy-Efficient, Distributed Clustering Approach for Ad Hoc Sensor Networks,' IEEE Trans. Mobile Computing, Vol.3, No.4, pp.366-379, Oct.-Dec., 2004   DOI   ScienceOn
13 O. Younis and S. Fahmy, 'Distributed Clustering in Ad-Hoc Sensor Networks: A Hybrid, Energy-Efficient Approach,' Proc. IEEE INFOCOM, Mar., 2004   DOI
14 P. Brutch and C. Ko, 'Challenges in intrusion detection for wireless ad-hoc networks,' Proc. of the 2003 Symposium on Applications and the Internet Workshops (SAINT'03 Workshops), pp.368-373, 2003
15 A. A. Strikos, 'A full approach for intrusion detection in wireless sensor networks,' School of Information and Communication Technology, KTH, March, 2007
16 C. Su, K. Chang, Y. Kuo, and M. Horng, 'The new intrusion prevention and detection approaches for clustering-based sensor networks,' 2005 IEEE Wireless Communications and Networking Conference (WCNC 2005), March, 2005   DOI
17 Sangwon Hyun, Peng Ning, An Liu, Wenliang Du, 'Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks,' Proc. of the 2008 International Conference on Information Processing in Sensor Networks (ipsn 2008), pp.445-456, April, 2008
18 S. Zhu, S. Setia, and S. Jajodia, 'LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks,' Proc. of the 10th ACM conference on Computer and communications security, 2003
19 P. Kannadiga and M. Zulkernine, 'DIDMA: a distributed intrusion detection system using mobile agents,' First ACIS International Workshop on Self Assembling Wireless Networks (SNPD/SAWN 2005), pp.238-245, May, 2005
20 Jing Deng, Richard Han, Shivakant Mishra, 'Secure code distribution in dynamically programmable wireless sensor networks,' Proc. of the fifth international conference on Information processing in sensor networks 2006, pp.292-300, 2006
21 Wenyuan Xu, Ke Ma, Trappe, W., Yanyong Zhang, 'Jamming sensor networks: attack and defense strategies,' Network, IEEE, Vol.20, No.3, pp.41-47, 2006   DOI   ScienceOn
22 David R. Raymond, Scott F. Midkiff, 'Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses,' IEEE Pervasive Computing, Vol.7, No.1, pp.74-81, 2008   DOI   ScienceOn
23 J. Newsome, E. Shi, D. Song, and A. Perrig, 'The sybil attack in sensor networks: analysis & defenses,' Proc. of the third international symposium on Information processing in sensor networks, ACM Press, pp.259-268. 2004   DOI