Browse > Article
http://dx.doi.org/10.5762/KAIS.2011.12.11.5238

A Study on the Activation Technique of Detection nodes for Intrusion Detection in Wireless Sensor Networks  

Seong, Ki-Taek (Department of Information Security, TongMyong University)
Publication Information
Journal of the Korea Academia-Industrial cooperation Society / v.12, no.11, 2011 , pp. 5238-5244 More about this Journal
Abstract
Recently, wireless sensor networks have become increasingly interesting areas over extensive application fields such as military, ecological, and health-related areas. Almost sensor networks have mission-critical tasks that requires very high security. Therefore, extensive work has been done for securing sensor networks from outside attackers, efficient cryptographic systems, secure key management and authorization, but little work has yet been done to protect these networks from inside threats. This paper proposed an method to select which nodes should activate their idle nodes as detectors to be able to watch all packets in the sensor network. Suggested method is modeled as optimization equation, and heuristic Greedy algorithm based simulation results are presented to verify my approach.
Keywords
Sensor networks; Intrusion detection; Network security; Greedy algorithm;
Citations & Related Records
연도 인용수 순위
  • Reference
1 MICA2 Radio Stack for TinyOS. http://www.tinyos.net/tinyos-1.x/doc/mica2rad, 2007.
2 A. Abduvaliyev, et al., " Energy Efficient Hybrid Intrusion Detection System for Wireless Sensor Networks", 2010 Intl. Conference on Electronics and Information Engineering, Vol. 2 25-29, 2010.
3 Yi Zou, "COVERAGE-DRIVEN SENSOR DEPLOYMENT AND ENERGY-EFFICIENT INFORMATION PROCESSING IN WIRELESS SENSOR NETWORKS", PhD Thesis, Duke University, 2004.
4 Edith C.H. Ngai, "Intrusion Detection for wireless Sensor Networks", The Chinese University of Hong Kong Department of Computer Science and Engineering Ph.D. Term 2 paper, pp. 29-37, 2005.
5 Yang Xiao, "Security in Distributed, GRID, and Pervasive Computing", Chapter 17(Wireless Sensor Network Security: A Servey), CRC Press, 2006.
6 E. Shi, A. Peerig, "Designing Secure Sensor Networks, "Wireless Communications Magazine, vol. 11, no. 6, 2004.
7 Y. Wang; G. Attebury; B. Ramamurthy, "A Survey of Security Issues in Wireless Sensor Networks," IEEE Comm. Surveys & Tutorials, vol. 8, no. 2, 2006
8 I. Sato, Y. Okazaki, and S. Goto. An improved intrusion detection method based on process profiling. IPSJ Journal, 43(11):3316-3326, 2002.
9 R. Roman; J. Zhou; J. Lopez, "Applying Intrusion Detection Systems to Wireless Sensor Networks," in Proc. CCNC'06, 2006.
10 F. Anjum; D. Subhadrabandhu; S. Sarkar; R. Shetty, "On Optimal Placement of Intrusion Detection Modules in Wireless Sensor Networks," BROADNETS'04, 2004.
11 A. Agah; S. Das; K. Basu, "Intrusion Detection in Sensor Networks: A non-cooperative Game Approach," IEEE ISNCA, 2004.
12 R. Roman; J. Zhou; J. Lopez, "Applying Intrusion Detection Systems to Wireless Sensor Networks," in Proc. CCNC'06, 2006.
13 C. Loo; M. Ng; C. Leckie; M. Palaniswami, "Intrusion Detection for Routing Attacks in Sensor Networks," Int'l. Journal of Distr. Sensor Networks, vol. 2,, 2006.
14 C. Su; K. Chang; Y. Kuo; M. Horng, "The New Intrusion Prevention and Detection Approaches for Clustering-Based Sensor Networks," IEEE WCNC, 2005.