An Energy-Efficient Attack Detection Protocol for WSN

Article Preview

Abstract:

Traffic attack and false data aggregation attack are serious to wireless sensor networks. How to detect the two kinds of attack is a difficult problem. An energy-efficient attack detection protocol is proposed in this paper. The detection protocol uses linear prediction to establish easy ARMA(2,1) model for sensor nodes. In the detection protocol, different nodes play different roles, and use different monitor schemes. Virtual cluster head and monitor nodes are elected. Monitor nodes monitor cluster head, and member nodes are monitored by their cluster head. At the same time, secure data aggregation schemes are added to the protocol. Simulation shows that, the detection protocol can real-time predict traffic attacks, and insure correct data aggregation, but consume less energy.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2716-2719

Citation:

Online since:

August 2013

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] I. Onat, A. Miri. An Intrusion Detection System for Wireless Sensor Networks [C]. Proceedings of IEEE International Conference on Wireless and Mobile Computing, Networking and Communications. 2005: 253-259.

DOI: 10.1109/wimob.2005.1512911

Google Scholar

[2] A. Da-Silva, M. Martins, and B. Rocha. Decentralized Intrusion Detection in Wireless Sensor Networks [C]. Proceedings of the 1st ACM International Workshop on QoS and Security for Wireless and Mobile Networks. 2005: 16-23.

DOI: 10.1145/1089761.1089765

Google Scholar

[3] S. Rajasegarar. Distributed Anomaly Detection in Wireless Sensor Netwoks [C]. Proceedings of the 10th IEEE Singapore International Conference of Communication System. 2006: 1-5.

DOI: 10.1109/iccs.2006.301508

Google Scholar

[4] A. Agah, S. Das, K. Basu K. Intrusion Detection in Sensor Networks: A Non-cooperative Game Approach [C]. Proceedings of IEEE International Conference on Communications. 2005: 3218-3222.

DOI: 10.1109/vetecf.2004.1400591

Google Scholar

[5] R. Roman, and J. Zhou. Applying Intrusion Detection Systems to Wireless Sensor Networks [J]. Consumer Communications and Networking Conference. 2006(16): 640-644.

DOI: 10.1109/ccnc.2006.1593102

Google Scholar

[6] J. Deng, R. Han. Defending against Path-based DoS Attacks in Wireless Sensor Networks [C]. Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks. 2005: 89-96.

DOI: 10.1145/1102219.1102235

Google Scholar

[7] Bi Jiana, Ji Zhenzhou, Cao Zhiyan. Cluster-based directed diffusion for wireless sensor networks [J]. High Technology Letters. 2008(14): 342-347.

Google Scholar

[8] C. Su, K. Chang, Y. Kuo. The New Intrusion Prevention and Detection Approaches for Clustering-based Sensor Networks [C]. Proceedings of IEEE Wireless Communications and Networking Conference. 2005: 1927-(1932).

DOI: 10.1109/wcnc.2005.1424814

Google Scholar