Cluster-Based Intrusion Detection Model for Wireless Sensor Network

Article Preview

Abstract:

An intrusion detection system (IDS) using agent technology was designed for wireless sensor network of clustering structure. An IDS agent which includes two different agents was deployed in every node of network. One is local detection agent and another is global detection agent. They complete different tasks of detection. Based on Bluetooth communication technology, Bluetooth scattering network formation algorithm TPSF was employed to construct the cluster layer of sensor network and to finish task assignment of different agents. The TPSF algorithm was improved by limiting the role of nodes to lighten the complexity of nodes, so the IDS agents can work effectively and the safety coefficient of nodes is improved.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

914-917

Citation:

Online since:

September 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] A. Mishra, K. Nadkarni, A. Patcha. In: IEEE Wireless Communications, vol. 11, no. 1, p.48–60, February (2004).

Google Scholar

[2] A. P. da Silva, M. Martins, B. Rocha, A. Loureiro, L. Ruiz, and H. C. Wong. Decentralized intrusion detection in wireless sensor networks[C]. In Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks (Q2SWinet '05). ACM Press, October 2005, p.16.

DOI: 10.1145/1089761.1089765

Google Scholar

[3] I. Onat, A. Miri. An intrusion detection system for wireless sensor networks[C]. In Proceeding of the IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, vol. 3, Montreal, Canada, August 2005, p.253–259.

DOI: 10.1109/wimob.2005.1512911

Google Scholar

[4] C. E. Loo, M. Y. Ng, C. Leckie, M. Palaniswami. In: International Journal of Distributed Sensor Networks, (2005).

Google Scholar

[5] V. Bhuse, A. Gupta. In: Journal of High Speed Networks, vol. 15, no. 1, p.33–51, (2006).

Google Scholar

[6] Zhijie Han, Weiwei Zhang, Zhiguo Chen. Computer Engineering and Science, 2010, 32(9): 27-29(in Chinese).

Google Scholar

[7] Pei Wang, Xianwei Zhou. Chinese Journal of Sensors and Actuators, 2007, 20(3): 677-681(in Chinese).

Google Scholar

[8] Y. Kawamoto, V.W.S. Wong, V.C.M. Leung. A two-phase scatternet formation protocol for Bluetooth wireless personal area networks[C]. In: Proc. IEEE WCNC'03. Los Alamitos, CA: IEEE Computer Society Press, 2003. 1242~1247.

DOI: 10.1109/wcnc.2003.1200600

Google Scholar

[9] Oleg Kachirski, Ratan Guha. Intrusion Detection Using Mobile Agents in Wireless Ad Hoc Networks [C]. IEEE Workshop on Knowledge Media Networking (KMN. 02). Kyoto, JAPAN, 2002: 153-158.

DOI: 10.1109/kmn.2002.1115178

Google Scholar

[10] Guy Helmer, Johnny s. k. Wong, Vasant Honavar, et al. In: Journal of Systems and Software, 2003, (67): 109-122.

Google Scholar

[11] Xiang Li, Xiaozong Yang. Journal of Computer Research and Development, 2006, 43(2): 211-217 (in Chinese).

Google Scholar

[12] Hong Lin, Wenfang Ding, Qiang Gao. Journal of Computer Research and Development, 2003, 40(2): 201~207 (in Chinese).

Google Scholar