wirelessOrBAC: Towards an access-control-based IDS for Wireless Sensor Networks ABSTRACT Nowadays, Wireless Sensor Network (WSN) is a well-established paradigm. It has a large variety of applications ranging from home to industrial applications (such as health care and military applications). However, as this kind of networks is becoming wider, more heterogeneous and interconnected, ensuring the security of these decentralized systems is also becoming more challenging. In this paper, we propose wirelessOrBAC a formal Intrusion Detection System specially tailored to enforce the security of Wireless Sensor Networks. It allows defining in a comprehensive and easy way, security rules that model accurately wireless nodes behavior. Based on the build model, Intrusion Detection tasks are performed in order to detect malicious actions. CCS Concepts • Security and privacy ~ Access control • Security and privacy ~ Intrusion detection systems • Security and privacy ~ Mobile and wireless security Keywords wireless sensor networks security, intrusion detection, access control 1. INTRODUCTION Nowadays, Wireless Sensor Networks (WSN) have a wide application range. This is mainly due to their low-cost and flexible deployment and management. A wireless sensor consists of four basic parts: a sensing unit, a processing unit, a transceiver unit, and a power unit . It may also have additional application- dependent components such as a location finding system or a power generator. They are able to monitor a variety of phenomenons such as [2 ]: temperature, humidity, object’s movement, speed or direction, luminosity condition, pressure, noise levels and the presence or absence of objects. In order to fit these different applications, wireless sensors have several requirements as they must : a) consume extremely low power; b) operate in high volumetric densities; c) have low production cost; d) be autonomous; e) be adaptive to the environment. As results these sensor nodes have several limitations : Energy: for sensor nodes, the energy is one of the most important and limited resources. The tasks performed by sensor nodes (such as transmitting/receiving and processing data) must be well planned in order to increase the network lifetime. Indeed, communication is costlier than computation as each bit transmitted consumes about as much power as executing 800-1000 instructions . Computation: sensor nodes have limited computational capabilities. They can hardly execute complex algorithms such as cryptographic operations. Memory: sensor nodes include limited memory space that is mainly used for the storage of a specialized Operating System, application programs and sensor data. There is usually not enough space to load additional functionalities. Transmission range: the communication range of sensor nodes is limited both for technical reason and also by the need to save energy.
You've reached the end of your free preview.
Want to read all 8 pages?
- Fall '19