ids.pdf - IEEE ICC 2014 Communications Software Services and Multimedia Applications Symposium Policy and Network-based Intrusion Detection System for

ids.pdf - IEEE ICC 2014 Communications Software Services...

This preview shows page 1 - 2 out of 6 pages.

Policy and Network - based Intrusion Detection System for IPv6 - enabled Wireless Sensor Networks João P. Amaral 1 , Luís M. Oliveira 1,2 , Joel J. P. C. Rodrigues 1,3 , Guangjie Han 4 , Lei Shu 5 1 Instituto de Telecomunicações, University of Beira Interior, Portugal 2 Polytechnic Institute of Tomar, Portugal 3 University ITMO, St. Petersburg, Russia 4 Hohai University, Changzhou, People’s Republic of China 5 Guangdong University of Petrochemical Technology, Maoming, People’s Republic of China {jpgamaral; loliveira}@it.ubi.pt; [email protected]; [email protected]; [email protected] Abstract — The recent years realize a progressive transition where fixed computing reached maturity and the mobility age started to thrive. Nowadays, another transition from the mobility age to the “Internet of Everything” (IoE) is taking place. In the IoE vision, several types of quotidian objects will be able to communicate over the Internet. As a result, it is expected that within a decade, IoE will have an economic value of $14.4 trillion, as the number of devices connected to the Internet continues to increase exponentially. The support for security services in these emerging resource-constrained devices is considered a challenge but needs to take into account from the very early stages of the wireless network inception. This paper proposes a network-based intrusion detection system (IDS) for IPv6-enabled wireless sensor networks. The proposed IDS is used to detect security attacks based on traffic signatures and abnormal behaviors. Keywords— 6LoWPAN; Intrusion detection system; IDS; Internet of things; Internet of everything; Wireless sensor networks; WSN I. I NTRODUCTION With recent advances in micro-electromechanical systems technology, wireless communications, and digital electronics, it is technically and economically available manufacture small and low cost sensor devices in large scale. These devices are characterized by small size, small computing and storage resources, power constrains, reduced radio ranges and data throughput. Several types of transducers can be connected to these devices, turning them suitable to be used on monitoring and physical phenomena control in large-scale environments [1]. These characteristics can be used in a wide range of applications, including military, environmental monitoring, health, and home automation. A single network may comprise hundreds of sensor devices working together to accomplish a common task. The self-organization, fault-tolerance and self- optimization are the main characteristics of these networks [1]. Nowadays, there are many technologies that can be used to connect sensor devices, most of them based on IEEE 802.15.4 layer two protocol [2, 3]. Connecting these devices to the Internet is considered simultaneously an opportunity and an important challenge. An opportunity because the services provided by these networks can be globally accessed from any device with Internet connectivity; and a challenge because these networks are exposed to a wide range of potential security attacks. In fact, sensor networks are more prone to
Image of page 1
Image of page 2

You've reached the end of your free preview.

Want to read all 6 pages?

  • Fall '19
  • Computer network, Sensor node, Wireless sensor network, Host-based intrusion detection system, Intrusion detection system

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture