Policy and Network
-
based Intrusion Detection System
for
IPv6
-
enabled Wireless Sensor Networks
João P. Amaral
1
, Luís M. Oliveira
1,2
, Joel J. P. C. Rodrigues
1,3
, Guangjie Han
4
, Lei Shu
5
1
Instituto de Telecomunicações, University of Beira Interior, Portugal
2
Polytechnic Institute of Tomar, Portugal
3
University ITMO, St. Petersburg, Russia
4
Hohai University, Changzhou, People’s Republic of China
5
Guangdong University of Petrochemical Technology, Maoming, People’s Republic of China
{jpgamaral; loliveira}@it.ubi.pt; [email protected]; [email protected]; [email protected]
Abstract
— The recent years realize a progressive transition
where fixed computing reached maturity and the mobility age
started to thrive. Nowadays, another transition from the mobility
age to the “Internet of Everything” (IoE) is taking place. In the
IoE vision, several types of quotidian objects will be able to
communicate over the Internet. As a result, it is expected that
within a decade, IoE will have an economic value of $14.4 trillion,
as the number of devices connected to the Internet continues to
increase exponentially. The support for security services in these
emerging resource-constrained devices is considered a challenge
but needs to take into account from the very early stages of the
wireless network inception. This paper proposes a network-based
intrusion detection system (IDS) for IPv6-enabled wireless sensor
networks. The proposed IDS is used to detect security attacks
based on traffic signatures and abnormal behaviors.
Keywords—
6LoWPAN; Intrusion detection system; IDS;
Internet of things; Internet of everything; Wireless sensor
networks; WSN
I.
I
NTRODUCTION
With recent advances in micro-electromechanical systems
technology, wireless communications, and digital electronics, it
is technically and economically available manufacture small
and low cost sensor devices in large scale. These devices are
characterized by small size, small computing and storage
resources, power constrains, reduced radio ranges and data
throughput. Several types of transducers can be connected to
these devices, turning them suitable to be used on monitoring
and physical phenomena control in large-scale environments
[1]. These characteristics can be used in a wide range of
applications, including military, environmental monitoring,
health, and home automation. A single network may comprise
hundreds of sensor devices working together to accomplish a
common task. The self-organization, fault-tolerance and self-
optimization are the main characteristics of these networks [1].
Nowadays, there are many technologies that can be used to
connect sensor devices, most of them based on IEEE 802.15.4
layer two protocol [2, 3]. Connecting these devices to the
Internet is considered simultaneously an opportunity and an
important challenge. An opportunity because the services
provided by these networks can be globally accessed from any
device with Internet connectivity; and a challenge because
these networks are exposed to a wide range of potential
security attacks. In fact, sensor networks are more prone to


You've reached the end of your free preview.
Want to read all 6 pages?
- Fall '19
- Computer network, Sensor node, Wireless sensor network, Host-based intrusion detection system, Intrusion detection system