IDS to wireless sensors - Applying Intrusion Detection...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Applying Intrusion Detection Systems to Wireless Sensor Networks Rodrigo Roman E.T.S. Ing. Informatica University of Malaga 29071, Malaga, Spain roman@lcc.uma.es Jianying Zhou Institute for Infocomm Research 21 Heng Mui Keng Terrace Singapore 119613 jyzhou@i2r.a-star.edu.sg Javier Lopez E.T.S. Ing. Informatica University of Malaga 29071, Malaga, Spain jlm@lcc.uma.es Abstract — The research of Intrusion Detection Systems (IDS) is a mature area in wired networks, and has also attracted many attentions in wireless ad hoc networks recently. Nevertheless, there is no previous work reported in the literature about IDS architectures in wireless sensor networks. In this paper, we discuss the general guidelines for applying IDS to static sensor networks, and introduce a novel technique to optimally watch over the communications of the sensors’ neighborhood on certain scenarios. Keywords: Internet security, intrusion detection systems, wireless sensor networks. I. INTRODUCTION An intrusion can be deFned as a set of actions that can lead to an unauthorized access or alteration of a certain system. The task of Intrusion Detection Systems (IDS) is to monitor computer networks and systems, detecting possible intrusions in the network, and alerting users after intrusions had been detected, reconFguring the network if this is possible [1]. Although there have been some recent developments in the area of IDS systems for wireless ad hoc networks, there is no previous work reported in the literature about IDS architectures for wireless sensor networks. The purpose of this paper is to show why IDS solutions created for ad hoc wireless networks cannot be applied directly to sensor networks, and introduce the general guidelines for applying IDS architectures in static sensor networks (with no mobile nodes). Also, a novel technique for optimally monitoring neighbors, that we have called spontaneous watchdogs , is introduced. The rest of the paper is organized as follows. Section II shows and compares the state-of-the-art of Intrusion Detection Systems for ad hoc networks and sensor networks. Section III presents the general guidelines of an IDS architecture for sensor networks. Section IV concludes the paper, discussing the future work and open research areas. II. IDS AND WIRELESS NETWORKS A wireless network consists of a collection of nodes that are able to maintain a wireless communication channel between each other without relying on any Fxed infrastructure. This and other factors make wireless networks substantially different from wired networks: there is no single point of access to the wireless network, all nodes must cooperate to create the network and set up its infrastructure (e.g. routing subsystem) and services (e.g. data collection), and Fnally, most operations are carried out in a distributed manner.
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 03/19/2012 for the course COMPUTER S 2143 taught by Professor Singh during the Spring '12 term at Punjab Engineering College.

Page1 / 5

IDS to wireless sensors - Applying Intrusion Detection...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online