overhearing - 2 - International Conference on Computational...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Minimizing the Intrusion Detection Modules in Wireless Sensor Networks Tran Hoang Hai, Eui-Nam Huh ± Internet Computing and Security Laboratory, Department of Computer Engineering, Kyung Hee University, South Korea {haith, [email protected] ± Corresponding author Abstract Intrusion detection is an efficient method against attacks in computer network and system. Most intrusion detection system for sensor networks and ad hoc networks are based on the cooperative of intrusion detection agents and suffered from a computation and memory usage overload. In this paper, we address this problem by proposing a lightweight algorithm to select and activate the intrusion detection modules on particular sensor nodes. We also apply over-hearing mechanism to reduce the redundant sending alert packets thus enhance network lifetimes. 1. Introduction Wireless sensor networks (WSNs) have become increasingly one of the most promising and interesting area over the past few years. WSNs have been used in many applications such as battlefield surveillance, traffic monitoring, healthcare center, intelligent buildings, etc [1, 2]. The characteristics of WSNs cause the potential risks of attacks on this network. Numerous studies have attempt to address the vulnerabilities in WSNs such as Denial of Service in Sensor Networks [3] (D. Anthony Wood et al., 2002), Secure Routing in Sensor Networks [4] (C. Karlof and D. Wagner, 2002). A sensor node is more constrained in resources as compare to ad hoc node thus it is impossible to apply detection techniques in wired or ad hoc networks for WSNs. Unlike in ad hoc networks, the battery in sensor node is hardly changed or recharged so the power will drain off quickly if the node uses too much computation to process data. Current research on security in sensor networks mostly have paid attention on key management, secure routing protocols, trust-based framework and some prevention techniques for sensor networks [5]. Intrusion detection system (IDS) is a system dedicated to detect unauthorized or unusual activity into a system or network. IDS has been widely used in many system and networks such as in wired networks [6, 7, 8, 9, 10, 11] and in wireless ad hoc networks [12]. IDSs in ad hoc networks or WSNs have been proposed to suite the characteristics of wireless environment. Tiranch A. et al. [12] made a survey of IDSs in ad hoc networks and they classified IDS into two types: stand-alone and cooperative. In stand-alone IDS, local IDS agent is run on each node independently to detect intrusion. So far, every decision is made itself based only on information received in each node, this architecture has not been chosen for WSNs. In cooperative IDSs, there is a monitor agent or global agent in each node which is responsible to observe the behaviors of neighbor nodes in its radio range and learn information from them [13, 14, 15]. The nature of wireless network is distributed and requires cooperation of neighbor nodes thus cooperative schemes are best IDS schemes suite to the characteristics of WSNs [16]. Since bandwidth and
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 03/19/2012 for the course CS 1313 taught by Professor Aman during the Spring '12 term at Punjab Engineering College.

Page1 / 6

overhearing - 2 - International Conference on Computational...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online