A High-level Architecture for Intrusion Detection on Heterogeneous Wireless Sensor Networks: Hierarchical, Scalable and Dynamic Reconfigurable
Hossein Jadidoleslamy
.
DOI: 10.4236/wsn.2011.37026   PDF    HTML     9,344 Downloads   20,203 Views   Citations

Abstract

Networks protection against different types of attacks is one of most important posed issue into the network and information security domains. This problem on Wireless Sensor Networks (WSNs), in attention to their special properties, has more importance. Now, there are some of proposed solutions to protect Wireless Sensor Networks (WSNs) against different types of intrusions; but no one of them has a comprehensive view to this problem and they are usually designed in single-purpose; but, the proposed design in this paper has been a comprehensive view to this issue by presenting a complete Intrusion Detection Architecture (IDA). The main contribution of this architecture is its hierarchical structure; i.e. it is designed and applicable, in one, two or three levels, consistent to the application domain and its required security level. Focus of this paper is on the clustering WSNs, designing and deploying Sensor-based Intrusion Detection System (SIDS) on sensor nodes, Cluster-based Intrusion Detection System (CIDS) on cluster-heads and Wireless Sensor Network wide level Intrusion Detection System (WSNIDS) on the central server. Suppositions of the WSN and Intrusion Detection Architecture (IDA) are: static and heterogeneous network, hierarchical, distributed and clustering structure along with clusters' overlapping. Finally, this paper has been designed a questionnaire to verify the proposed idea; then it analyzed and evaluated the acquired results from the questionnaires.

Share and Cite:

H. Jadidoleslamy, "A High-level Architecture for Intrusion Detection on Heterogeneous Wireless Sensor Networks: Hierarchical, Scalable and Dynamic Reconfigurable," Wireless Sensor Network, Vol. 3 No. 7, 2011, pp. 241-261. doi: 10.4236/wsn.2011.37026.

Conflicts of Interest

The authors declare no conflicts of interest.

References

[1] S. Mohammadi, R. A. Ebrahimi and H. Jadidoleslamy, “A Comparison of Routing Attacks on Wireless Sensor Networks,” International Journal of Information Assur-ance and Security, Vol. 6, No. 3, 2011, pp. 195-215.
[2] S. Mohammadi and H. Jadidoleslamy, “A Comparison of Link Layer Attacks on Wireless Sensor Networks,” In-ternational Journal of Information Security, Vol. 2, No. 2, 2011, pp. 69-84.
[3] S. Mohammadi and H. Jadidoleslamy, “A Comparison of Transport and Application Layers Attacks on Wireless Sensor Networks,” International Journal of Information Assurance and Security, Vol. 6, 2011, pp. 331-345.
[4] B. Krishnamachari, D. Estrin and S. Wicker, “The Impact of Data Aggregation in Wireless Sensor Networks,” International Workshop on Distributed Event-Based Sys-tems, Vienna, July 2002, pp. 457-458.
[5] K. Sharma and M. K. Ghose, “Wireless Sensor Networks: An Overview on Its Security Threats,” International Journal of Computers and Their Applications, Vol. 1, Special Issue on “Mobile Ad-hoc Networks”, 2010, pp. 42-45.
[6] S. Mohammadi and H. Jadidoleslamy, “A Comparison of Physical Attacks on Wireless Sensor Networks,” Interna-tional Journal of Peer to Peer Networks, Vol. 2, No. 2, 2011, pp. 24-42. doi:10.5121/ijp2p.2011.2203
[7] M. Saxena, “Security in Wireless Sensor Networks: A Layer-based Classification,” Department of Computer Science, Purdue University, 2011. https://www.cerias.purdue.edu/apps/reports_and_papers/view/3106
[8] T. A. Zia, “A Security Framework for Wireless Sensor Networks,” Doctor of Philosophy (PhD) Thesis, The School of Information Technologies, University of Syd-ney, 2008.
[9] A. Perrig, R. Szewczyk, V. Wen, D. Culler and D. Tygar, “SPINS: Security Protocols for Sensor Networks,” Pro-ceedings of 7th Annual International Conference on Mo-bile Computing and Networks, Rome, July 2001.
[10] Z. Li and G. Gong, “A Survey on Security in Wireless Sensor Networks,” Department of Electrical and Computer Engineering, University of Waterloo, Canada, 2011. http://www.cacr.math.uwaterloo.ca/techreports/2008/cacr2008-20.pdf
[11] J. Yick, B. Mukherjee and D. Ghosal, “Wireless Sensor Network Survey,” Elsevier’s Computer Networks, Vol. 52, No. 12, 2008, pp. 2292-2330. doi:10.1016/j.comnet.2008.04.002
[12] A. Dimitrievski, V. Pejovska and D. Davcev, “Security Issues and Approaches in WSN, Department of computer science,” Faculty of Electrical Engineering and Informa-tion Technology, Skopje, 2011. http://ict-act.org/ICTInntions.../ictinnovations2009_submission_21.pdf
[13] C. Karlof and D. Wagner, “Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures,” Pro-ceedings of the 1st IEEE International Workshop on Sen-sor Network Protocols and Applications, Alaska, 11 May 2003, pp. 113-127.
[14] R. A. Kemmerer and G. Vigna, “Intrusion Detection: A Brief History and Overview,” Computer Society, Vol. 35, No. 4, 2002, pp. 27-30. doi:ieeecomputersociety.org/10.1109/MC.2002.10036
[15] Ch. Krügel and Th. Toth, “A Survey on Intrusion Detec-tion Systems,” TU Vienna, Austria, 2000.
[16] A. K. Jones and R. S. Sielken, “Computer System Intru-sion Detection: A Survey,” University of Virginia, 1999.
[17] K. Scarfone and P. Mell, “Guide to Intrusion Detection and Prevention Systems (IDPS),” NIST 800-94, Feb 2007.
[18] G. Maselli, L. Deri and S. Suin, “Design and Implemen-tation of an Anomaly Detection System: an Empirical Approach,” University of Pisa, Italy, 2002.
[19] S. Northcutt and J. Novak, “Network Intrusion Detection: An Analyst’s Handbook,” New Riders Publishing, Thou-sand Oaks, 2002.
[20] V. Chandala, A. Banerjee and V. Kumar, “Anomaly De-tection: A Survey, ACM Computing Surveys,” University of Minnesota, September 2009.
[21] J. Molina and M. Cukier, “Evaluating Attack Resiliency for Host Intrusion Detection Systems,” Information As-surance and Security Journal, Vol. 4, 2009. pp. 1-9.
[22] S. Zanero and S. M. Savaresi, “Unsupervised Learning Techniques for an Intrusion Detection System,” Proceed-ings of ACM Symposium on Applied Computing, New York, 2004, pp. 412-419. doi:10.1145/967900.967988
[23] S. Selliah, “Mobile Agent-Based Attack Resistant Archi-tecture for Distributed Intrusion Detection System,” MSc Thesis, College of Engineering and Mineral Resources at West Virginia University, 2001.
[24] O. Depren, M. Topallar, E. narim and M. K. Ciliz, “An Intelligent Intrusion Detection System (IDS) for Anomaly and Misuse Detection in Computer Networks,” Expert Systems with Applications, Vol. 29, No. 3, 2005, pp. 713-722.
[25] V. Handziski, A. K’opke, H. Karl, C. Frank and W. Drytkiewicz, “Improving the Energy Efficiency of Di-rected Diffusion Using Passive Clustering,” Proceedings of 1st European Workshop on Wireless Sensor Networks, Berlin, 2004, pp. 172-187.

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.